Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
293s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/01/2025, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe
Resource
win10v2004-20241007-en
General
-
Target
81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe
-
Size
2.6MB
-
MD5
4dedefe4431f91c920d9aaaceb99e2ee
-
SHA1
9a20559fa8a3e670c734837de16fa508d5e25b41
-
SHA256
81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72
-
SHA512
cb7d2fe42cd44f7b1c31102961c579d7ba5a6e8f5071dfdb372dade85f56572dd870f54ca32b160faa58536f0f40e4ceb39745ae076fb8d546dd358ebe96f086
-
SSDEEP
49152:wgwReifu1DBgutBPN4gJEkSBz4aPUAigHrBYlHYw/s5CH5Ie71yAmiESeJKeqy:wgwRevguPPjg946UAFLBEYw/s5CX7tmj
Malware Config
Signatures
-
Detects Mimic ransomware 1 IoCs
resource yara_rule behavioral1/files/0x0007000000018690-29.dat family_mimic -
Mimic
Ransomware family was first exploited in the wild in 2022.
-
Mimic family
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\WinDefend\Start = "3" DC.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" YOURDATA.exe -
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 1292 bcdedit.exe 2884 bcdedit.exe -
Renames multiple (6327) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
pid Process 2144 wbadmin.exe -
pid Process 808 wbadmin.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsDtSrvr.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mydesktopqos.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tv_w32.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsnapvss.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wxServer.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Raccine_x86.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Sysmon64.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\outlook.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\encsvc.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqlagent.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wsa_service.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iisadmin.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchIndexer.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CoreSync.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mysqld-opt.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\qbupdate.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wsa_service.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wxServerView.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msexchangesa.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CompatTelRunner.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fdhost.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msftesql.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mydesktopqos.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ocssd.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\node.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBW32.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBW32.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vxmon.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\xfssvccon.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SearchProtocolHost.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wsqmcons.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fdhost.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sql.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msftesql-exchange.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\agntsvc.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutodeskDesktopApp.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bedbh.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\httpd.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msaccess.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mysqld-opt.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RaccineElevatedCfg.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bengien.exe YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\beserver.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\encsvc.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fbserver.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mysqld.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ocautoupds.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ocssd.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\java.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBDBMgrN.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QBW64.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TeamViewer_Service.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wxServer.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\raw_agent_svc.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqbcoreservice.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AutodeskDesktopApp.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\EnterpriseClient.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsDtSrvr.exe YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mspub.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sqlservr.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Sysmon.exe\Debugger = "C:\\Windows\\System32\\Systray.exe" YOURDATA.exe -
Deletes itself 1 IoCs
pid Process 1456 cmd.exe -
Executes dropped EXE 12 IoCs
pid Process 3012 7za.exe 2168 7za.exe 3064 2ks.exe 2324 YOURDATA.exe 568 DC.exe 1760 YOURDATA.exe 2840 YOURDATA.exe 2040 YOURDATA.exe 2884 Everything.exe 1740 Everything.exe 2648 xdel.exe 676 xdel.exe -
Loads dropped DLL 21 IoCs
pid Process 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 3064 2ks.exe 3064 2ks.exe 2324 YOURDATA.exe 1788 cmd.exe 1760 YOURDATA.exe 2040 YOURDATA.exe 2840 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe -
Modifies system executable filetype association 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 2ks.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\exefile\shell\open\command 2ks.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\exefile\shell 2ks.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\exefile\shell\open\command\ = "\"%1\" %*" 2ks.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" YOURDATA.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\exefile\shell\open\command\ = "\"%1\" %*" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 2ks.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\exefile\shell\open 2ks.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\exefile\shell\open\command YOURDATA.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Real-Time Protection DC.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YOURDATA = "\"C:\\Users\\Admin\\AppData\\Local\\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\\YOURDATA.exe\" " 2ks.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YOURDATA.exe = "notepad.exe \"C:\\Users\\Admin\\AppData\\Local\\----Read-Me-----.txt\"" YOURDATA.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" YOURDATA.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: Everything.exe File opened (read-only) \??\G: Everything.exe File opened (read-only) \??\S: Everything.exe File opened (read-only) \??\U: Everything.exe File opened (read-only) \??\A: Everything.exe File opened (read-only) \??\L: Everything.exe File opened (read-only) \??\T: Everything.exe File opened (read-only) \??\P: Everything.exe File opened (read-only) \??\V: Everything.exe File opened (read-only) \??\A: Everything.exe File opened (read-only) \??\Q: Everything.exe File opened (read-only) \??\B: Everything.exe File opened (read-only) \??\G: Everything.exe File opened (read-only) \??\J: Everything.exe File opened (read-only) \??\R: Everything.exe File opened (read-only) \??\B: Everything.exe File opened (read-only) \??\Q: Everything.exe File opened (read-only) \??\W: Everything.exe File opened (read-only) \??\E: Everything.exe File opened (read-only) \??\H: Everything.exe File opened (read-only) \??\I: Everything.exe File opened (read-only) \??\H: Everything.exe File opened (read-only) \??\I: Everything.exe File opened (read-only) \??\M: Everything.exe File opened (read-only) \??\T: Everything.exe File opened (read-only) \??\V: Everything.exe File opened (read-only) \??\K: Everything.exe File opened (read-only) \??\O: Everything.exe File opened (read-only) \??\P: Everything.exe File opened (read-only) \??\N: Everything.exe File opened (read-only) \??\R: Everything.exe File opened (read-only) \??\W: Everything.exe File opened (read-only) \??\E: Everything.exe File opened (read-only) \??\Z: Everything.exe File opened (read-only) \??\N: Everything.exe File opened (read-only) \??\X: Everything.exe File opened (read-only) \??\Y: Everything.exe File opened (read-only) \??\Z: Everything.exe File opened (read-only) \??\J: Everything.exe File opened (read-only) \??\X: Everything.exe File opened (read-only) \??\L: Everything.exe File opened (read-only) \??\M: Everything.exe File opened (read-only) \??\Y: Everything.exe File opened (read-only) \??\K: Everything.exe File opened (read-only) \??\O: Everything.exe File opened (read-only) \??\S: Everything.exe -
Power Settings 1 TTPs 15 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 1948 powercfg.exe 932 powercfg.exe 2068 powercfg.exe 2276 powercfg.exe 1476 powercfg.exe 680 powercfg.exe 1588 powercfg.exe 1284 powercfg.exe 1072 powercfg.exe 2516 powercfg.exe 1900 powercfg.exe 904 powercfg.exe 1728 powercfg.exe 676 powercfg.exe 1680 powercfg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol DC.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini DC.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\de-DE\css\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\helpmap.txt YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\[email protected] YOURDATA.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\[email protected] YOURDATA.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jre7\lib\security\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jre7\lib\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\css\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\[email protected] YOURDATA.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\[email protected] YOURDATA.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\[email protected] YOURDATA.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\css\[email protected] YOURDATA.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.1.etl wbadmin.exe -
pid Process 1360 powershell.exe 684 powershell.exe 1740 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YOURDATA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Everything.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YOURDATA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YOURDATA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YOURDATA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7za.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Everything.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe -
Modifies registry class 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 2ks.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\exefile 2ks.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\exefile\shell\open\command\ = "\"%1\" %*" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile\shell YOURDATA.exe Key created \REGISTRY\MACHINE\Software\Classes\.2000USD YOURDATA.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\exefile\shell\open\command 2ks.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile\shell\open YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile\shell\open\command\ = "notepad.exe \"C:\\Users\\Admin\\AppData\\Local\\----Read-Me-----.txt\"" YOURDATA.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\exefile\shell 2ks.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\exefile\shell\open 2ks.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\exefile\shell\open\command\ = "\"%1\" %*" 2ks.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 2ks.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_CLASSES\exefile\shell\open\command YOURDATA.exe Key created \REGISTRY\MACHINE\Software\Classes\mimicfile\shell\open\command YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mimicfile\shell\open\command YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.2000USD\ = "mimicfile" YOURDATA.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 568 DC.exe 568 DC.exe 568 DC.exe 568 DC.exe 2040 YOURDATA.exe 2840 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 2324 YOURDATA.exe 684 powershell.exe 1740 powershell.exe 1360 powershell.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe 2040 YOURDATA.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 3012 7za.exe Token: 35 3012 7za.exe Token: SeRestorePrivilege 2168 7za.exe Token: 35 2168 7za.exe Token: SeSecurityPrivilege 2168 7za.exe Token: SeSecurityPrivilege 2168 7za.exe Token: SeIncreaseQuotaPrivilege 3064 2ks.exe Token: SeSecurityPrivilege 3064 2ks.exe Token: SeTakeOwnershipPrivilege 3064 2ks.exe Token: SeLoadDriverPrivilege 3064 2ks.exe Token: SeSystemProfilePrivilege 3064 2ks.exe Token: SeSystemtimePrivilege 3064 2ks.exe Token: SeProfSingleProcessPrivilege 3064 2ks.exe Token: SeIncBasePriorityPrivilege 3064 2ks.exe Token: SeCreatePagefilePrivilege 3064 2ks.exe Token: SeBackupPrivilege 3064 2ks.exe Token: SeRestorePrivilege 3064 2ks.exe Token: SeShutdownPrivilege 3064 2ks.exe Token: SeDebugPrivilege 3064 2ks.exe Token: SeSystemEnvironmentPrivilege 3064 2ks.exe Token: SeChangeNotifyPrivilege 3064 2ks.exe Token: SeRemoteShutdownPrivilege 3064 2ks.exe Token: SeUndockPrivilege 3064 2ks.exe Token: SeManageVolumePrivilege 3064 2ks.exe Token: SeImpersonatePrivilege 3064 2ks.exe Token: SeCreateGlobalPrivilege 3064 2ks.exe Token: 33 3064 2ks.exe Token: 34 3064 2ks.exe Token: 35 3064 2ks.exe Token: SeIncreaseQuotaPrivilege 2324 YOURDATA.exe Token: SeSecurityPrivilege 2324 YOURDATA.exe Token: SeTakeOwnershipPrivilege 2324 YOURDATA.exe Token: SeLoadDriverPrivilege 2324 YOURDATA.exe Token: SeSystemProfilePrivilege 2324 YOURDATA.exe Token: SeSystemtimePrivilege 2324 YOURDATA.exe Token: SeProfSingleProcessPrivilege 2324 YOURDATA.exe Token: SeIncBasePriorityPrivilege 2324 YOURDATA.exe Token: SeCreatePagefilePrivilege 2324 YOURDATA.exe Token: SeBackupPrivilege 2324 YOURDATA.exe Token: SeRestorePrivilege 2324 YOURDATA.exe Token: SeShutdownPrivilege 2324 YOURDATA.exe Token: SeDebugPrivilege 2324 YOURDATA.exe Token: SeSystemEnvironmentPrivilege 2324 YOURDATA.exe Token: SeChangeNotifyPrivilege 2324 YOURDATA.exe Token: SeRemoteShutdownPrivilege 2324 YOURDATA.exe Token: SeUndockPrivilege 2324 YOURDATA.exe Token: SeManageVolumePrivilege 2324 YOURDATA.exe Token: SeImpersonatePrivilege 2324 YOURDATA.exe Token: SeCreateGlobalPrivilege 2324 YOURDATA.exe Token: 33 2324 YOURDATA.exe Token: 34 2324 YOURDATA.exe Token: 35 2324 YOURDATA.exe Token: SeDebugPrivilege 568 DC.exe Token: SeAssignPrimaryTokenPrivilege 568 DC.exe Token: SeIncreaseQuotaPrivilege 568 DC.exe Token: 0 568 DC.exe Token: SeIncreaseQuotaPrivilege 1760 YOURDATA.exe Token: SeSecurityPrivilege 1760 YOURDATA.exe Token: SeTakeOwnershipPrivilege 1760 YOURDATA.exe Token: SeLoadDriverPrivilege 1760 YOURDATA.exe Token: SeSystemProfilePrivilege 1760 YOURDATA.exe Token: SeSystemtimePrivilege 1760 YOURDATA.exe Token: SeProfSingleProcessPrivilege 1760 YOURDATA.exe Token: SeIncBasePriorityPrivilege 1760 YOURDATA.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2884 Everything.exe 1740 Everything.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1840 wrote to memory of 3012 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 31 PID 1840 wrote to memory of 3012 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 31 PID 1840 wrote to memory of 3012 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 31 PID 1840 wrote to memory of 3012 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 31 PID 1840 wrote to memory of 2168 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 33 PID 1840 wrote to memory of 2168 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 33 PID 1840 wrote to memory of 2168 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 33 PID 1840 wrote to memory of 2168 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 33 PID 1840 wrote to memory of 3064 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 35 PID 1840 wrote to memory of 3064 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 35 PID 1840 wrote to memory of 3064 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 35 PID 1840 wrote to memory of 3064 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 35 PID 3064 wrote to memory of 2324 3064 2ks.exe 36 PID 3064 wrote to memory of 2324 3064 2ks.exe 36 PID 3064 wrote to memory of 2324 3064 2ks.exe 36 PID 3064 wrote to memory of 2324 3064 2ks.exe 36 PID 2324 wrote to memory of 1788 2324 YOURDATA.exe 37 PID 2324 wrote to memory of 1788 2324 YOURDATA.exe 37 PID 2324 wrote to memory of 1788 2324 YOURDATA.exe 37 PID 2324 wrote to memory of 1788 2324 YOURDATA.exe 37 PID 1788 wrote to memory of 568 1788 cmd.exe 39 PID 1788 wrote to memory of 568 1788 cmd.exe 39 PID 1788 wrote to memory of 568 1788 cmd.exe 39 PID 1788 wrote to memory of 568 1788 cmd.exe 39 PID 2324 wrote to memory of 1760 2324 YOURDATA.exe 41 PID 2324 wrote to memory of 1760 2324 YOURDATA.exe 41 PID 2324 wrote to memory of 1760 2324 YOURDATA.exe 41 PID 2324 wrote to memory of 1760 2324 YOURDATA.exe 41 PID 2324 wrote to memory of 2040 2324 YOURDATA.exe 42 PID 2324 wrote to memory of 2040 2324 YOURDATA.exe 42 PID 2324 wrote to memory of 2040 2324 YOURDATA.exe 42 PID 2324 wrote to memory of 2040 2324 YOURDATA.exe 42 PID 2324 wrote to memory of 2840 2324 YOURDATA.exe 43 PID 2324 wrote to memory of 2840 2324 YOURDATA.exe 43 PID 2324 wrote to memory of 2840 2324 YOURDATA.exe 43 PID 2324 wrote to memory of 2840 2324 YOURDATA.exe 43 PID 2324 wrote to memory of 2884 2324 YOURDATA.exe 44 PID 2324 wrote to memory of 2884 2324 YOURDATA.exe 44 PID 2324 wrote to memory of 2884 2324 YOURDATA.exe 44 PID 2324 wrote to memory of 2884 2324 YOURDATA.exe 44 PID 1840 wrote to memory of 1456 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 45 PID 1840 wrote to memory of 1456 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 45 PID 1840 wrote to memory of 1456 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 45 PID 1840 wrote to memory of 1456 1840 81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe 45 PID 2324 wrote to memory of 2516 2324 YOURDATA.exe 47 PID 2324 wrote to memory of 2516 2324 YOURDATA.exe 47 PID 2324 wrote to memory of 2516 2324 YOURDATA.exe 47 PID 2324 wrote to memory of 2516 2324 YOURDATA.exe 47 PID 2324 wrote to memory of 1680 2324 YOURDATA.exe 49 PID 2324 wrote to memory of 1680 2324 YOURDATA.exe 49 PID 2324 wrote to memory of 1680 2324 YOURDATA.exe 49 PID 2324 wrote to memory of 1680 2324 YOURDATA.exe 49 PID 2324 wrote to memory of 1900 2324 YOURDATA.exe 51 PID 2324 wrote to memory of 1900 2324 YOURDATA.exe 51 PID 2324 wrote to memory of 1900 2324 YOURDATA.exe 51 PID 2324 wrote to memory of 1900 2324 YOURDATA.exe 51 PID 2324 wrote to memory of 680 2324 YOURDATA.exe 52 PID 2324 wrote to memory of 680 2324 YOURDATA.exe 52 PID 2324 wrote to memory of 680 2324 YOURDATA.exe 52 PID 2324 wrote to memory of 680 2324 YOURDATA.exe 52 PID 2324 wrote to memory of 1948 2324 YOURDATA.exe 54 PID 2324 wrote to memory of 1948 2324 YOURDATA.exe 54 PID 2324 wrote to memory of 1948 2324 YOURDATA.exe 54 PID 2324 wrote to memory of 1948 2324 YOURDATA.exe 54 -
System policy modification 1 TTPs 13 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" YOURDATA.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HidePowerOptions = "1" YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection YOURDATA.exe Key created \REGISTRY\MACHINE\SOFTWARE\MICROSOFT\Windows\CurrentVersion\Policies\System YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "0" YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection\AllowTelemetry = "0" YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" YOURDATA.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = "Your data on your system has been encrypted by us....\n\nWe want you to know that you will not get your data back with the usual data recovery methods...\n\nWe will restore your data for 3.000 dollars.\n\nYou can send an e-mail with your reference code below\n\nWe Do Not Negotiate \nWe do not give discounts.\nThe price is very reasonable\n\n\n######################################################################\n\nIf you contact me to ask for a discount or to negotiate, I will increase the price I offer.\n\n######################################################################\n\nWhen you send us an e-mail, please send us your reference code below\n\n=> YOUR REFERENCE CODE <=\n\nMT_JquGakG-nKFANNfm0c_I1C25CHrAZUt6_zxPwQj4*[email protected]\n\n=> OUR E-MAIL ADDRESS <=\n\[email protected]\[email protected]\[email protected]\n\nIf you do not receive a reply from the above e-mail within 24 hours, you can also contact the following e-mail address\n\n=> OUR SECOND E-MAIL ADDRESS <=\n\[email protected]\n\n" YOURDATA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = " " YOURDATA.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe"C:\Users\Admin\AppData\Local\Temp\81423f5454208e958aa183c2850809620676485c63aab07d91a6f85c1d9b4e72.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe" i2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\7za.exe" x -y -p731121544783912138 Everything64.dll2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\2ks.exe"C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\2ks.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\YOURDATA.exe"C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\YOURDATA.exe"3⤵
- UAC bypass
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2324 -
C:\Windows\SysWOW64\cmd.execmd.exe /c DC.exe /D4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\DC.exeDC.exe /D5⤵
- Modifies security service
- Executes dropped EXE
- Windows security modification
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:568
-
-
-
C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\YOURDATA.exe"C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\YOURDATA.exe" -e watch -pid 2324 -!4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\YOURDATA.exe"C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\YOURDATA.exe" -e ul14⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\YOURDATA.exe"C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\YOURDATA.exe" -e ul24⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\Everything.exe"C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\Everything.exe" -startup4⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2884
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -H off4⤵
- Power Settings
PID:2516
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 04⤵
- Power Settings
PID:1680
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 04⤵
- Power Settings
PID:1900
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 04⤵
- Power Settings
PID:680
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 04⤵
- Power Settings
PID:1948
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 04⤵
- Power Settings
PID:1588
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 04⤵
- Power Settings
PID:904
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 04⤵
- Power Settings
PID:932
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 04⤵
- Power Settings
PID:1476
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETACVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 04⤵
- Power Settings
PID:1284
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 7648efa3-dd9c-4e3e-b566-50f929386280 04⤵
- Power Settings
PID:1728
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 96996bc0-ad50-47ec-923b-6f41874dd9eb 04⤵
- Power Settings
PID:1072
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -SETDCVALUEINDEX e9a42b02-d5df-448d-aa00-03f14749eb61 4f971e89-eebd-4455-a8de-9e59040e7347 5ca83367-6e45-459f-a27b-476b1d01c936 04⤵
- Power Settings
PID:676
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -S 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c4⤵
- Power Settings
PID:2276
-
-
C:\Windows\system32\powercfg.exepowercfg.exe -S e9a42b02-d5df-448d-aa00-03f14749eb614⤵
- Power Settings
PID:2068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass "Get-VM | Stop-VM"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass "Get-VM | Select-Object vmid | Get-VHD | %{Get-DiskImage -ImagePath $_.Path; Get-DiskImage -ImagePath $_.ParentPath} | Dismount-DiskImage"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass "Get-Volume | Get-DiskImage | Dismount-DiskImage"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:1292
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:2884
-
-
C:\Windows\system32\wbadmin.exewbadmin.exe DELETE SYSTEMSTATEBACKUP4⤵
- Deletes System State backups
- Drops file in Windows directory
PID:2144
-
-
C:\Windows\system32\wbadmin.exewbadmin.exe delete catalog -quiet4⤵
- Deletes backup catalog
PID:808
-
-
C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\Everything.exe"C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\Everything.exe" -startup4⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
C:\Windows\SysWOW64\notepad.exenotepad.exe "C:\Users\Admin\AppData\Local\----Read-Me-----.txt"4⤵
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\xdel.exe"C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\xdel.exe" -accepteula -p 1 -c C:\4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2648
-
-
C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\xdel.exe"C:\Users\Admin\AppData\Local\{0ECDC9AB-A6A9-9E08-77E6-7625750CF52C}\xdel.exe" -accepteula -p 1 -c F:\4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:676
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1456
-
-
C:\Windows\system32\gpscript.exegpscript.exe /RefreshSystemParam1⤵PID:1076
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2808
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:736
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1444
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2136
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Power Settings
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Change Default File Association
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify Tools
2Indicator Removal
2File Deletion
2Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD531c20d0af75da5b8f238d1603672d070
SHA1b31bb7ab346efbdfaac7c45e850afbbe043e730c
SHA25650d856d07558e2f7fa7e3d0b5c45f6e237685349e3ed2d4f024a48533a6f7a0a
SHA512f5d4fd25b8099ea27cfd61b69a977feaa1263d2ba8b8390a8c4327d51280307f94f1e50a2a0bbfa44213daa47bc4de4b4bc8f7c466afd6ead2ab4306684903de
-
Filesize
300B
MD59d6037befe362455e476b64d0c7d5585
SHA13a37bd2556c2d2ca8d12517fcdc01053e5f458ab
SHA256c934266ef6486e12580bf58b9a7efccce610d40783c98bac3c9949c1e5b4e51e
SHA512d94320641e1faefcab53d9c58424604b7f779957f17318aeb68043130ea5dc180886d53dbe53b8ce0097fcf9675922c23c1bae8712ed6047b56a0c7abe15f8bc
-
Filesize
2.3MB
MD55ff517172297d6e66393e20ad0fe4191
SHA10065dbc18aa32a06af362ac8e44e3f4163aef5d8
SHA2560c6e3880040d8f84fc5d05b09da177f7b604296d2ab32c0210df131868ffa30b
SHA5129466cd592ed20bc55d01c6cbb2a4714417e67551b6e11be7483e1eb3f605a2b45bca968e5ab0b299c75e057c4d5367a6b9ce9a0a82b32323b9a8aaf2cfc7a98c
-
Filesize
802KB
MD5ac34ba84a5054cd701efad5dd14645c9
SHA1dc74a9fd5560b7c7a0fc9d183de9d676e92b9e8b
SHA256c576f7f55c4c0304b290b15e70a638b037df15c69577cd6263329c73416e490e
SHA512df491306a3c8ddb580b7cca1dce9e22a87fd43ca3632f3630cdcbe114bef243e847b2ce774d688f6e142516f2e0fc49d30fad7c7168e627523da21e2fe06836a
-
Filesize
1.7MB
MD5c44487ce1827ce26ac4699432d15b42a
SHA18434080fad778057a50607364fee8b481f0feef8
SHA2564c83e46a29106afbaf5279029d102b489d958781764289b61ab5b618a4307405
SHA512a0ea698333c21e59b5bc79d79ff39d185a019cede394dbd8b2eb72c4230001685a90098a691c296aeab27db6751eef56c4261cf00f790de2e9e9efc0e7f7c808
-
Filesize
548B
MD5742c2400f2de964d0cce4a8dabadd708
SHA1c452d8d4c3a82af4bc57ca8a76e4407aaf90deca
SHA2562fefb69e4b2310be5e09d329e8cf1bebd1f9e18884c8c2a38af8d7ea46bd5e01
SHA51263a7f1482dc15d558e1a26d1214fcecca14df6db78c88735a67d1a89185c05210edc38b38e3e014dac817df88968aaf47beb40e8298777fbb5308abfe16479e4
-
Filesize
550B
MD551014c0c06acdd80f9ae4469e7d30a9e
SHA1204e6a57c44242fad874377851b13099dfe60176
SHA25689ad2164717bd5f5f93fbb4cebf0efeb473097408fddfc7fc7b924d790514dc5
SHA51279b5e2727cce5cd9f6d2e886f93b22b72ec0ad4a6b9ad47205d7cf283606280665ead729ab3921d7e84409cfc09a94e749a68918130f0172856626f5f7af010c
-
Filesize
84KB
MD53b03324537327811bbbaff4aafa4d75b
SHA11218bd8165a2e0ec56a88b5a8bb4b27e52b564e7
SHA2568cae8a9740d466e17f16481e68de9cbd58265863c3924d66596048edfd87e880
SHA512ba5312e1836bac0bb05b133b2b938be98b28646c8b8fc45804d7f252cd2e1a191667bfa8ba979bf2a07d49053114234b78cca83ef28aecf105d7169a3ec3dc62
-
Filesize
1.7MB
MD5b56a4e1baf2ef1f2ff1da51a0c1efd0d
SHA1551d9e7b280b6bb672edce72bcb1e26cd23f64e6
SHA256fde69844a23403a75cb1985075c162db22b6dedad8f89149a9d346c5c3db9e82
SHA5125c72a19d24bb1832ed8861b829b5cc8b9914ede5ee5212cc6cff4e8af77ec0fa4b9f86f0159239e2388dd73157ef1f17bcb505697cff31fdbf65cccf966fd3fa
-
Filesize
350KB
MD5803df907d936e08fbbd06020c411be93
SHA14aa4b498ae037a2b0479659374a5c3af5f6b8d97
SHA256e8eaa39e2adfd49ab69d7bb8504ccb82a902c8b48fbc256472f36f41775e594c
SHA5125b9c44b4ed68b632360c66b35442722d2797807c88555c9fde9c176581d410e4f6ed433fabdcd9ee614db458158e6055a9f7f526ebfbc8e7f5f3d388f5de4532
-
Filesize
9.3MB
MD540532be538daae47eb2de3e6c6a3028a
SHA171ebefa568c690546f3275ab2bd5d699011cb018
SHA256f623f83e4730a1689d4b17d6e67f487d2eb02fcc3081e0a72092ff88e4ff02c7
SHA512e7e89d5ba1ee81b9ea2084c2260de8922fa5bacc35a851cd651b5923f8957c2ca2d48bb0e7567c5e40e2d9a745e64033f82bf63f159acdb790229adbe0ded497
-
Filesize
20KB
MD5db98f0e192b766b95eaa502f42e0ddbe
SHA1e74d5aca32be278a04d0c0221e66717534c9f5c8
SHA25683b1eae589093c25a7ce6b78c9d829d8b9421be2617e5ef08d3b68b70758e803
SHA512c33d7a4cdd9d49bd7020758e73b2ade31e6b3dd5ea5442cd4df0942b1c57417763ed6f99911775aeb29f5011e915fc25ece80a73b41e2e3bf6de0ecfaf6a96fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\NZAMKXJQ7HGG8M5OYYWL.temp
Filesize7KB
MD5b2215580d89780b112d8887893be269c
SHA18dfc7261e1065f4333ebbe92d7f9bd9004d5aa17
SHA256b3d404317ba75607ba6aff3da10773d427b3b380e77d964fa0268500d2bc9f28
SHA512a4c493ed2501b8d3b9203a2f1596c8bcb0f5daff7e5964e29d0fa7f6b2f9f18c22b5cdd0004657b371e8a3221958a7fa6f704bfe6b742ef1d20180b98ab4b2bc
-
Filesize
233B
MD5cd4326a6fd01cd3ca77cfd8d0f53821b
SHA1a1030414d1f8e5d5a6e89d5a309921b8920856f9
SHA2561c59482111e657ef5190e22de6c047609a67e46e28d67fd70829882fd8087a9c
SHA51229ce5532fb3adf55caa011e53736507fbf241afee9d3ca516a1d9bffec6e5cb2f87c4cd73e4da8c33b8706f96ba3b31f13ce229746110d5bd248839f67ec6d67
-
Filesize
32KB
MD55acf8067d81005c2898eb28850d7e693
SHA199f1adb517196bb0abce2907f462f0e29b29703e
SHA256a13c7aade3ca526ef33c2da6218ad59cc5f9b368b0c278104d4a8d2e1e968a7a
SHA512b97980c58387bba698b29d0171637f125db275a0bc1bd9eeac604690448ae7595c64abafbfe2fccba6a68b4e1e35afcaa59fe207da066266ee6cddcd4971849c
-
Filesize
32KB
MD5cc3f4fb78eda814fbae7ab7147d9a605
SHA1a3c6e4438de5293bb893fcf58eafc853f31ec236
SHA256522cb92d458d1a3280cc22a3301cda4d9bd32015a13c901a6fe73c9ada914b89
SHA5120ddb48c4364afad7b2277111b296b86a2a7e8ad414c5eb2b90e96d6b4492cac7483ec130578533f587fbdb72ed4989572322f3221a2b171563877bf613be544a
-
Filesize
32KB
MD5308abe6289bbf1ba55d6ff44bd836629
SHA1d4b1c12849d59ae25a2e2398abd33d30ff0f53f3
SHA256d763715a22859b03359163e7ff16f3448378f240518c65c4842490d1011ad536
SHA512b0419c769f2901c361e30eb510f160326454de3c8c8317dafc942c1774a105accc1b900528967ed2f9fed4ea456b35f5e437d9e9444088852e35f861355177ec
-
Filesize
32B
MD507d6f4015a512f24c2ba9e6d3aeb0cb0
SHA16ad18285e753d6b13d369eb18204ae542d0a1bcc
SHA256d4dd071c7f4c38cfbfcecf745a7816045ed740fb1e99f072ab5a827962768618
SHA512d795c08b62880558fadf61f664289a32554cdd3861054f0d3693ae880f8c6757ec03575c570046f8b5116fefd1f1723a3f6b373d8a6c52a2650fb197322bd4d4
-
Filesize
772KB
MD5b93eb0a48c91a53bda6a1a074a4b431e
SHA1ac693a14c697b1a8ee80318e260e817b8ee2aa86
SHA256ab15a9b27ee2d69a8bc8c8d1f5f40f28cd568f5cbb28d36ed938110203f8d142
SHA512732cb0dcb2b1dac1a7462554c256cec27de243734f79b7f87026e9f5fbae6d5d8a5f14a702d2af0b65897b6abad70a9eff1905dc851ce267d221ddcdd9e640c5