Analysis
-
max time kernel
512s -
max time network
485s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-02-2025 14:51
Static task
static1
Behavioral task
behavioral1
Sample
detection.html
Resource
win11-20241007-en
General
-
Target
detection.html
-
Size
7KB
-
MD5
60e328924b7b87dc5548518c888aaf62
-
SHA1
66470e60ce1ff42244252240aa14f5eed1a826c5
-
SHA256
5336e0393e352afe50f4740069dd7a071d74811b13dc47e8e79e6344ef27356f
-
SHA512
71094efcef7f79aa47403c0a177b9e1b6ea5c1002bf8f751841d9025c3c9c97b20f0552dd412796d0fd4ca86492a1e5af95353ca22e6813e056ce0f1ce25bfb7
-
SSDEEP
192:Ftsm1pT1cxgyv5AvnHeuAprvC7wtVAanvnvdUhW5QUPKyun7ne9GQ7pTT+T1Uu2:FPpOgyv50nHeuApLC7wtVAavvdKAZSbo
Malware Config
Extracted
C:\Users\Admin\Documents\!Please Read Me!.txt
wannacry
15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1
Extracted
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]
wannacry
12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Program Files (x86)\\Windows\\Error file remover\\fatalerror.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Program Files (x86)\\Windows\\Error file remover\\fatalerror.exe" msiexec.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4452 6720 cmd.exe 241 -
UAC bypass 3 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Wannacry
WannaCry is a ransomware cryptoworm.
-
Wannacry family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2336 bcdedit.exe 3904 bcdedit.exe -
Disables Task Manager via registry modification
-
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SD1624.tmp WannaCrypt0r.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SD162B.tmp WannaCrypt0r.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SD16B0.tmp WannaCry.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SD16B7.tmp WannaCry.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\USC21-C9XAT-OTRTX-HTKTO.HTML SporaRansomware.exe -
Executes dropped EXE 44 IoCs
pid Process 4124 xgkkoAQU.exe 3424 fgMkMoUs.exe 2072 ViraLock.exe 4768 ViraLock.exe 8 ViraLock.exe 2356 ViraLock.exe 2124 ViraLock.exe 4340 ViraLock.exe 2632 !WannaDecryptor!.exe 932 taskdl.exe 5636 !WannaDecryptor!.exe 5228 !WannaDecryptor!.exe 5804 @[email protected] 5852 @[email protected] 5400 taskhsvc.exe 5596 !WannaDecryptor!.exe 5464 taskse.exe 6084 @[email protected] 360 taskdl.exe 7116 taskse.exe 3468 @[email protected] 6956 taskdl.exe 6768 taskse.exe 292 @[email protected] 312 taskdl.exe 1732 taskse.exe 5452 @[email protected] 5380 taskdl.exe 5888 taskse.exe 860 @[email protected] 4044 taskdl.exe 6444 fatalerror.exe 6776 taskse.exe 236 @[email protected] 6536 taskdl.exe 5336 taskse.exe 1436 @[email protected] 1072 taskdl.exe 1540 taskse.exe 5632 @[email protected] 5052 taskdl.exe 5900 taskse.exe 5940 @[email protected] 6496 taskdl.exe -
Loads dropped DLL 23 IoCs
pid Process 3912 WinlockerVB6Blacksod.exe 3912 WinlockerVB6Blacksod.exe 6844 MsiExec.exe 6844 MsiExec.exe 6844 MsiExec.exe 6844 MsiExec.exe 6844 MsiExec.exe 6844 MsiExec.exe 6844 MsiExec.exe 6844 MsiExec.exe 6844 MsiExec.exe 6844 MsiExec.exe 4892 MsiExec.exe 6844 MsiExec.exe 3912 WinlockerVB6Blacksod.exe 6844 MsiExec.exe 5400 taskhsvc.exe 5400 taskhsvc.exe 5400 taskhsvc.exe 5400 taskhsvc.exe 5400 taskhsvc.exe 5400 taskhsvc.exe 5400 taskhsvc.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2672 icacls.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fgMkMoUs.exe = "C:\\ProgramData\\KOcUocAg\\fgMkMoUs.exe" ViraLock.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Run\xgkkoAQU.exe = "C:\\Users\\Admin\\TgkUYYAk\\xgkkoAQU.exe" xgkkoAQU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fgMkMoUs.exe = "C:\\ProgramData\\KOcUocAg\\fgMkMoUs.exe" fgMkMoUs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Update Task Scheduler = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Temp1_The-MALWARE-Repo-master.zip\\The-MALWARE-Repo-master\\Ransomware\\WannaCry.exe\" /r" WannaCry.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tgikesyrkli880 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Temp1_The-MALWARE-Repo-master.zip\\The-MALWARE-Repo-master\\Ransomware\\tasksche.exe\"" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Run\xgkkoAQU.exe = "C:\\Users\\Admin\\TgkUYYAk\\xgkkoAQU.exe" ViraLock.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 65 6844 MsiExec.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: WinlockerVB6Blacksod.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\G: WinlockerVB6Blacksod.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: WinlockerVB6Blacksod.exe File opened (read-only) \??\J: WinlockerVB6Blacksod.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: WinlockerVB6Blacksod.exe File opened (read-only) \??\X: WinlockerVB6Blacksod.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: WinlockerVB6Blacksod.exe File opened (read-only) \??\S: WinlockerVB6Blacksod.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\A: WinlockerVB6Blacksod.exe File opened (read-only) \??\Q: WinlockerVB6Blacksod.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\U: WinlockerVB6Blacksod.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\E: WinlockerVB6Blacksod.exe File opened (read-only) \??\I: WinlockerVB6Blacksod.exe File opened (read-only) \??\W: WinlockerVB6Blacksod.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: WinlockerVB6Blacksod.exe File opened (read-only) \??\Y: WinlockerVB6Blacksod.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: WinlockerVB6Blacksod.exe File opened (read-only) \??\T: WinlockerVB6Blacksod.exe File opened (read-only) \??\Z: WinlockerVB6Blacksod.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: WinlockerVB6Blacksod.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: WinlockerVB6Blacksod.exe File opened (read-only) \??\N: WinlockerVB6Blacksod.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe -
File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
-
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\qgAG.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\Mswa.ico xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\wYcU.ico xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\IsMA.ico xgkkoAQU.exe File created C:\Windows\SysWOW64\oUsG.exe xgkkoAQU.exe File created C:\Windows\SysWOW64\QcsO.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\ikki.exe xgkkoAQU.exe File created C:\Windows\SysWOW64\esYG.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\Mosu.ico xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\GgMu.ico xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\iYck.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\kcgG.ico xgkkoAQU.exe File created C:\Windows\SysWOW64\GEMI.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\ycMo.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\iIoe.ico xgkkoAQU.exe File created C:\Windows\SysWOW64\qQQK.exe xgkkoAQU.exe File created C:\Windows\SysWOW64\KUES.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\CYUC.ico xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\EcsO.exe xgkkoAQU.exe File created C:\Windows\SysWOW64\YoUq.exe xgkkoAQU.exe File created C:\Windows\SysWOW64\GYkG.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\WgIy.ico xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\qsoc.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\CMsW.exe xgkkoAQU.exe File created C:\Windows\SysWOW64\EcsO.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\gEoq.ico xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\qgwe.ico xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\mYUe.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\mgsW.ico xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\QcsO.exe xgkkoAQU.exe File created C:\Windows\SysWOW64\GMEo.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\esYG.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\AsgA.exe xgkkoAQU.exe File created C:\Windows\SysWOW64\qsoc.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\YoUq.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\oUsG.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\eYIw.exe xgkkoAQU.exe File created C:\Windows\SysWOW64\sUos.exe xgkkoAQU.exe File created C:\Windows\SysWOW64\MsYq.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\YcEM.ico xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\yskS.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\GIse.ico xgkkoAQU.exe File created C:\Windows\SysWOW64\eUUW.exe xgkkoAQU.exe File created C:\Windows\SysWOW64\eYIw.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\GAEy.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\EIIa.ico xgkkoAQU.exe File created C:\Windows\SysWOW64\AsgA.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\wUQs.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\qYcQ.ico xgkkoAQU.exe File created C:\Windows\SysWOW64\wEwE.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\wkMe.ico xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\SUQy.ico xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\MsYq.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\YEsK.ico xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\Ioge.exe xgkkoAQU.exe File created C:\Windows\SysWOW64\ycMo.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\OAEe.ico xgkkoAQU.exe File created C:\Windows\SysWOW64\gQEY.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\GMEo.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\GwMQ.ico xgkkoAQU.exe File created C:\Windows\SysWOW64\OEUG.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\eIQW.ico xgkkoAQU.exe File created C:\Windows\SysWOW64\wUQs.exe xgkkoAQU.exe File opened for modification C:\Windows\SysWOW64\eUUW.exe xgkkoAQU.exe -
Sets desktop wallpaper using registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" WannaCrypt0r.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\!WannaCryptor!.bmp" !WannaDecryptor!.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@[email protected]" @[email protected] Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Control Panel\Desktop\Wallpaper = "0" $uckyLocker.exe -
resource yara_rule behavioral1/memory/5124-1359-0x0000000000400000-0x000000000044F000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Windows\Error file remover\fatalerror.exe msiexec.exe File created C:\Program Files (x86)\Windows\Error file remover\Windows Logoff Sound.wav msiexec.exe -
Drops file in Windows directory 25 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI31B3.tmp msiexec.exe File created C:\Windows\Installer\e5b222a.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI29A1.tmp msiexec.exe File created C:\Windows\Tasks\sys.job MsiExec.exe File opened for modification C:\Windows\Installer\MSI39E5.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF154A055D1B07786F.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI34B3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI365A.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\SystemTemp\~DF9BA7BE2DADE41C34.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI23E0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI25E5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI271E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2DF8.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DFB4B5B27AB6C5ED4D.TMP msiexec.exe File created C:\Windows\Installer\SourceHash{C452D4E2-DE24-48B6-B5C3-ACB240A01606} msiexec.exe File opened for modification C:\Windows\Installer\MSI3126.tmp msiexec.exe File opened for modification C:\Windows\Installer\e5b222a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI2858.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2AF9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI32AE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3D70.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFE1906FEEA9F3EA9F.TMP msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 7044 5124 WerFault.exe 239 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xgkkoAQU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinlockerVB6Blacksod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ViraLock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SporaRansomware.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ViraLock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WannaCrypt0r.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xyeta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ViraLock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $uckyLocker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ViraLock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @[email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ViraLock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskdl.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3308 vssadmin.exe -
Kills process with taskkill 4 IoCs
pid Process 2024 taskkill.exe 2816 taskkill.exe 3440 taskkill.exe 1628 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Internet Explorer\Main fatalerror.exe Set value (int) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" fatalerror.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch fatalerror.exe Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" fatalerror.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings OpenWith.exe -
Modifies registry key 1 TTPs 28 IoCs
pid Process 5016 reg.exe 2080 reg.exe 1572 reg.exe 4444 reg.exe 3640 reg.exe 5080 reg.exe 2688 reg.exe 3552 reg.exe 2348 reg.exe 1000 reg.exe 2148 reg.exe 2708 reg.exe 3784 reg.exe 2148 reg.exe 3976 reg.exe 1564 reg.exe 4292 reg.exe 2640 reg.exe 1128 reg.exe 1096 reg.exe 2632 reg.exe 3008 reg.exe 1144 reg.exe 684 reg.exe 2644 reg.exe 2500 reg.exe 324 reg.exe 1448 reg.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\The-MALWARE-Repo-master.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 2848 msedge.exe 2848 msedge.exe 1760 identity_helper.exe 1760 identity_helper.exe 3324 msedge.exe 3324 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 3976 msedge.exe 3976 msedge.exe 4536 ViraLock.exe 4536 ViraLock.exe 4536 ViraLock.exe 4536 ViraLock.exe 4504 ViraLock.exe 4504 ViraLock.exe 4504 ViraLock.exe 4504 ViraLock.exe 2024 ViraLock.exe 2024 ViraLock.exe 2024 ViraLock.exe 2024 ViraLock.exe 2072 ViraLock.exe 2072 ViraLock.exe 2072 ViraLock.exe 2072 ViraLock.exe 4768 ViraLock.exe 4768 ViraLock.exe 4768 ViraLock.exe 4768 ViraLock.exe 8 ViraLock.exe 8 ViraLock.exe 8 ViraLock.exe 8 ViraLock.exe 2356 ViraLock.exe 2356 ViraLock.exe 2356 ViraLock.exe 2356 ViraLock.exe 2124 ViraLock.exe 2124 ViraLock.exe 2124 ViraLock.exe 2124 ViraLock.exe 4340 ViraLock.exe 4340 ViraLock.exe 4340 ViraLock.exe 4340 ViraLock.exe 5320 msiexec.exe 5320 msiexec.exe 5400 taskhsvc.exe 5400 taskhsvc.exe 5400 taskhsvc.exe 5400 taskhsvc.exe 5400 taskhsvc.exe 5400 taskhsvc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4124 xgkkoAQU.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3440 taskkill.exe Token: SeDebugPrivilege 2024 taskkill.exe Token: SeDebugPrivilege 2816 taskkill.exe Token: SeDebugPrivilege 1628 taskkill.exe Token: SeSecurityPrivilege 5320 msiexec.exe Token: SeCreateTokenPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeAssignPrimaryTokenPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeLockMemoryPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeIncreaseQuotaPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeMachineAccountPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeTcbPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeSecurityPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeTakeOwnershipPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeLoadDriverPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeSystemProfilePrivilege 3912 WinlockerVB6Blacksod.exe Token: SeSystemtimePrivilege 3912 WinlockerVB6Blacksod.exe Token: SeProfSingleProcessPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeIncBasePriorityPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeCreatePagefilePrivilege 3912 WinlockerVB6Blacksod.exe Token: SeCreatePermanentPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeBackupPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeRestorePrivilege 3912 WinlockerVB6Blacksod.exe Token: SeShutdownPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeDebugPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeAuditPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeSystemEnvironmentPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeChangeNotifyPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeRemoteShutdownPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeUndockPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeSyncAgentPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeEnableDelegationPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeManageVolumePrivilege 3912 WinlockerVB6Blacksod.exe Token: SeImpersonatePrivilege 3912 WinlockerVB6Blacksod.exe Token: SeCreateGlobalPrivilege 3912 WinlockerVB6Blacksod.exe Token: SeShutdownPrivilege 6908 msiexec.exe Token: SeIncreaseQuotaPrivilege 6908 msiexec.exe Token: SeCreateTokenPrivilege 6908 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 6908 msiexec.exe Token: SeLockMemoryPrivilege 6908 msiexec.exe Token: SeIncreaseQuotaPrivilege 6908 msiexec.exe Token: SeMachineAccountPrivilege 6908 msiexec.exe Token: SeTcbPrivilege 6908 msiexec.exe Token: SeSecurityPrivilege 6908 msiexec.exe Token: SeTakeOwnershipPrivilege 6908 msiexec.exe Token: SeLoadDriverPrivilege 6908 msiexec.exe Token: SeSystemProfilePrivilege 6908 msiexec.exe Token: SeSystemtimePrivilege 6908 msiexec.exe Token: SeProfSingleProcessPrivilege 6908 msiexec.exe Token: SeIncBasePriorityPrivilege 6908 msiexec.exe Token: SeCreatePagefilePrivilege 6908 msiexec.exe Token: SeCreatePermanentPrivilege 6908 msiexec.exe Token: SeBackupPrivilege 6908 msiexec.exe Token: SeRestorePrivilege 6908 msiexec.exe Token: SeShutdownPrivilege 6908 msiexec.exe Token: SeDebugPrivilege 6908 msiexec.exe Token: SeAuditPrivilege 6908 msiexec.exe Token: SeSystemEnvironmentPrivilege 6908 msiexec.exe Token: SeChangeNotifyPrivilege 6908 msiexec.exe Token: SeRemoteShutdownPrivilege 6908 msiexec.exe Token: SeUndockPrivilege 6908 msiexec.exe Token: SeSyncAgentPrivilege 6908 msiexec.exe Token: SeEnableDelegationPrivilege 6908 msiexec.exe Token: SeManageVolumePrivilege 6908 msiexec.exe Token: SeImpersonatePrivilege 6908 msiexec.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious use of SetWindowsHookEx 26 IoCs
pid Process 2632 !WannaDecryptor!.exe 2632 !WannaDecryptor!.exe 5636 !WannaDecryptor!.exe 5636 !WannaDecryptor!.exe 5228 !WannaDecryptor!.exe 5228 !WannaDecryptor!.exe 5804 @[email protected] 5804 @[email protected] 5852 @[email protected] 5852 @[email protected] 5596 !WannaDecryptor!.exe 5596 !WannaDecryptor!.exe 6084 @[email protected] 6084 @[email protected] 6120 OpenWith.exe 3468 @[email protected] 292 @[email protected] 5452 @[email protected] 860 @[email protected] 6444 fatalerror.exe 6444 fatalerror.exe 6444 fatalerror.exe 236 @[email protected] 1436 @[email protected] 5632 @[email protected] 5940 @[email protected] -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2848 wrote to memory of 4664 2848 msedge.exe 77 PID 2848 wrote to memory of 4664 2848 msedge.exe 77 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 764 2848 msedge.exe 78 PID 2848 wrote to memory of 3712 2848 msedge.exe 79 PID 2848 wrote to memory of 3712 2848 msedge.exe 79 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 PID 2848 wrote to memory of 956 2848 msedge.exe 80 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2640 attrib.exe 908 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\detection.html1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x104,0x108,0x10c,0x100,0x110,0x7ffb6ec53cb8,0x7ffb6ec53cc8,0x7ffb6ec53cd82⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5828 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3300 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3872 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6516 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6208 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,7486532205689848110,7987959379990115064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:7160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2252
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\SporaRansomware.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\SporaRansomware.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Windows\SysWOW64\wbem\WMIC.exe"C:\Windows\System32\wbem\WMIC.exe" process call create "cmd.exe /c vssadmin.exe delete shadows /all /quiet & bcdedit.exe /set {default} recoveryenabled no & bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures"2⤵
- System Location Discovery: System Language Discovery
PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\USC21-C9XAT-OTRTX-HTKTO.HTML2⤵PID:3440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffb6ec53cb8,0x7ffb6ec53cc8,0x7ffb6ec53cd83⤵PID:1620
-
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4536 -
C:\Users\Admin\TgkUYYAk\xgkkoAQU.exe"C:\Users\Admin\TgkUYYAk\xgkkoAQU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:4124
-
-
C:\ProgramData\KOcUocAg\fgMkMoUs.exe"C:\ProgramData\KOcUocAg\fgMkMoUs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock"2⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exeC:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock"4⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exeC:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock"6⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exeC:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock"8⤵
- System Location Discovery: System Language Discovery
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exeC:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock"10⤵
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exeC:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:8 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock"12⤵
- System Location Discovery: System Language Discovery
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exeC:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock"14⤵
- System Location Discovery: System Language Discovery
PID:4512 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV115⤵PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exeC:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock"16⤵
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exeC:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock"18⤵PID:640
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies visibility of file extensions in Explorer
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1000
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵
- Modifies registry key
PID:1096
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2348 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV119⤵PID:2112
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mSksUkIw.bat" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exe""18⤵PID:1680
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵
- System Location Discovery: System Language Discovery
PID:4776
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
- Modifies visibility of file extensions in Explorer
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2148
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
- Modifies registry key
PID:1448
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- UAC bypass
- Modifies registry key
PID:3552
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\toYAcoQw.bat" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exe""16⤵PID:3800
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵
- System Location Discovery: System Language Discovery
PID:6864
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies visibility of file extensions in Explorer
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4292
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
- Modifies registry key
PID:5016
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VqgAcQgY.bat" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exe""14⤵
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:1064
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:324
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵
- Modifies registry key
PID:2500
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1128
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NEQkwcYs.bat" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exe""12⤵
- System Location Discovery: System Language Discovery
PID:800 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵
- System Location Discovery: System Language Discovery
PID:3236
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies visibility of file extensions in Explorer
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2640
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3640
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FKEosAQA.bat" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exe""10⤵PID:2112
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵
- System Location Discovery: System Language Discovery
PID:3228
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:4444
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵
- Modifies registry key
PID:3784
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
- Modifies registry key
PID:1564
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mAssswsc.bat" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exe""8⤵PID:3932
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵
- System Location Discovery: System Language Discovery
PID:4040
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2632
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3008
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eyIscAIk.bat" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exe""6⤵PID:892
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵
- System Location Discovery: System Language Discovery
PID:3652
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:3976
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
PID:1572
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
- Modifies registry key
PID:2708
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IIIYwgMU.bat" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exe""4⤵PID:2672
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵
- System Location Discovery: System Language Discovery
PID:4796
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:2148
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
- Modifies registry key
PID:684
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
- Modifies registry key
PID:2080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hgkwogkQ.bat" "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exe""2⤵PID:2392
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵
- System Location Discovery: System Language Discovery
PID:3308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\WannaCry.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\WannaCry.exe"1⤵
- Drops startup file
- Adds Run key to start application
PID:3516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 36341738422429.bat2⤵PID:4060
-
C:\Windows\SysWOW64\cscript.execscript //nologo c.vbs3⤵
- System Location Discovery: System Language Discovery
PID:3260
-
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\!WannaDecryptor!.exe!WannaDecryptor!.exe f2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im MSExchange*2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Microsoft.Exchange.*2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlserver.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1628 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3228
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlwriter.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\!WannaDecryptor!.exe!WannaDecryptor!.exe c2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5636
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /b !WannaDecryptor!.exe v2⤵
- System Location Discovery: System Language Discovery
PID:5644 -
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\!WannaDecryptor!.exe!WannaDecryptor!.exe v3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5228 -
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵PID:6980
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵PID:7000
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\!WannaDecryptor!.exe!WannaDecryptor!.exe2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of SetWindowsHookEx
PID:5596
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\WannaCrypt0r.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\WannaCrypt0r.exe"1⤵
- Drops startup file
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:5028 -
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- Views/modifies file attributes
PID:2640
-
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 90941738422431.bat2⤵
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\cscript.execscript.exe //nologo m.vbs3⤵PID:7096
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s F:\$RECYCLE2⤵
- Views/modifies file attributes
PID:908 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1064
-
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5804 -
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\TaskData\Tor\taskhsvc.exeTaskData\Tor\taskhsvc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5400
-
-
-
C:\Windows\SysWOW64\cmd.exePID:5336
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]PID:5852
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵
- System Location Discovery: System Language Discovery
PID:7088 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵
- System Location Discovery: System Language Discovery
PID:1800
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5464
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of SetWindowsHookEx
PID:6084
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "tgikesyrkli880" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\tasksche.exe\"" /f2⤵
- System Location Discovery: System Language Discovery
PID:6428 -
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "tgikesyrkli880" /t REG_SZ /d "\"C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\tasksche.exe\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1144
-
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:360
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7116
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:6956
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]2⤵
- Executes dropped EXE
PID:6768
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]PID:292
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:312
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]2⤵
- Executes dropped EXE
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5452
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5380
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5888
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]PID:860
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4044
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]2⤵
- Executes dropped EXE
PID:6776
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:236
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:6536
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5336
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]2⤵
- Executes dropped EXE
PID:1540
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5632
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5052
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskse.exetaskse.exe C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]2⤵
- Executes dropped EXE
PID:5900
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]PID:5940
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
PID:6496
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\WinlockerVB6Blacksod.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\WinlockerVB6Blacksod.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3912 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\WinlockerVB6Blacksod.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ EXE_CMD_LINE="/exenoupdates /exelang 0 /noprereqs "2⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6908
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Modifies WinLogon for persistence
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5320 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C766D8B967DE38D28DA2C8C948A0283C2⤵
- Loads dropped DLL
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:6844
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D77E7BA0BFA3CC14294A227F79EAE266 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\Xyeta.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\Xyeta.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5124 -s 4722⤵
- Program crash
PID:7044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5124 -ip 51241⤵PID:6788
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\$uckyLocker.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\$uckyLocker.exe"1⤵
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:6932
-
C:\Windows\system32\cmd.execmd.exe /c vssadmin.exe delete shadows /all /quiet & bcdedit.exe /set {default} recoveryenabled no & bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures1⤵
- Process spawned unexpected child process
PID:4452 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:3308
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:2336
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:3904
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:5740
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6120
-
C:\Program Files (x86)\Windows\Error file remover\fatalerror.exe"C:\Program Files (x86)\Windows\Error file remover\fatalerror.exe"1⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:6444
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x0000000000000500 0x000000000000048C1⤵PID:6548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1File and Directory Permissions Modification
2Windows File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2File Deletion
2Modify Registry
7Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD58e7bc14dc2a25f320fd08041e3a1371b
SHA11854d82f39d1e4879cd08d4f8ab5dd6e37a505dd
SHA25633d260036c2488e2ce2b90fdece3395458bd18c42b93e01c03899b37e24d45fa
SHA5127e3adf460714fa133a232fe0354734f329668452c1e3071ce49e743a88548820675a36fa719b0c8fa61f1deb2b7504d7c48ce83450149eab432a5c153b34318c
-
Filesize
179KB
MD57ab1a67b2fccc7ca80740cb0160ac6d6
SHA1898f5b3a2d9145a3e3c06a59c5ea7d9c7c89a706
SHA256fbf58f600004392ed358b7a543d54a0e2f131523a00802aa444c20f1f76fb9b1
SHA512a0e70123af65544518d9e0f28590b164f7ba4dfe28d73fe91d90231318e517a143a8aedb2c92c327f3f80127d23bc51343a2373f3f8bb104aa11da21aca29272
-
Filesize
238KB
MD56752adb0443fa0a8e29c8c9ce62a5f85
SHA18a84dbc333beb7cc6dfaacf43b41accacb4c6e40
SHA256269009850eab46eda04cecf5e96b20f8ed4dd5e59f95576a2b009d9b3687e752
SHA5129062e36b1e671ade4984557ef6cacea5806fefa126a2390bf39eea4e9c6362cbda7c7079ebf4b797c061f06d07d57594be9244d610ebf98df23e3ab3bfa03979
-
C:\ProgramData\Microsoft\Device Stage\Device\{8702d817-5aad-4674-9ef3-4d3decd87120}\background.png.exe
Filesize323KB
MD5003300e1006145ebb1993e8088ff9586
SHA163ee747b47b2e40535ccaa3ecf1408c224cab22d
SHA256cd9dfd3abd543c5e7b2da08883b4dfa83ed8c12c34dde89f127a9797ab546301
SHA51251f040dbff7c22a2269ff428ddd625dbdb0de49976a43abd616ac51351c8f928399b3ff6c2418899f0062252aaa71ff2ad9f97e3c5fb92509621c053f73fcf6e
-
Filesize
838KB
MD572949c8189966f673a4db965a97c1566
SHA1e7420d47ecb16ae86616deba1ba2ae7294bc5baf
SHA2565126532a82222ee46d00334be4dae2a8f07a4603dddebb36e6823b0d81232bc1
SHA512bab38d40a922c35c961e4b2f54fe922de6a9d1c262619eddcdffecfcdf0be73791aff71ce38c32c60fb65c431a985048bb456abd732c34c72cfdfbdebf97dffe
-
Filesize
818KB
MD564ffbeb18cf41185221946ce72e50b0f
SHA11ade0c8c1f83707a5196b2c78d823da1415045ab
SHA256097c6acb8e4f95c6e48696b4a43c34d13bafe57ef69c8f2f6de61607bec13663
SHA512eab2cf902cd10f1911993ecffc629096a5eb113d55ef44ba11641804b37147dd82ab7392f35027c890534352ec5b63262d909698ad34637b6092892298995b30
-
Filesize
152B
MD5554d6d27186fa7d6762d95dde7a17584
SHA193ea7b20b8fae384cf0be0d65e4295097112fdca
SHA2562fa6145571e1f1ece9850a1ac94661213d3e0d82f1cef7ac1286ff6b2c2017cb
SHA51257d9008ccabc315bd0e829b19fe91e24bab6ef20bcfab651b937b0f38eec840b58d0aed092a3bbedd2d6a95d5c150372a1e51087572de55672172adc1fc468a7
-
Filesize
152B
MD5a28bb0d36049e72d00393056dce10a26
SHA1c753387b64cc15c0efc80084da393acdb4fc01d0
SHA256684d797e28b7fd86af84bfb217d190e4f5e03d92092d988a6091b2c7bbbd67c1
SHA51220940fee33aa2194c36a3db92d4fd314ce7eacc2aa745abec62aa031c2a53ba4ff89f2568626e7bd2536090175f8d045c3bb52c5faa5ecc8da8410ab5fc519f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD599df65dc17cdd9875802c558de75a7b3
SHA1b33be5b64245e248c193e5b9f770a1fde45b5037
SHA256ac923742a04e70eddb0af8fe10d1b45c7fc567b371ff6eb08a7c783fa9165a57
SHA512c0e0a4c3234afabf92ff85a59811a95c6a2ae2d878f70a73d314cf5f8410a670a4f3b47b5fb1946503c86155729f82ae75b3b3583cdea14e3808d256e3179b3a
-
Filesize
1KB
MD52ff42633db25cb7a68248bc5605635ac
SHA11f124b799e9ee0b604e467a40679def8201acb41
SHA256be4528af2fe5e8153d4c4de953dc0d01801baf038a8810dfde7ae90569031b6f
SHA5127a7d1ece5564eb0f7b4ce57af95ee0690faf5f23d61af5ee6d5a8a66cf7f223c6af32c2339633e88731a22a4d1368e1ff7cf4c6d4778aaad5f2305ebbe1f7620
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD517cedb4fe3ed55e9218070f58458e1ee
SHA1be0a8da2aa40e80d0ea30e357375264651f8c17e
SHA2562bc9eaf7d5ba81b1377f3fa627737ea11e7f08bb22d0b904e952d45fbf825219
SHA512bb02c73a3a5ae416d719aa8220b9078e425f6d86fc94e699a0a0d871c4295c9148b64b8ffabd6dc3fd05cd32e4b536b5ce79563074e7d16bd5572ea8ff034e9b
-
Filesize
6KB
MD5d608f7ff4df99ab241f006d4e8403dff
SHA10acb87cb6cbc783c4add4f66d52f307729a046f3
SHA2569903306bc07b3f208c88a8d2c91e75080c7cf11624aeb4edfe00188d4f3be2fb
SHA512c1524d8fec3236a680a5e55f0b8a2dcb6eaf07b00afd43d6760131c0500ce21debd12089e19463fd999fcf94381e398483a198d0289e284f81f5186d3dffbeaa
-
Filesize
6KB
MD54a6ddcf5518f73438c88c0ed747b34b2
SHA1baba5efb3374074ec250b8842f831e02d14bf140
SHA2569dc3299edfde9b01a652f1e1f267b818f9048b4179916838df90485f5ee10e7c
SHA512cc07ed3833b80afc0b5b181046ad82dd7e4b6a773eb0cc49811a744a62a6f162d17c79c8c673d77e396e12e8913c64b7e892c0cf797c96f8b93716bab77b7011
-
Filesize
6KB
MD556322b8161aa0a80c24d0cd57e8e87e0
SHA1ee1373bcdab6797435b4a1f52378fd95c0800c29
SHA2566c6dd857da55c89ae96bbb10a8cedbba5ee60cfa44283f7d1c087c7892f8b9b3
SHA5122378e3dfe5c518ffa18ffa7d35af1b0d0df01c8c10575e9cb377bd798e4c6213f9ff1b5f96b1baffe6cd94ee9091aae80a2218773a2c738eabf7da529ffcfd18
-
Filesize
1KB
MD55fb865be4ba366e073e1aa6f3b9dad70
SHA182435ab7d5e7389791ba40bdee4b8011a848da2d
SHA2560003dad800523f05baccf661ec72adaabc36119687c58c5f44e2f8e6a33d92eb
SHA512f08ee7d2b616d1b2549ae486a15b03636385558a27130cdb5661b31170957686744520f282a71ce7833141b3e62e88808a089e082d52469531c375d37c19a5fa
-
Filesize
1KB
MD5c7d0721e6560948d6a9ceb661e9ef0b8
SHA1574ac23f253a4a990c9a379623ef71dafc2cec6d
SHA25618107b8bd3b3b404a57bc182c24e3ee6dd2a246af08ef3629039672488d9dab0
SHA512c91f4f9e4f23526d04ac99749d9f36653bb5aaaa451dc2ec9218ad34361c725434a8b79ebb5de8491628eba8369f9d52b7cddcda05f3cba11deab878b3d22709
-
Filesize
1KB
MD55cf321e61c5dce515311ce6b17a8c188
SHA13959856a6bd3bf03a360641a6bb87d457fdb8577
SHA2562aba5ee9431a2df46fddb1fdad1b2b4a7235ae5c058afb66ea8784b14c8e578d
SHA51224d86bde410aa885e2c98c7aa07425d5f9350c4c275e2986280f0451075fcc73166533a46087177970ff8be1d245af71d18d09da174a4d913baf536485a11ae3
-
Filesize
203B
MD573cebd290f620d4b0eb1082673438bdb
SHA18f7a0f16f7d7268a0778a27114d596d29da74f1f
SHA2569afd86c946d08bd908873241f3675d90162b374e41e8781abd836df6c7e0c1a0
SHA5121b359c3305bc446a4c9c114c94e1d1a11a51565e28e29d0f577ad1b713351f2550d0c402fd8bde811158fa3640720047d96bb1d95ca1bb2e5aa4fceecc13bee2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59156b3a3a853ec71ddf6c8873d8d73eb
SHA1dd7763fed6ed5b78041b630530010e7b91c591c2
SHA2565a601a8f3342aadd43b932e634b739b35b1009392f2a514e6eb73c7f49455fb2
SHA512f5d2462f7aeed29057d96a79da0f309075d15075f4b2dea085b8912ebb71e326592a664b2f91624cb227939afac1290d922dffb4bb4c8354db9bf1b5ffb68fa1
-
Filesize
10KB
MD5555ac4087887ca1d018f04fba2574609
SHA116a2a849a2e31e4015b170435eafebe3801d8138
SHA2562fab0c598337a71244c03f589c1989325ab52d58fb90f4e6b8f8099c6eda4a4e
SHA512ccba7b8d63db79a4bbdc424bec8ce33dfa3758222d56a1cd3ab952ae2d387e87d3332815cc41db31111bd51e2630fd6ae1b41e08f6f2f17939fd8444959b94de
-
Filesize
10KB
MD50dca492dcd5ce8020ae432c1e20fbaa5
SHA107a0cdfa8517ad2e25cfc84cbf7a9aa15c0a73b8
SHA2566099def2ef052d01083a90ea517a0bfae17faa823af3f4adfb2c6af9c251211c
SHA512f61e7f686852e52208358b8187588809c611bb4c187480bba3ab22a238a914617792c463f7887988c06a6c325c260d3e67d50cb91648972f1cb9a3b8ff935d08
-
Filesize
11KB
MD5992b081e3b19dc6398ddaa2e3941b0ac
SHA1dad9639751086f51d7d5fdf1eb5bf613478d29f4
SHA2568f51df9f071e4826aaaf2912b7029cd4a6797348d7237198275aaa11ce357425
SHA5124138ec0fdb361f83f74afb8180ea5133437d3b9413cb48dd88c0993e90b95bbebd498a005a97059b96f02169ae24af4f5d55b59946e81ef7400e39bc61a8711e
-
Filesize
84B
MD5d4ac6cf0c69bc7a1bd9f3102e4663a9c
SHA1424bdfb2c137663f33c4ba306bfb4f69a99e2f63
SHA256ab485b2bec42445a066d306010803ed4bad51151ac3da931b4f4043e29eae6bc
SHA5122b16031e5d43f18de601feba1eccf51aaf11dc1830a154ddd10552a9f32bf8202ca06fd5373a6045f94556c27403131c3357ab2dc1c063dda3458538ec7f16fc
-
Filesize
84B
MD5df7a122d9b2f36e8e0554587909b9fff
SHA1d51630656ed6249a782d3676f447737ab9f7e2ab
SHA256ef142b09342c90ac9438aa97dd7685bef8b9f687c042b5e3eb987506e86d71a0
SHA5129a246b14f2e02b8e64e58d9bb39eb10ea6389e664b2d91a1a35cecb512ad1247d77e275bd0c105f41ac622885bb89733553dad4579e6a42c07dcb5b2b9810948
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{F85582CD-32BD-4EF5-9628-06446481E4FD}.session
Filesize4KB
MD56386e01ee397940499e5a80f7f398ed6
SHA1de09f79a3db0cf7a5c02a1189ea70c4feb3725fc
SHA256cbd0190283e30d251dd1a02f252d1329fe94b9e6e5a64ec9d65e2e0d557c0ab6
SHA5129f7876d323a9e65ead7ffa8fb56e389967a38eae9f833272cf008c2bb90b388635c7823ac3798daa3ad651dea844e00c2f87e7d179c3576858c12c0af1215fb5
-
C:\Users\Admin\AppData\Local\Temp\AdvinstAnalytics\Error file remover\1.0.0.0\{F85582CD-32BD-4EF5-9628-06446481E4FD}.session
Filesize4KB
MD591ae062b409a63478803b76416e06708
SHA17e05be4a2725e3eecee9a50baf4ccb08fff27c94
SHA2565d4290ad595249fd3c36d5948060b9e09e152d654ac6d6bbbe758327c0f6449f
SHA512ca5e0edef06c29045fe21c76400b02d3c3f89c20939e509ef4f3db10872901b9ce1cec80e3a0eded5e456f8b31ec74962dfed94d708746c5209c0d8c396f1873
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\!WannaDecryptor!.exe.lnk
Filesize1KB
MD56f62c03dd85f4a495b8be9b43b78c5b3
SHA1d5faa9d35868fe83ebf4fe559511ab5cd07e0f5b
SHA2564f0dc738d75b3fe8915891245d4d2f59d1f58fd4d3e7dfb5c9c8d3ede82abfd2
SHA512a5f97a3aef77a449b8459608732ab3bf429114096bf02d1461926d78c1c9ccc08e6945a3b6e7e7437fcbc4da46ee28f1294d7c3de7bb6cc4922d6a52e23e0519
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\00000000.eky
Filesize1KB
MD530b193ab44967f401d78a68077a4cd2b
SHA18fb3036e66dbc62578ed5f9e4a96ce577ea4b55d
SHA256bb7efe0f0d1dd4881f23ae1404369980556fe077304c1975b5d92dab2004db08
SHA512f2abdd92cb12cc8232ab906cfcc6d14422ff9e17fd09645acd96834ae70410974b0641483efaa1403509673cce8822b20e2b8b24684309354bf5fb552a648a2d
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\00000000.pky
Filesize276B
MD57683545a3a4e2aafb995f0ab81eaed88
SHA1e5136c3f9a0364052aac6fc2b32f183271202f9d
SHA256b52b9f33550069805e8bd6c5f0ff63fb5460c6186e579561a31bc7bde7d836f5
SHA512c8aa35229641920f0631c6d069a66247682873f57d0b97096a5ab9144aa781592ffc81f487e43ceae0cc3cfca349bce29d94901706e7fc0ab3f5156b7180a56c
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\00000000.res
Filesize136B
MD5c957a34f19801e0591ca27a51f554970
SHA15015dcba831d0bda64a3ae6d0349cddeaaf7c468
SHA256e92260f3cd7dbe60d7babcc243f4422aa26e0c1d7599793600f93ea9060b6ae6
SHA512bffdd63bcddf198af28e992e9b9d6189b16ee06981e958cb992390deaab988dbdd5856edee51c3ff52e7beeee25e5a6470fa0ef6f34514a04f9fdf8d25b79821
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\36341738422429.bat
Filesize474B
MD58c747809f440565ae31ff56fc6ee3726
SHA1ef010d0ba47bd09652b4910e72ddac78e3c76cf4
SHA25638de07ecb4fd6c81a4b4d0d5e9a30feac3bba198eccdee8271fef4ae005dc9d1
SHA512cc3637528185ddc8a3e6b79aeb3945ca67282d9588a552606547bbef88a77e8195e50a29aa676041fb2263651fde4986f74011acbc3eb49923d7f250b01759ca
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]
Filesize933B
MD57a2726bb6e6a79fb1d092b7f2b688af0
SHA1b3effadce8b76aee8cd6ce2eccbb8701797468a2
SHA256840ab19c411c918ea3e7526d0df4b9cb002de5ea15e854389285df0d1ea9a8e5
SHA5124e107f661e6be183659fdd265e131a64cce2112d842226305f6b111d00109a970fda0b5abfb1daa9f64428e445e3b472332392435707c9aebbfe94c480c72e54
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\@[email protected]
Filesize240KB
MD57bf2b57f2a205768755c07f238fb32cc
SHA145356a9dd616ed7161a3b9192e2f318d0ab5ad10
SHA256b9c5d4339809e0ad9a00d4d3dd26fdf44a32819a54abf846bb9b560d81391c25
SHA51291a39e919296cb5c6eccba710b780519d90035175aa460ec6dbe631324e5e5753bd8d87f395b5481bcd7e1ad623b31a34382d81faae06bef60ec28b49c3122a9
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\TaskData\Tor\tor.exe
Filesize3.0MB
MD5fe7eb54691ad6e6af77f8a9a0b6de26d
SHA153912d33bec3375153b7e4e68b78d66dab62671a
SHA256e48673680746fbe027e8982f62a83c298d6fb46ad9243de8e79b7e5a24dcd4eb
SHA5128ac6dc5bb016afc869fcbb713f6a14d3692e866b94f4f1ee83b09a7506a8cb58768bd47e081cf6e97b2dacf9f9a6a8ca240d7d20d0b67dbd33238cc861deae8f
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock
Filesize6KB
MD576e08b93985d60b82ddb4a313733345c
SHA1273effbac9e1dc901a3f0ee43122d2bdb383adbf
SHA2564dc0a8afbf4dbb1a67b9292bb028b7f744f3029b0083c36307b1f84a00692a89
SHA5124226266b623d502f9b0901355ff388e1fc705e9baff0cbe49a52ef59578e1cc66f5026c030df4c8a8f5000b743523ccf18c533aee269b562d3017d14af014f9d
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\ViraLock.exe
Filesize194KB
MD58803d517ac24b157431d8a462302b400
SHA1b56afcad22e8cda4d0e2a98808b8e8c5a1059d4e
SHA256418395efd269bc6534e02c92cb2c568631ada6e54bc55ade4e4a5986605ff786
SHA51238fdfe0bc873e546b05a8680335526eec61ccc8cf3f37c60eee0bc83ec54570077f1dc1da26142488930eabcc21cb7a33c1b545a194cbfb4c87e430c4b2bfb50
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\b.wnry
Filesize1.4MB
MD5c17170262312f3be7027bc2ca825bf0c
SHA1f19eceda82973239a1fdc5826bce7691e5dcb4fb
SHA256d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa
SHA512c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\c.vbs
Filesize357B
MD5d20fdcc99bb6d4f26f0d22266e855c4a
SHA15a3ce3d72c0ce3d857188fc9e26a11076eeec91c
SHA256e1060f60ad87c2bf95f68cda720055265855c878dc9d572872677a2ad1159605
SHA5124f11b2316abbc28d80e77aef1494fae55abcf3bc116429702d32bf423b9b5c9162be63d78361810204a1fbb363c6ab65c000e51c550e36634c0feaf21cf6debd
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\msg\m_finnish.wnry
Filesize37KB
MD535c2f97eea8819b1caebd23fee732d8f
SHA1e354d1cc43d6a39d9732adea5d3b0f57284255d2
SHA2561adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e
SHA512908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf
-
C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\u.wry
Filesize236KB
MD5cf1416074cd7791ab80a18f9e7e219d9
SHA1276d2ec82c518d887a8a3608e51c56fa28716ded
SHA25678e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df
SHA5120bb0843a90edacaf1407e6a7273a9fbb896701635e4d9467392b7350ad25a1bec0c1ceef36737b4af5e5841936f4891436eded0533aa3d74c9a54efa42f024c5
-
Filesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
Filesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
Filesize
8KB
MD57ca65a76c92291270ff91b58b51c23e6
SHA1b987d92201d208d00117e6a58eb2fa1f382e5d4d
SHA256c6c34ca3a0f9953b234b3cde400a2bd7c47ef9dbb8b111e5fde7011ef16347ce
SHA5126210a7bcdb6f11eadb9ffe6b7d2f61f5434f52af181d478465c9844b712a6af0b69d6930133bdcd62429573906a03947272a3ddd3fc4e8f64bcd8ed26f792dd8
-
Filesize
1KB
MD56838250dc6c7d4b1c3a6641361076e6c
SHA17e630cf563be5f71c00785c781b87097d206fb86
SHA256bc8df7b9dfda917ac3171472c26997a98f162c71e20e9fa554b7c9ccc9c8d024
SHA51270078d64e71851d5d5564b46eae8c92f0b6b0fb05770ddbf27eb3f467ca023f99dc0f9e5e718e2f6f331838f191523b81ef427de41d3d7224126a80cf052009f
-
Filesize
3KB
MD5827288760f3832abdc2436a75359ac69
SHA1d28284e3333634b007f39d9bfb58182cc1511739
SHA2563b49eafe9437c8392333087ab21396469a1794e2f58e2633a5dbdbba2505ae73
SHA5122648b126f8817917af51e3c46052a48c033a12e35afbee44a64b4c97c6451ba7e53fd696b38a10313a03e0a8bb65ff0daeea0bcffc8a9af1db890d9f80090f72
-
C:\Users\Admin\AppData\Roaming\Windows\Error file remover 1.0.0.0\install\0A01606\Error file remover.msi
Filesize1010KB
MD527bc9540828c59e1ca1997cf04f6c467
SHA1bfa6d1ce9d4df8beba2bedf59f86a698de0215f3
SHA25605c18698c3dc3b2709afd3355ad5b91a60b2121a52e5fcc474e4e47fb8e95e2a
SHA512a3ae822116cddb52d859de7ffc958541bb47c355a835c5129aade9cc0e5fba3ff25387061deb5b55b5694a535f09fe8669485282eb6e7c818cc7092eb3392848
-
Filesize
126KB
MD53531cf7755b16d38d5e9e3c43280e7d2
SHA119981b17ae35b6e9a0007551e69d3e50aa1afffe
SHA25676133e832c15aa5cbc49fb3ba09e0b8dd467c307688be2c9e85e79d3bf62c089
SHA5127b053ba2cf92ef2431b98b2a06bd56340dad94de36d11e326a80cd61b9acb378ac644ac407cf970f4ef8333b8d3fb4ff40b18bb41ec5aee49d79a6a2adcf28fd
-
Filesize
21.4MB
MD57529b57e01c45edd34db67ac75ee7239
SHA150bfd9491120b0ebe12f9145cd3644b877b04c09
SHA2560f0099667d10f78163c810d63b18d2c0d6988f3ecf0995da5fa87204b19da2e8
SHA5128b101145e93f4490ae5139803a13968c502e6cfd7a0f93551094c7e0ebe5292ff294e1f1c3bad6c71388a2e598b1fbd9c53dc0c6b08a380934526d5765a52b07
-
Filesize
797B
MD5afa18cf4aa2660392111763fb93a8c3d
SHA1c219a3654a5f41ce535a09f2a188a464c3f5baf5
SHA256227082c719fd4394c1f2311a0877d8a302c5b092bcc49f853a5cf3d2945f42b0
SHA5124161f250d59b7d4d4a6c4f16639d66d21b2a9606de956d22ec00bedb006643fedbbb8e4cde9f6c0c977285918648314883ca91f3442d1125593bf2605f2d5c6b
-
C:\Users\Admin\Downloads\@[email protected]
Filesize441KB
MD53348f38bfb57759057bbb3b348b81186
SHA1c7ee689653c07ffd7371d3337ba9df066f0200d8
SHA256e535151695e41d034b85e9dc1092119320f0811de8baf3bda2f3fa70c158bef1
SHA512c0087c047fb871f08eb9260755bd690f66e495260c204cce715a8075969086ac6cf158c5eda16c3dc60113e0bd0ec1e4f8c3e3e4b460cd15ab66260fa77d6a2b
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
C:\Users\Admin\Music\@[email protected]
Filesize421KB
MD51c56b4cf801f6ec3e8f4747db0a93069
SHA11a461bffbbbc35f5b8364b3bfee3c71e049befc2
SHA256d5d80dfb147051f19cfef9fd8164dbab85bcfd837c932fa65dae48c64d412f72
SHA512c97cb4e4db680cdddccb9c56775e447346ae3734e4d04e679d2062275c2232f426081f296ee5b784db188c6133c66ddac02c6997a79edac807d45220eb17ce12
-
Filesize
190KB
MD5e762f38d8a1371512ca53b3a2c2b4a70
SHA1678b9ec83db0915198a2dad0de447740f9d4a1d7
SHA2567de337948457c25730214b54a3ae40ff918d511edf95ac8e6d5ce1939682dbed
SHA512f416b4a20d3a4e87f482f9ea7b9477294215da839442c688b0e1d74683af3c4184c6f1044105f729c58c77fdc87570bde322ce5fe86b8a40d5263298d68e3af7
-
Filesize
180KB
MD5d552dd4108b5665d306b4a8bd6083dde
SHA1dae55ccba7adb6690b27fa9623eeeed7a57f8da1
SHA256a0367875b68b1699d2647a748278ebce64d5be633598580977aa126a81cf57c5
SHA512e5545a97014b5952e15bb321135f65c0e24414f8dd606fe454fd2d048d3f769b9318df7cfb2a6bf932eb2bf6d79811b93cb2008115deb0f0fa9db07f32a70969
-
Filesize
88KB
MD54083cb0f45a747d8e8ab0d3e060616f2
SHA1dcec8efa7a15fa432af2ea0445c4b346fef2a4d6
SHA256252b7423b01ff81aea6fe7b40de91abf49f515e9c0c7b95aa982756889f8ac1a
SHA51226f8949cad02334f9942fda8509579303b81b11bc052a962c5c31a7c6c54a1c96957f30ee241c2206d496d2c519d750d7f6a12b52afdb282fa706f9fee385133
-
Filesize
427KB
MD54cf1e7222bed641cd7c6226786b6f670
SHA19bb2dd7403189a495190e753520f849d507fd24c
SHA256e7a62a456e478135a619708dc3d968f49c118f09a9055415615aa2177fecb289
SHA512e0f19861212e0ca8dde57fe93f7d35ef723d1ba8edaa1a5c1730008755be4db3c15ef56df4a4bdb2d00e49b2a0d39b97a394eb0e4453b16bce2a5d21c149d13a
-
Filesize
442KB
MD5783dfdd0d0bb4d8827373bf2b32537ac
SHA1966012aae9920a26765a118c6ad8d7d9cc40aa03
SHA25679b13a10a8c5c389f5e16c702ce3e17c7ff6e68b1b353f7e9ddc32df0f175b3d
SHA512bf9e269bc62d9ffc3edf356df09a18188b116a03ba7fcf177d64c5b8c2268d725c3494fa2ea0aa9356f04ddfb09fa3b1e342c34ca9d67dfdf6e4f64dee6da8ef
-
Filesize
4KB
MD5ac4b56cc5c5e71c3bb226181418fd891
SHA1e62149df7a7d31a7777cae68822e4d0eaba2199d
SHA256701a17a9ee5c9340bae4f0810f103d1f0ca5c03141e0da826139d5b7397a6fb3
SHA512a8136ef9245c8a03a155d831ed9b9d5b126f160cdf3da3214850305d726d5d511145e0c83b817ca1ac7b10abccb47729624867d48fede0c46da06f4ac50cf998
-
Filesize
434KB
MD515acde233122e8f16f7c13db7ad16d52
SHA16098ae88187ab4ab369f3753f0d458af5c796003
SHA25641aaff970882da0a0b3fcfe19af5d5482a823d26b5ec1f4266afa324a10a156e
SHA51283809c51741b0b3d041f13a393ba08fbf606ed66139e3840322bb70b76aa0bce421b0e23844096ff1d0b0eaabbc71cc83e53651dd25a6bfac55a5cba7df6e145
-
Filesize
236KB
MD5beac75be2fba88235dc0403cd112d3b6
SHA1ab5477068ad8f07c4cbf9643ae69ffa135fc8a5a
SHA256deee4e0562a35692dd2eb6ff1f279ebde2ea8c583122febc383efba7e32f4fda
SHA512a4dc8ce33e7ae0bf1047b8b8a5ff280ce36ecb6a9280d9632639a863233380f3586cc952d57551b6f55646acb6b3af0d26bb170381dc36def43bc2d8ab1624b8
-
Filesize
801KB
MD5681024ce96ea4829f05448c111542bed
SHA154563abfb84118bda6c93acfb16433467ba6046a
SHA2563eab827450fcf77fad1ae193fe4e8eccf3ca7de8e203573b2294a96ea226f584
SHA5124ff4206f0f21f292486a03f02e7930d6514f2b2a85c06d49f5a867147ec60f9ea1fbeedf33293509ca1f35d84251ab25bc9c76e19ac855a3f6ff273705ed78ba
-
Filesize
313KB
MD5312ff4586b6c67b38c386213f6fe25dc
SHA114287d5d1985a44f16b9bd9b01fb98119b224ede
SHA2561ea54795247726fdd29bb4b300e36b6f07ec342248ef1e1ba373716a34629440
SHA51252e6aaa15238ad2d9294bd060762927d61be27e781ccfa25884d61a545ee150bd41b110c319d81e775a0ce333e4ff42b30c029e74486c7ba9342c85e18e9342e
-
Filesize
792KB
MD5469f233d10ca01b5e56fa36248fc559e
SHA15832fd59a5983894e8d7ab171abf00e7955e564d
SHA256ec1ef48f2ccc122eae5300552f3ccb858ca71ed1ad61ac37b7581f76871fce55
SHA5122f55b597f4f9d9b415f86466c5110858309e3d088af1142f9676243795277668d2fbc3bfab052b190924a5f2740b210c9906edb7e564b89af982304ddf9d3fa7
-
Filesize
212KB
MD563cf9d9378d7ec4c35f5dc0c3e85500e
SHA1907bac464191e0e1d85aa060889cbf5e7ef778fe
SHA256ce3e22a88c70047a6ba1c551feb59c072aced4c43769c27e71acd52c3a4c3974
SHA512ec1e789b303a70ad164fccd21a5e0e3d5feae3ded533d9fdd525352138982a4f486210e57b46e36770d670d3a710288a07dae4507b869ac87052fe8a653e7c62
-
Filesize
224KB
MD5da6be6a6835ab64f0f56675267a56298
SHA1b5ba0b043e5ee994e1dc6f7098bfb6188bb0752c
SHA256f31ec8897f67684002bf52e1fd475881fcfb8e255d48f10bebafa6558f85807a
SHA5127a4cf6bdbfde1f378145e13e1938991c0e8afa0c72c36e575dea40b5d46798ac90bdd4a9edf57c85c8918992df043e2d606dff9d440cd6ffc5b3d21f2f2af152
-
Filesize
316KB
MD5c0ec61b52161f11b41c7c3770365e499
SHA13d190064692ecad365093f624de8f32107a5abe3
SHA256666d86b4a74ffb9052c8b2e33a7dfdd4535c7cb2460a27b77b0deffeb2339e7c
SHA5123e6f4c27cd86785f28d103f0cd37cd9ca54112828f0294391d263d7262e523e544caf11f5b6ac1a1389bb48217a7db5109276759b1f96c2139979dcdbcbe8de3
-
Filesize
425KB
MD5e41afe43aba2947af1e6baaabd00bae8
SHA19dbaa5c1ac8c5a5dbbd39da6f4ff6bad4b452029
SHA25624f6f7169be228948f524dc2e319c522c30510edfa72687d2feeb34cd0adc5ac
SHA51232eeeef5c2c473711ac2d3d1362da8d8b6de7486b7563861e6e0ea9cb162af13ffc4c79890745ed11dd3bcdf7a375daec089411504a3fd61952ac696d58e9e93
-
Filesize
4KB
MD58ff64aadbcb8620bd821390e245fa0e6
SHA14d03910751bff2987d165c7c43e52851ae064239
SHA25638d6a9052a4fa9fbd656388704522cb851247c32650c387c19b15cd28ff3b6fc
SHA512b5d4dc4bea4ca5c7238d875f2f934f5813b97100e364a16c4c6bc800e9a6df06a3075d7807d8ab42e551faa3f8a870b21abb61ae4816ef95f0e7163df5f62ecb
-
Filesize
797KB
MD5291c429a6be2cc0e14b198959948b378
SHA18b7a93da5a513a55da01efa83cd316562580547b
SHA256b3ab9f531ef9f2533b596baf7d51d14baeb18c3c9b9020b64e0a22dd35cf30c8
SHA512b35c36a85de5675a2d4a0b69b687d7aed9b31c6fef2a8799c2938ba22dabb9c368d7688bf6d2a1c8a030d30d3fa87b0f621a9db79f16b1ecd4d419a228485939
-
Filesize
418KB
MD5f8d71c52c4fdfa04a3244d4fc0d34055
SHA1f27709320b513029ebde5411b20a681a848c9510
SHA256ffd2f7c29a33801e6bb93d868b4f007cf64e9449cd4a1cd0733b2615224d2279
SHA5124f32b8e8425799dc3430f9aced5b16ecdef2e5d19b1f2ea22d00134d66614aa756bcc7ea5b0442bd9e5d5889b9a734723e01cc93b9380623fd517f985b7a7b7d
-
Filesize
226KB
MD5c4192027577a205612be61dcdc0728c4
SHA19a8b37707e0cdf52dca5d8a038f7d2eb77bcda1d
SHA25698fdda0198bcee9b743ff8a55248150c3d8eb0d0296129fdeade465c1f149b3c
SHA512d67adc4f0aa0b37c96f2b4c1e4a40329c596fbec2842dbe18268b9e9cf3597e0a946ad654df86015470a745c25c125799733fd4c0c466b201b3031ff3d7961b8
-
Filesize
637KB
MD5adb65592f085be4e7fdb165a9779b88f
SHA14ac324da77725edc296563cbfdc8d50d0867509e
SHA25673dbc8dbf4ee9ff463af7b09972b241815080b72d3182848673d92dcb1d7cd99
SHA512c8063438333abd0b025769e3bd487738ec762cb255244f69a67ea83de9e58f3c94124879ccb7772852b8625915fb6a81f79a702a9c7ce06ad6c326a6663e7171
-
Filesize
217KB
MD53a55dcc48aaadab799f96d822586ef0a
SHA1ad8d8fa075100ae80959e024405fab0392c3f16f
SHA2567af56aa0644e35c922da4e216c421a16159079a0a3470e3f00e85ae6fb09c9ad
SHA51246ea201f544420883885b30ab5510bc0bd67291bea8f698caa87aac37f856f8868e6ed7bf62d3282e7c292252c77a35b5b65e704b840cfd464ed83ef976bcb9d
-
Filesize
4KB
MD59af98ac11e0ef05c4c1b9f50e0764888
SHA10b15f3f188a4d2e6daec528802f291805fad3f58
SHA256c3d81c0590da8903a57fb655949bf75919e678a2ef9e373105737cf2c6819e62
SHA51235217ccd4c48a4468612dd284b8b235ec6b2b42b3148fa506d982870e397569d27fcd443c82f33b1f7f04c5a45de5bf455351425dae5788774e0654d16c9c7e1
-
Filesize
1.6MB
MD5896380679e758675c2e25cf7ddad778f
SHA1598cf17636a4edc7df71fc5d195d8268766587a4
SHA2561e8f6aa557020eba154c7e7d9411d7aef093f343ef50c32ff90aa24e8f5c7af6
SHA512f07484afda839c72ba6a44be6429f879ee54ea0fa73d5ddbdef86641b4e36942620657441f890622bc3e318d48a00c92539359ddf1a50fce9f7f9f286f329acb
-
Filesize
645KB
MD5e2efcdf9ac2181096fc9a2374ee8cbbf
SHA155b4f7acaf8d8a82d0cc9bee2dbd37eaeb9ffd77
SHA2564b75ec6c4986011b37f988923578d09562ae44c229058d374249de55e79bf48e
SHA512fb6660f19f17628cd769c97f225bd49a8422d856ca6d788d2e5892a6f7df9096af08693b8cd11b6c2c905632147b9892acc86bddeb33bd3e369b0861770f4889
-
Filesize
328KB
MD573ed900548adc0be9d45da6a9c876ee2
SHA13c5479ef9959c1ff8ae72e5417d0dd64b60593a4
SHA2560db5c1661b8408f3e8a207b48ca6114769cd3144fa15b7961c49f5ded6b051f7
SHA5122a20694a48bfa9f6336a61530db7686b7043cc8fe6f309fb570bd42df503176a7a71ee40da23f711b5bc7b77afa0c3fcbfe6e1ca6cb7554d11447d2a0f99f351
-
Filesize
4KB
MD5d4d5866fa12a7d7aeb990ba5eae60cb1
SHA1a1fdfc36c9500844fe0c4554fd60cc95808bb9a8
SHA2565388384511211df8aa81844cff67add9646c8196456f34bb388c2bceecf5f2b4
SHA5127e8537da4047e751e3613bd089014d6ba3f4418a6d8f71c2cfdde146c0ef83895e74417ef19c30a63adc1d38fe0c1f8fdee3f2eb5bb0146e5043f06c73dba06d
-
Filesize
648KB
MD5b6b0583e8e30b24486285ce977ffc29e
SHA148869941a714906636ba626f5a573255f38b0f93
SHA256014fc005dc489ea62b7c85d883124053b6465855e0cfdf6dc65045c374b1274a
SHA5124a972e479fab32711b5190bad512883ff3d2a1f046ef8e96ae5853fdfeac612f7d215d7e8355ce9eb70015aec3953db8d50aea43bdfa68566306efc46ba1782f
-
Filesize
217KB
MD51fa94661606c800f07cf489be5854cd3
SHA1c8e4e2de2f6a7c44ae96ff17c6efd1fe18dea044
SHA256665fdd4473044ecb4e26913a65890b4476979fd0d50b4e7e58e3ec41296f0862
SHA5120916e1b52889a07a0e435ea0f79c9fcef50b49e35cc03c06114d8928a7f0a043ace82d30377dc936eb9f4c663a9204368e65820ff7622ccd126b381880a96cfa
-
Filesize
1.6MB
MD51ae3fd145762a45c8e2b940db2f25078
SHA132dc578acb843eafd2c5d510300dc1d5aec5d50c
SHA256500c1af836f717090cae3adf86934314ee77b20db50f5aacbf9f7898817ff007
SHA512a877a3b43c7e83fcc6d5930a3853d301b52fdfedaeb0f324d84b3af7ae4f611710dba7b514e5acfaf822e2b730f6e57bb0674b13e92997b61f621f66b8ef6889
-
Filesize
1.8MB
MD59fc5478d4af6f17aa38c62959fe576f3
SHA11437eec99887bd09aadc9bc13d5a990cacacc016
SHA25637dddf3bc20d28ca2498a0f56569c3a2bb0667e2015455b749e860aab1624947
SHA5128019b188ef7f34c250702c8b01459e65b26be49a18bf4f6121288a15673674279e81e29b391d33838fcbf389ba032aeb08d7d70d7b43cad4f7666bf0a834c03e
-
Filesize
233KB
MD52fe0b8757d6db145c07d38fa39f50f6d
SHA198060594297680629a3545885bb459d1cf089a75
SHA256e70afcc022c2c90dfebce40985422db81a6107c55f6c91252cf667309f03a43a
SHA51222b9419f3171b409fef01b353d727c9ec38997f7b11c875a1ca33b5ffc60a907aeed1e4ae80296e9f523d9585891c6b016b13dbbaff1e0a6760b66f22e858c63
-
Filesize
651KB
MD5ba22134730059ec8ce60f87885c8fdbc
SHA1675e414f09e311dfb600830d7cd48a9cb27985d8
SHA256b88461bfc80ba08024bceb634b7357195dad038ec0bc1bf9b947caa083cacf1d
SHA512d4176af175e3cca8152476fc57582abc7a764a00662614b69fe7346e26ae5575a1323cdbbc19b4ebbbaf10affc076dfdb23ada1bec104e0928263b4961cc4a2f
-
Filesize
187KB
MD5c9ebfa62ac79a26174694f32746e19bb
SHA14c713c7a47c6bc41199f9bd6ca7c576fa48cd720
SHA2563026ec72a97ff07197817ac8030d18d43252563e2ea5deaecc4a30c202844bec
SHA5120d608f2f066953de2a620ad9cb51989de2bc143b9881101974a9aee681d0e82c60d86b0d8dead662942625cc9a5aeeee64c66a3222cafca6616141217be265a8
-
Filesize
627KB
MD53a3e94b4c68bc02aab02e483dceb7434
SHA154d38aa1b0b5ebb4b597ab6baaeca166dccfa4f0
SHA25635c1ecf3d0137a869c0fe3fb334736183462520e8fa4f7a45190386aa09e7d57
SHA512197282fee0827273b0d5e417ac83a6df779fec4f9622208ff31dbb5af7a2a16f3c23b2b914c8cb4bd427fdd6798fb79d3089ddb3796fd0009d139970f1c548c2
-
Filesize
425KB
MD55ce81d527fb9791d8e32fb3853e2e12e
SHA181c9c5072fb169efc4b2cc74603abeb2fa8fa59a
SHA256a816e8796789bf1aadff952e8134030a03ac220df9e78fe2bc93ef2b405c9d08
SHA512611e971d76112d2371c88280f16f4179fefe13ea4cd9323f090a3167422c77bbd39d762d0094223d0900b75f912d44888fb53144ff4a6cf61295e95de3fac45c
-
Filesize
1.6MB
MD586a01c3b6525cb7b4218c1a9296fa520
SHA10e640d587b802c2f89ec095cf8f92459c176c240
SHA256f561143eb3b4422924feb1459e307de4ff1eed7bd0a0f9a2377f4c9f96ae7234
SHA512acdff1a1789c4026e5dc8c36fea30b09c447f7d4f8ac7324eb7bb5b0bffccea3f68cf41de6f2b2360d0bbbd78040f8ecb3eef65644d4c9c745e61fcd92a86868