Analysis
-
max time kernel
1050s -
max time network
840s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
hi.bat.js
Resource
win7-20240903-en
General
-
Target
hi.bat.js
-
Size
2KB
-
MD5
3cfc5d69b5d2ad5ef20203d7c58d87c2
-
SHA1
8a470b8f20c5f0a1eea90f5e031ca6945fbf3830
-
SHA256
e6252e20521d4489c6e022b29457ecf192e1f26533a6c95a7b5577ee8a2d0c94
-
SHA512
2cf11dcd6704f5d4d8023c4a777a631d91c6b813d48f83579e971060d6978eb5ff870acabe2247a86449625340af4044eeef6d66f80076169bc3dcd8ce04f532
Malware Config
Signatures
-
Disables service(s) 3 TTPs
-
Possible privilege escalation attempt 6 IoCs
pid Process 920 takeown.exe 3064 takeown.exe 2364 takeown.exe 2728 icacls.exe 2512 icacls.exe 2616 icacls.exe -
Stops running service(s) 4 TTPs
-
Deletes itself 1 IoCs
pid Process 2304 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 1004 dismhost.exe -
Loads dropped DLL 27 IoCs
pid Process 2320 cleanmgr.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe 1004 dismhost.exe -
Modifies file permissions 1 TTPs 6 IoCs
pid Process 920 takeown.exe 3064 takeown.exe 2364 takeown.exe 2728 icacls.exe 2512 icacls.exe 2616 icacls.exe -
pid Process 2200 powershell.exe 1252 powershell.exe 2292 powershell.exe 328 powershell.exe 1944 powershell.exe 2696 powershell.exe 2892 powershell.exe 1988 powershell.exe 3064 powershell.exe 2080 powershell.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: cleanmgr.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 13 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\windows\System32\3kmwe8.exe cmd.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_D2B9~1 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B7449A0000000010\9.0.0\UL_MSV~1.98C cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\SYSTEM~4.DLL cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\WINDOW~1.DLL cmd.exe File opened for modification C:\windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\cagicon.exe cmd.exe File opened for modification C:\windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\wordicon.exe cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\UIAUTO~4.DLL cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_727A~1 cmd.exe File opened for modification C:\windows\Installer\3080.msp cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\00004109110000000000000000F01FEC\14.0.4763\GABRIOLA.TTF cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\MICROS~3.DLL cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENT~3 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\PE3AC5~1.DLL cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_31C8~1 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENT~2 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\PRBFC1~1.DLL cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\SYDE67~1.DLL cmd.exe File opened for modification C:\windows\Installer\{90140000-006E-0409-0000-0000000FF1CE}\misc.exe cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_A206~1 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\SYSTEM~4 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\SYFE7E~1 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\MICROS~2.DLL cmd.exe File opened for modification C:\windows\Installer\5323.msp cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_CENT~4 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENT~1 cmd.exe File opened for modification C:\windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\oisicon.exe cmd.exe File opened for modification C:\windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\outicon.exe cmd.exe File opened for modification C:\windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SECSTO~1.ICO cmd.exe File opened for modification C:\windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\PDXFIL~1.ICO cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\00004109110000000000000000F01FEC\14.0.4763\RTSCOM~1.997 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_77A9~1 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_8C6C~1 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\UIAUTO~1 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\UI99F2~1.DLL cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_BB64~1 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_A468~1 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_BA02~1 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\WPFGFX~1.DLL cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_038A~1 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\SYSTEM~3.DLL cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\WINDOW~1 cmd.exe File opened for modification C:\windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\xlicons.exe cmd.exe File opened for modification C:\Windows\Logs\DISM\dism.log cleanmgr.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe NOTEPAD.EXE File opened for modification C:\windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_CENT~4 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_68A2~1 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\PRESEN~3 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\PR7598~1.DLL cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\PR2008~1.DLL cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\UI9BD8~1.DLL cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1926E8D15D0BCE53481466615F760A7F\10.0.40219\F_FCCC~1 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\PR8CA8~1.DLL cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\PRESEN~2.MUI cmd.exe File opened for modification C:\windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\joticon.exe cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_7457~1 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\PRESEN~2.DLL cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\SYSTEM~2 cmd.exe File opened for modification C:\windows\Installer\{90140000-0011-0000-0000-0000000FF1CE}\pubs.exe cmd.exe File opened for modification C:\Windows\Logs\DISM\dism.log dismhost.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_53EF~1 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\UIAUTO~4 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\1D5E3C0FEDA1E123187686FED06E995A\10.0.40219\F_9827~1 cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\PENIMC~2.DLL cmd.exe File opened for modification C:\windows\Installer\$PatchCache$\Managed\E8EBCC90469BFE03EA485673BA14799F\4.7.3062\UI3EAD~1.DLL cmd.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1664 sc.exe 1148 sc.exe 1092 sc.exe 924 sc.exe 2244 sc.exe 1140 sc.exe 444 sc.exe 3040 sc.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Modifies registry class 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "7" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Mode = "4" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\IconSize = "16" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\FFlags = "1" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 000000000200000001000000ffffffff NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 NOTEPAD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" NOTEPAD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC} NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202 NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" NOTEPAD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9} NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlot = "8" NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8 NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\TV_TopViewVersion = "0" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\FFlags = "1092616257" NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\LogicalViewMode = "1" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202020202020202 NOTEPAD.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0c00000050000000a66a63283d95d211b5d600c04fd918d00b0000007800000030f125b7ef471a10a5f102608c9eebac0e00000078000000 NOTEPAD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\8\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\ComDlg\{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}\{82BA0782-5B7A-4569-B5D7-EC83085F08CC}\Sort = 000000000000000000000000000000000200000030f125b7ef471a10a5f102608c9eebac0a0000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff NOTEPAD.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff NOTEPAD.EXE -
Opens file in notepad (likely ransom note) 4 IoCs
pid Process 2844 NOTEPAD.EXE 2720 NOTEPAD.EXE 3052 NOTEPAD.EXE 328 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1988 powershell.exe 1252 powershell.exe 2292 powershell.exe 328 powershell.exe 1944 powershell.exe 2696 powershell.exe 2892 powershell.exe 2080 powershell.exe 3064 powershell.exe 2200 powershell.exe 2200 powershell.exe 2200 powershell.exe 2280 powershell.exe 2304 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2720 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 1988 powershell.exe Token: SeDebugPrivilege 1252 powershell.exe Token: SeDebugPrivilege 2292 powershell.exe Token: SeDebugPrivilege 328 powershell.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 2696 powershell.exe Token: SeDebugPrivilege 2892 powershell.exe Token: SeDebugPrivilege 2080 powershell.exe Token: SeDebugPrivilege 3064 powershell.exe Token: SeDebugPrivilege 2200 powershell.exe Token: SeDebugPrivilege 2280 powershell.exe Token: SeDebugPrivilege 2304 powershell.exe Token: SeTakeOwnershipPrivilege 2364 takeown.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 cleanmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2720 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1848 2028 cmd.exe 36 PID 2028 wrote to memory of 1848 2028 cmd.exe 36 PID 2028 wrote to memory of 1848 2028 cmd.exe 36 PID 1848 wrote to memory of 2012 1848 cmd.exe 37 PID 1848 wrote to memory of 2012 1848 cmd.exe 37 PID 1848 wrote to memory of 2012 1848 cmd.exe 37 PID 2028 wrote to memory of 1988 2028 cmd.exe 38 PID 2028 wrote to memory of 1988 2028 cmd.exe 38 PID 2028 wrote to memory of 1988 2028 cmd.exe 38 PID 2028 wrote to memory of 1252 2028 cmd.exe 39 PID 2028 wrote to memory of 1252 2028 cmd.exe 39 PID 2028 wrote to memory of 1252 2028 cmd.exe 39 PID 2028 wrote to memory of 2292 2028 cmd.exe 40 PID 2028 wrote to memory of 2292 2028 cmd.exe 40 PID 2028 wrote to memory of 2292 2028 cmd.exe 40 PID 2028 wrote to memory of 328 2028 cmd.exe 41 PID 2028 wrote to memory of 328 2028 cmd.exe 41 PID 2028 wrote to memory of 328 2028 cmd.exe 41 PID 2028 wrote to memory of 1944 2028 cmd.exe 42 PID 2028 wrote to memory of 1944 2028 cmd.exe 42 PID 2028 wrote to memory of 1944 2028 cmd.exe 42 PID 2028 wrote to memory of 2696 2028 cmd.exe 43 PID 2028 wrote to memory of 2696 2028 cmd.exe 43 PID 2028 wrote to memory of 2696 2028 cmd.exe 43 PID 2028 wrote to memory of 2892 2028 cmd.exe 44 PID 2028 wrote to memory of 2892 2028 cmd.exe 44 PID 2028 wrote to memory of 2892 2028 cmd.exe 44 PID 2028 wrote to memory of 1664 2028 cmd.exe 45 PID 2028 wrote to memory of 1664 2028 cmd.exe 45 PID 2028 wrote to memory of 1664 2028 cmd.exe 45 PID 2028 wrote to memory of 1148 2028 cmd.exe 46 PID 2028 wrote to memory of 1148 2028 cmd.exe 46 PID 2028 wrote to memory of 1148 2028 cmd.exe 46 PID 2028 wrote to memory of 1092 2028 cmd.exe 47 PID 2028 wrote to memory of 1092 2028 cmd.exe 47 PID 2028 wrote to memory of 1092 2028 cmd.exe 47 PID 2028 wrote to memory of 924 2028 cmd.exe 48 PID 2028 wrote to memory of 924 2028 cmd.exe 48 PID 2028 wrote to memory of 924 2028 cmd.exe 48 PID 2028 wrote to memory of 444 2028 cmd.exe 49 PID 2028 wrote to memory of 444 2028 cmd.exe 49 PID 2028 wrote to memory of 444 2028 cmd.exe 49 PID 2028 wrote to memory of 1140 2028 cmd.exe 50 PID 2028 wrote to memory of 1140 2028 cmd.exe 50 PID 2028 wrote to memory of 1140 2028 cmd.exe 50 PID 2028 wrote to memory of 2244 2028 cmd.exe 51 PID 2028 wrote to memory of 2244 2028 cmd.exe 51 PID 2028 wrote to memory of 2244 2028 cmd.exe 51 PID 2028 wrote to memory of 3040 2028 cmd.exe 52 PID 2028 wrote to memory of 3040 2028 cmd.exe 52 PID 2028 wrote to memory of 3040 2028 cmd.exe 52 PID 2028 wrote to memory of 772 2028 cmd.exe 53 PID 2028 wrote to memory of 772 2028 cmd.exe 53 PID 2028 wrote to memory of 772 2028 cmd.exe 53 PID 2028 wrote to memory of 696 2028 cmd.exe 54 PID 2028 wrote to memory of 696 2028 cmd.exe 54 PID 2028 wrote to memory of 696 2028 cmd.exe 54 PID 2028 wrote to memory of 2080 2028 cmd.exe 55 PID 2028 wrote to memory of 2080 2028 cmd.exe 55 PID 2028 wrote to memory of 2080 2028 cmd.exe 55 PID 2028 wrote to memory of 3064 2028 cmd.exe 56 PID 2028 wrote to memory of 3064 2028 cmd.exe 56 PID 2028 wrote to memory of 3064 2028 cmd.exe 56 PID 2028 wrote to memory of 2200 2028 cmd.exe 57
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\hi.bat.js1⤵PID:1684
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2984
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hi.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v CurrentBuild2⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\system32\reg.exereg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v CurrentBuild3⤵PID:2012
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-AppxPackage -AllUsers | Remove-AppxPackage"2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-AppxProvisionedPackage -Online | Remove-AppxProvisionedPackage -Online"2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Disable-WindowsOptionalFeature -Online -FeatureName WindowsMediaPlayer -NoRestart"2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Disable-WindowsOptionalFeature -Online -FeatureName InternetExplorerOptional -NoRestart"2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:328
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Disable-WindowsOptionalFeature -Online -FeatureName WindowsSubsystemForLinux -NoRestart"2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Disable-WindowsOptionalFeature -Online -FeatureName Printing-Foundation-InternetPrinting-Client -NoRestart"2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Disable-WindowsOptionalFeature -Online -FeatureName WorkFolders-Client -NoRestart"2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\system32\sc.exesc stop DiagTrack2⤵
- Launches sc.exe
PID:1664
-
-
C:\Windows\system32\sc.exesc config DiagTrack start= disabled2⤵
- Launches sc.exe
PID:1148
-
-
C:\Windows\system32\sc.exesc stop dmwappushservice2⤵
- Launches sc.exe
PID:1092
-
-
C:\Windows\system32\sc.exesc config dmwappushservice start= disabled2⤵
- Launches sc.exe
PID:924
-
-
C:\Windows\system32\sc.exesc stop OneSyncSvc2⤵
- Launches sc.exe
PID:444
-
-
C:\Windows\system32\sc.exesc config OneSyncSvc start= disabled2⤵
- Launches sc.exe
PID:1140
-
-
C:\Windows\system32\sc.exesc stop CDPSvc2⤵
- Launches sc.exe
PID:2244
-
-
C:\Windows\system32\sc.exesc config CDPSvc start= disabled2⤵
- Launches sc.exe
PID:3040
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v AllowCortana /t REG_DWORD /d 0 /f2⤵PID:772
-
-
C:\Windows\system32\reg.exereg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo" /v Enabled /t REG_DWORD /d 0 /f2⤵PID:696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\BackgroundAccessApplications' -Name GlobalUserDisabled -Value 1"2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Set-Service -Name WSearch -StartupType Disabled"2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process -Verb RunAs -Wait Cleanmgr /sagerun:1"2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200 -
C:\Windows\system32\cleanmgr.exe"C:\Windows\system32\cleanmgr.exe" /sagerun:13⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\dismhost.exeC:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\dismhost.exe {3A978F8C-970F-4D5D-983B-F133625B0B36}4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1004
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Remove-Item -Path C:\Windows\Temp\* -Recurse -Force"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Remove-Item -Path C:\Users\*\AppData\Local\Temp\* -Recurse -Force"2⤵
- Deletes itself
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" /p C:\Users\Admin\AppData\Local\Temp\hi.bat1⤵
- Opens file in notepad (likely ransom note)
PID:328
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" /p C:\Users\Admin\AppData\Local\Temp\hi.bat1⤵
- Opens file in notepad (likely ransom note)
PID:2844
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\hi.bat1⤵
- Drops file in Windows directory
- Modifies registry class
- Opens file in notepad (likely ransom note)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2720
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Desktop\hi.bat" "1⤵PID:2896
-
C:\Windows\system32\tree.comtree2⤵PID:888
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\hi.bat"1⤵PID:1092
-
C:\Windows\system32\tree.comtree2⤵PID:444
-
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\hi.bat1⤵
- Opens file in notepad (likely ransom note)
PID:3052
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\Desktop\hi.bat" "1⤵PID:1552
-
C:\Windows\system32\tree.comtree2⤵PID:1328
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1752 -
C:\Windows\system32\takeown.exetakeown C:\Windows /f /q2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:920
-
-
C:\Windows\system32\takeown.exetakeown /?2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:3064
-
-
C:\Windows\system32\takeown.exetakeown /f C:\windows /R /A2⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Windows\system32\icacls.exeicacls2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2728
-
-
C:\Windows\system32\icacls.exeicacls C:\windows /grant everyone:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2512
-
-
C:\Windows\system32\icacls.exeicacls c:\windows\* /grant everyone:F2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2616
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1PowerShell
1System Services
2Service Execution
2Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
1Indicator Removal
1File Deletion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
744KB
MD5efcb002abc3529d71b61e6fb6434566c
SHA1a25aca0fc9a1139f44329b28dc13c526965d311f
SHA256b641d944428f5b8ffb2fefd4da31c6a15ba84d01130f2712d7b1e71c518805bd
SHA51210ee2b20f031ca5a131a9590599f13d3f0029352376705a2d7d2134fcd6535a3b54356d1b4d0b3fb53ac5ca4f034f9afb129a4f601159938680197ea39ea0687
-
Filesize
179KB
MD56a4bd682396f29fd7df5ab389509b950
SHA146f502bec487bd6112f333d1ada1ec98a416d35f
SHA256328e5fbb6f3088fd759d855e656cd4c477b59f6a43a247954d1fd9050815e6cb
SHA51235ced350482c94d22c85cd1b98890d01baed0da1c35a114d2cd6373d08969be764282f7a9d8ff0dd1dff3fae42e4ea20d3194c352364901b23ca2f375bd02751
-
Filesize
109KB
MD55488e381238ff19687fdd7ab2f44cfcc
SHA1b90fa27ef6a7fc6d543ba33d5c934180e17297d3
SHA256abaada27d682b0d7270827c0271ac04505800b11d04b764562e4baa2cbc306a0
SHA512933e99749c68b3e9fe290fe4a1d8c90732ba13092d8cd9cac64f8e6583c8dcfbf25a4bea122966bc5d7d92e3a21210365a03b52274d25d704de52631e1fb0412
-
Filesize
94KB
MD59a821d8d62f4c60232b856e98cba7e4f
SHA14ec5dcbd43ad3b0178b26a57b8a2f41e33a48df5
SHA256a5b3bf53bcd3c0296498383837e8f9eb7d610c535521315a96aa740cf769f525
SHA5121b5273a52973dac77ad0ef7aa1dda929a782d762ab8489eb90dff1062dd4cc01e4f7f4157266a2abcf8941e91cf4aa5603de1dd8ee871524748e0989ebaa37d3
-
Filesize
52KB
MD5c9d74156913061be6c51d8fc3acf8e93
SHA14a4c6473a478256e4c78b423e918191118e01093
SHA256af0a38b4e95a50427b215eebc185bb621187e066b8b7373fb960eac0551bec37
SHA512c12f75a6451881878a7a9ed5de61d157ea36f53aa41abf7660e1cc411b2ddd70ff048a307b1440cfdf1b269aeff77da8cc163ad19e9e3a294a5128f170f37047
-
Filesize
104KB
MD562de64dc805fd98af3ada9d93209f6a9
SHA1392ba504973d626aaf5c5b41b184670c58ec65a7
SHA25683c0f61cc8fc01c789c07dd25f58862e0710088e6887716b1be9ee9f149adefc
SHA5127db48f240df566be9a4b836807f97e8169d58edfa699de69be35b3977e442da3fea4f8b38d359d50f4d5afcf8547c8f66329e5ec855efbc5402ce88458d67e28
-
Filesize
211KB
MD545ff4fa5ca5432bfccded4433fe2a85b
SHA1858c42499dd9d2198a6489dd310dc5cbff1e8d6e
SHA2568a85869b2d61bad50d816daf08df080f8039dbeb1208009a73daa7be83d032bd
SHA512abbe0f673d18cc9a922cfd677e5b88714a3049ad8937f836b5a8b9bddac5ddbad4dc143360efc018dcd3a3440aa3e516b1a97f7cd2fa9a55cb73739dedef1589
-
Filesize
124KB
MD5e7caed467f80b29f4e63ba493614dbb1
SHA165a159bcdb68c7514e4f5b65413678c673d2d0c9
SHA2562c325e2647eb622983948cc26c509c832e1094639bb7af0fb712583947ad019c
SHA51234952d8a619eb46d8b7ec6463e1e99f1c641ce61c471997dd959911ae21d64e688d9aa8a78405faa49a652675caf40d8e9e5a07de30257f26da4c65f04e2181e
-
Filesize
265KB
MD5fe447d1cd38cecac2331fa932078d9a0
SHA1ebd99d5eb3403f547821ce51c193afc86ecf4bcf
SHA25605fe0897be3f79773c06b7ba4c152eec810fd895bf566d837829ec04c4f4338d
SHA512801e47c6c62a2d17ed7dd430a489507faf6074471f191f66862fd732924ad9a4bd1efe603354ed06d16c4d5c31a044126c4cc2dbbd8ffece2ed7632358ee7779
-
Filesize
182KB
MD58ca117cb9338c0351236939717cb7084
SHA1baa145810d50fdb204c8482fda5cacaaf58cdad0
SHA256f351c3597c98ea9fe5271024fc2ccf895cc6a247fb3b02c1cdb68891dac29e54
SHA51235b4be68666d22f82d949ad9f0ce986779355e7d2d8fd99c0e2102cd364aba4a95b5805269261a9205c1130bdd1f5101d16146d9334c27796c7f41f2c3166c35
-
Filesize
32KB
MD5724ee7133b1822f7ff80891d773fde51
SHA1d10dff002b02c78e624bf83ae8a6f25d73761827
SHA256d13f068f42074b3104987bfed49fbf3a054be6093908ed5dea8901887dddb367
SHA5121dfd236537d6592a19b07b5e1624310c67adff9e776e6d2566b9e7db732588988f9ae7352df6c3b53c058807d8ed55fafc2004a2d6dc2f3f6c9e16445699f17b
-
Filesize
12KB
MD59085b83968e705a3be5cd7588545a955
SHA1f0a477b353ca3e20fa65dd86cb260777ff27e1dd
SHA256fe0719cf624e08b5d6695ee3887358141d11316489c4ea97d2f61a4d2b9060cd
SHA512b7f12f7ac1e6942f24f4bf35444f623cc93f8a047ebc754b9599d5df16cab4d3745729d11b4a3abfdc06a671e55ac52cac937badd808825906f52885f16f2c1c
-
Filesize
6KB
MD5f18044dec5b59c82c7f71ecffe2e89ab
SHA1731d44676a8f5b3b7ad1d402dfdbb7f08bdc40c6
SHA256a650578a4630e1a49280dc273d1d0bbdca81664a2199e5ab44ec7c5c54c0a35e
SHA51253c23acddab099508b1e01dcc0d5dc9d4da67bc1765087f4a46b9ac842de065a55bac4c6682da07f5a1d29a3d0c1d92a4310e6b0f838740d919f8285911fa714
-
Filesize
15KB
MD5ee8c06cd11b34a37579d118ac5d6fa1d
SHA1c62f7fb0c6f42321b33ea675c0dfd304b2eb4a15
SHA2566991fb4bfd6800385a32ac759dd21016421cb13dca81f04ddcaf6bf12a928ccc
SHA512091cfa7d9b80e92df13ba829372dfb211214f4221e52fbf3f558ebb7f18736ad9ad867ea0d0ddf8938def1b4db64a12d0df37c2eaf41727b997f4905dd41fed1
-
Filesize
2KB
MD5cab37f952682118bac4a3f824c80b6ac
SHA16e35b4289927e26e3c50c16cbf87eb3ac6f3b793
SHA25614bec7c4bb6cf1ee9049ef8820ec88bf78f2af75615f7a3fb265ef4b45c30e4d
SHA512de9089adaa85f37201526b8619f697be98a7d05353b21b6d835f4d56803732380316359ba8b3c8ca7c14a9bf7cf31a7eff3c866a8f303ef737eb63573e01aa19
-
Filesize
26KB
MD50bffb5e4345198dbf18aa0bc8f0d6da1
SHA1e2789081b7cf150b63bad62bac03b252283e9fe5
SHA256b7bcc0e99719f24c30e12269e33a8bf09978c55593900d51d5f8588e51730739
SHA512590e8016075871846efff8b539e4779a1a628de318c161292c7231ca964a310e0722e44816041786c8620bff5c29ff34c5f35733ee4eac74f3abfae6d3af854a
-
Filesize
5KB
MD5f909216cf932aeb4f2f9f02e8c56a815
SHA1c5cafe5f8dad60d3a1d7c75aa2cf575e35a634f2
SHA256f5c89ba078697cdb705383684af49e07cdd094db962f0649cad23008ae9d6ce2
SHA5125dca19d54f738486085f11b5a2522073894a97d67e67be0eadbe9dc8944e632ae39b24499d7ff16e88d18166031697a238ead877f12cbb7447acca49c32a184a
-
Filesize
15KB
MD517fac8ab2dfbaba2b049ec43204c1c2f
SHA1d484ea7c6f749debf92b132765d2fd56f228db73
SHA256f4d277aaa8d0bed0afcd1b703ee4c28c86313075e291b6addbdfd6202eb3777e
SHA512ff7969adbc53fd2f5dccd3842b46a2517904d524020e69bb21271cd8ddc0cfddfd3f791741589b17b740d5d013cf14ed28b5af50d37d960c955adfd6b99e50cc
-
Filesize
2KB
MD5f0588e200554aed003667c04819cce32
SHA1dacbdc53bd297cd818ea954f5a47de6e84212108
SHA25640fe7b6631d11b5519f051ff0a0ade1cb0de524fb4904114067e71b729c38eba
SHA51299d9372a452a1b908f55d204a2b85addaa11fe49bb0b9c0d36a131c1cad254e9fb8a3b952572111d68a78fdbf41782dbe78d8cb20165676aada496113e4899eb
-
Filesize
2KB
MD5f842303ef440381939fc34df425f8392
SHA192debf4ae2d86a123002a104d0e9ad4981ab6d59
SHA256b06daf95235bd8b87af3dd06cc0566d7b893fbeaa1d5b39b66566b567c24c51f
SHA512d72ccd42da7506cbfbe5db1af03f6d95f8a9c43e11e9f7f24abadd5e98907ad1f976c626a53ed96ad4b5aa24534f019a1ac7ec8ace9a785035dabc72ffc6e18b
-
Filesize
2KB
MD59bc5d6eb3e2d31bbdbffe127a1b3cdbf
SHA1b253025c442aefe338b4c7ebea2f7d808abc9618
SHA25655e9ae098def76e7388d7d069746dbd136ae243357ece23b77f2365f0b2ff76f
SHA512f9968554737d181d4b7d0366f40f0c9a2039b59796986964413fa08f031f5529411b2741eb8ea3d8c312112b2038e6a58d891d090a42672c3d1c782b859f2e08
-
Filesize
265KB
MD57b38d7916a7cd058c16a0a6ca5077901
SHA1f79d955a6eac2f0368c79f7ba8061e9c58ba99b2
SHA2563f6dd990e2da5d3bd6d65a72cbfb0fe79eb30b118a8ad71b6c9bb5581a622dce
SHA5122d22fe535f464f635d42e5b016741b9caf173da372e4563a565fa1e294581f44330c61e08edfe4c08a341ebd708e2ad08614161c0ee54e8dea99452b87d1e710
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5c3c2ba41cb5b87f1430c105fa8b34b6a
SHA15b6670127ed532ffd79066557ba3d75685385976
SHA2567b06021eb390390ee224fc10fb6cd876b20c0833b2ef65d71ff9f22e0d4811ee
SHA5124056fa2ca7a23656bc85f3925aa8e56b78dbe72b4474c16b72d61a54b9724d8a57807fd913ef6764431e8b4233cce777353cdc0cd73a807c4d17efe2614ab796
-
Filesize
151KB
MD517b2651858e5353207b5499b7449fbb2
SHA1624181f3b8475635ee72288cca034e6857e93f1c
SHA256978277a709a945287685d2334ac75a0909b2cbb7296d8fe31f5d75d0aaf16306
SHA5129bdf4194c9b3e4a10b5997fb022895db33d36d6a05526d6fa61d77f4c8b634d48cbd7a2a0d4a8ef17b3711048b242c1a3ac72e1b87abf7f25b71b77b39d44fd6
-
Filesize
160KB
MD5a41e227b137d8df1930cacda15ae803d
SHA17815e5ae1ffce42fa65091d503a0f0457973774b
SHA256fa2be820a50be83444d2ab8a7ea0f383f309aee86a659b0149fae517d21f5255
SHA512bcba6c7fd9e9c555f7ea527e27e886533243262716183257b566525e693bb9b5644cbe3f8e05e366bc989298f41e3b1302f05377c603f1eb05150f0eca5e557f
-
Filesize
283KB
MD5f2b0771a7cd27f20689e0ab787b7eb7c
SHA1eb56e313cd23cb77524ef0db1309aebb0b36f7ef
SHA2567c675710ae52d5e8344465f1179ec4e03c882d5e5b16fc0ba9564b1ea121638f
SHA5125ebd4685e5b949d37c52bb1f2fe92accfa48dd4ef585c898f3982eb52f618064fc95c2f98532ca3e7007d0ef71c1fe91887ce3dc0a563f09bc2c5f59f3a3082a
-
Filesize
425KB
MD5fc2db5842190c6e78a40cd7da483b27c
SHA1e94ee17cd06fb55d04bef2bdfcf5736f336e0fa0
SHA256e6c93305d886bff678bd83b715bb5c5cbb376b90b973d9dd6844fac808de5c82
SHA512d5d32b894a485447d55499a2f1e02a8b33fb74081f225b8e2872995491a37353cf8022f46feeb3ca363b2e172ab89e29ab9a453692d1a964ca08d40230574bf6
-
Filesize
306KB
MD5bbb9e4fa2561f6a6e5ccf25da069ac1b
SHA12d353ec70c7a13ac5749d2205ac732213505082a
SHA256b92cf901027901d7066e9ee7ac8f3b48a99cfb3a3ddd8d759cb77295148943c1
SHA51201f4e6d51a0acb394693191b78cefa28759903036636a1d64f90c60dc59c948c78dd38df6fb2be149245622eadf8b2627c6767bf2aa2e0e56e6b52f0b91cc79e