Analysis
-
max time kernel
155s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe
Resource
win10v2004-20220812-en
General
-
Target
ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe
-
Size
1016KB
-
MD5
6bc3e0b80a3c762d5dd2a642a5768100
-
SHA1
7ca337fe678e0e2e28b18ae0da262517f909c771
-
SHA256
ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
-
SHA512
1b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
SSDEEP
6144:uIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHU6ESl:uIXsgtvm1De5YlOx6lzBH46Up
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" yborjrewily.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" bjokv.exe -
Adds policy Run key to start application 2 TTPs 30 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\thsulxfpztw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yrhokbodsrzrzwjb.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qhvaujuhurxnto = "fzqyvnbrhhqjsqexv.exe" bjokv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qhvaujuhurxnto = "fzqyvnbrhhqjsqexv.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qhvaujuhurxnto = "yrhokbodsrzrzwjb.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\thsulxfpztw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mjdoojatmpbxjkbxyolf.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qhvaujuhurxnto = "zvoyxrhzrtezkkavvkg.exe" bjokv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qhvaujuhurxnto = "bzughdvpjnaxkmebdusnz.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\thsulxfpztw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ojbkibqhyzjdnmbvui.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\thsulxfpztw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zvoyxrhzrtezkkavvkg.exe" yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\thsulxfpztw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fzqyvnbrhhqjsqexv.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qhvaujuhurxnto = "mjdoojatmpbxjkbxyolf.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\thsulxfpztw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zvoyxrhzrtezkkavvkg.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\thsulxfpztw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zvoyxrhzrtezkkavvkg.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qhvaujuhurxnto = "ojbkibqhyzjdnmbvui.exe" yborjrewily.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qhvaujuhurxnto = "ojbkibqhyzjdnmbvui.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\thsulxfpztw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mjdoojatmpbxjkbxyolf.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qhvaujuhurxnto = "zvoyxrhzrtezkkavvkg.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qhvaujuhurxnto = "bzughdvpjnaxkmebdusnz.exe" yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qhvaujuhurxnto = "mjdoojatmpbxjkbxyolf.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\thsulxfpztw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yrhokbodsrzrzwjb.exe" yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\thsulxfpztw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fzqyvnbrhhqjsqexv.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\thsulxfpztw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yrhokbodsrzrzwjb.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qhvaujuhurxnto = "ojbkibqhyzjdnmbvui.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\thsulxfpztw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bzughdvpjnaxkmebdusnz.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\thsulxfpztw = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ojbkibqhyzjdnmbvui.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qhvaujuhurxnto = "yrhokbodsrzrzwjb.exe" bjokv.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yborjrewily.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bjokv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bjokv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yborjrewily.exe -
Executes dropped EXE 4 IoCs
pid Process 980 yborjrewily.exe 3712 bjokv.exe 3656 bjokv.exe 3220 yborjrewily.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation yborjrewily.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ojbkibqhyzjdnmbvui = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fzqyvnbrhhqjsqexv.exe" bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qfrumzitezdr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bzughdvpjnaxkmebdusnz.exe" bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\yrhokbodsrzrzwjb = "ojbkibqhyzjdnmbvui.exe ." bjokv.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce yborjrewily.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlagbrdrfdkbieq = "bzughdvpjnaxkmebdusnz.exe" bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qfrumzitezdr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ojbkibqhyzjdnmbvui.exe" bjokv.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ojbkibqhyzjdnmbvui = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ojbkibqhyzjdnmbvui.exe" bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pfswpdnzlhmbg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ojbkibqhyzjdnmbvui.exe ." yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pfswpdnzlhmbg = "mjdoojatmpbxjkbxyolf.exe ." bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlagbrdrfdkbieq = "bzughdvpjnaxkmebdusnz.exe" bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qfrumzitezdr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yrhokbodsrzrzwjb.exe" bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\yrhokbodsrzrzwjb = "fzqyvnbrhhqjsqexv.exe ." bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\yrhokbodsrzrzwjb = "ojbkibqhyzjdnmbvui.exe ." bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\yrhokbodsrzrzwjb = "bzughdvpjnaxkmebdusnz.exe ." bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pfswpdnzlhmbg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yrhokbodsrzrzwjb.exe ." bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlagbrdrfdkbieq = "zvoyxrhzrtezkkavvkg.exe" bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qfrumzitezdr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mjdoojatmpbxjkbxyolf.exe" bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\yrhokbodsrzrzwjb = "yrhokbodsrzrzwjb.exe ." yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ojbkibqhyzjdnmbvui = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zvoyxrhzrtezkkavvkg.exe" bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlagbrdrfdkbieq = "ojbkibqhyzjdnmbvui.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pfswpdnzlhmbg = "fzqyvnbrhhqjsqexv.exe ." bjokv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qfrumzitezdr = "bzughdvpjnaxkmebdusnz.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fzqyvnbrhhqjsqexv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bzughdvpjnaxkmebdusnz.exe ." bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pfswpdnzlhmbg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fzqyvnbrhhqjsqexv.exe ." bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ojbkibqhyzjdnmbvui = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yrhokbodsrzrzwjb.exe" yborjrewily.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pfswpdnzlhmbg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bzughdvpjnaxkmebdusnz.exe ." bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qfrumzitezdr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ojbkibqhyzjdnmbvui.exe" bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pfswpdnzlhmbg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zvoyxrhzrtezkkavvkg.exe ." bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qfrumzitezdr = "fzqyvnbrhhqjsqexv.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qfrumzitezdr = "yrhokbodsrzrzwjb.exe" bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlagbrdrfdkbieq = "mjdoojatmpbxjkbxyolf.exe" bjokv.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qfrumzitezdr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zvoyxrhzrtezkkavvkg.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ojbkibqhyzjdnmbvui = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mjdoojatmpbxjkbxyolf.exe" bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pfswpdnzlhmbg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bzughdvpjnaxkmebdusnz.exe ." yborjrewily.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pfswpdnzlhmbg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yrhokbodsrzrzwjb.exe ." bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlagbrdrfdkbieq = "fzqyvnbrhhqjsqexv.exe" bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\pfswpdnzlhmbg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mjdoojatmpbxjkbxyolf.exe ." bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fzqyvnbrhhqjsqexv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zvoyxrhzrtezkkavvkg.exe ." bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qfrumzitezdr = "bzughdvpjnaxkmebdusnz.exe" yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fzqyvnbrhhqjsqexv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fzqyvnbrhhqjsqexv.exe ." yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\qfrumzitezdr = "yrhokbodsrzrzwjb.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fzqyvnbrhhqjsqexv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fzqyvnbrhhqjsqexv.exe ." bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlagbrdrfdkbieq = "mjdoojatmpbxjkbxyolf.exe" yborjrewily.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\yrhokbodsrzrzwjb = "mjdoojatmpbxjkbxyolf.exe ." bjokv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce yborjrewily.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qfrumzitezdr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fzqyvnbrhhqjsqexv.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\fzqyvnbrhhqjsqexv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ojbkibqhyzjdnmbvui.exe ." bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ojbkibqhyzjdnmbvui = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zvoyxrhzrtezkkavvkg.exe" bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qfrumzitezdr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zvoyxrhzrtezkkavvkg.exe" bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\yrhokbodsrzrzwjb = "ojbkibqhyzjdnmbvui.exe ." yborjrewily.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tlagbrdrfdkbieq = "yrhokbodsrzrzwjb.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ojbkibqhyzjdnmbvui = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yrhokbodsrzrzwjb.exe" bjokv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pfswpdnzlhmbg = "yrhokbodsrzrzwjb.exe ." yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pfswpdnzlhmbg = "ojbkibqhyzjdnmbvui.exe ." bjokv.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run bjokv.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\yrhokbodsrzrzwjb = "yrhokbodsrzrzwjb.exe ." bjokv.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run yborjrewily.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce bjokv.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\yrhokbodsrzrzwjb = "bzughdvpjnaxkmebdusnz.exe ." bjokv.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bjokv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yborjrewily.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yborjrewily.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bjokv.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 39 whatismyip.everdot.org 41 whatismyip.everdot.org 34 whatismyipaddress.com 37 www.showmyipaddress.com -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\zvoyxrhzrtezkkavvkg.exe bjokv.exe File opened for modification C:\Windows\SysWOW64\srnaczsninbznqjhkcbxkm.exe bjokv.exe File opened for modification C:\Windows\SysWOW64\ojbkibqhyzjdnmbvui.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\zvoyxrhzrtezkkavvkg.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\srnaczsninbznqjhkcbxkm.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\fzqyvnbrhhqjsqexv.exe bjokv.exe File opened for modification C:\Windows\SysWOW64\mjdoojatmpbxjkbxyolf.exe bjokv.exe File opened for modification C:\Windows\SysWOW64\bzughdvpjnaxkmebdusnz.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\ojbkibqhyzjdnmbvui.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\yrhokbodsrzrzwjb.exe bjokv.exe File created C:\Windows\SysWOW64\bjokvbdhlzwdamovhiqvrcikosg.kht bjokv.exe File created C:\Windows\SysWOW64\yrhokbodsrzrzwjbykdtawnapedldlivnkwpfm.zmb bjokv.exe File opened for modification C:\Windows\SysWOW64\yrhokbodsrzrzwjb.exe bjokv.exe File opened for modification C:\Windows\SysWOW64\yrhokbodsrzrzwjbykdtawnapedldlivnkwpfm.zmb bjokv.exe File opened for modification C:\Windows\SysWOW64\fzqyvnbrhhqjsqexv.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\ojbkibqhyzjdnmbvui.exe bjokv.exe File opened for modification C:\Windows\SysWOW64\bzughdvpjnaxkmebdusnz.exe bjokv.exe File opened for modification C:\Windows\SysWOW64\yrhokbodsrzrzwjb.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\srnaczsninbznqjhkcbxkm.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\bjokvbdhlzwdamovhiqvrcikosg.kht bjokv.exe File opened for modification C:\Windows\SysWOW64\bzughdvpjnaxkmebdusnz.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\fzqyvnbrhhqjsqexv.exe bjokv.exe File opened for modification C:\Windows\SysWOW64\mjdoojatmpbxjkbxyolf.exe bjokv.exe File opened for modification C:\Windows\SysWOW64\srnaczsninbznqjhkcbxkm.exe bjokv.exe File opened for modification C:\Windows\SysWOW64\yrhokbodsrzrzwjb.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\mjdoojatmpbxjkbxyolf.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\fzqyvnbrhhqjsqexv.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\mjdoojatmpbxjkbxyolf.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\ojbkibqhyzjdnmbvui.exe bjokv.exe File opened for modification C:\Windows\SysWOW64\zvoyxrhzrtezkkavvkg.exe bjokv.exe File opened for modification C:\Windows\SysWOW64\bzughdvpjnaxkmebdusnz.exe bjokv.exe File opened for modification C:\Windows\SysWOW64\zvoyxrhzrtezkkavvkg.exe yborjrewily.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\yrhokbodsrzrzwjbykdtawnapedldlivnkwpfm.zmb bjokv.exe File created C:\Program Files (x86)\yrhokbodsrzrzwjbykdtawnapedldlivnkwpfm.zmb bjokv.exe File opened for modification C:\Program Files (x86)\bjokvbdhlzwdamovhiqvrcikosg.kht bjokv.exe File created C:\Program Files (x86)\bjokvbdhlzwdamovhiqvrcikosg.kht bjokv.exe -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\yrhokbodsrzrzwjb.exe yborjrewily.exe File opened for modification C:\Windows\srnaczsninbznqjhkcbxkm.exe yborjrewily.exe File opened for modification C:\Windows\fzqyvnbrhhqjsqexv.exe bjokv.exe File opened for modification C:\Windows\mjdoojatmpbxjkbxyolf.exe bjokv.exe File opened for modification C:\Windows\zvoyxrhzrtezkkavvkg.exe yborjrewily.exe File opened for modification C:\Windows\mjdoojatmpbxjkbxyolf.exe yborjrewily.exe File opened for modification C:\Windows\zvoyxrhzrtezkkavvkg.exe yborjrewily.exe File opened for modification C:\Windows\mjdoojatmpbxjkbxyolf.exe yborjrewily.exe File opened for modification C:\Windows\bzughdvpjnaxkmebdusnz.exe bjokv.exe File opened for modification C:\Windows\srnaczsninbznqjhkcbxkm.exe yborjrewily.exe File opened for modification C:\Windows\ojbkibqhyzjdnmbvui.exe yborjrewily.exe File opened for modification C:\Windows\yrhokbodsrzrzwjb.exe bjokv.exe File opened for modification C:\Windows\ojbkibqhyzjdnmbvui.exe bjokv.exe File opened for modification C:\Windows\yrhokbodsrzrzwjbykdtawnapedldlivnkwpfm.zmb bjokv.exe File opened for modification C:\Windows\srnaczsninbznqjhkcbxkm.exe bjokv.exe File created C:\Windows\bjokvbdhlzwdamovhiqvrcikosg.kht bjokv.exe File created C:\Windows\yrhokbodsrzrzwjbykdtawnapedldlivnkwpfm.zmb bjokv.exe File opened for modification C:\Windows\bjokvbdhlzwdamovhiqvrcikosg.kht bjokv.exe File opened for modification C:\Windows\fzqyvnbrhhqjsqexv.exe yborjrewily.exe File opened for modification C:\Windows\ojbkibqhyzjdnmbvui.exe yborjrewily.exe File opened for modification C:\Windows\fzqyvnbrhhqjsqexv.exe yborjrewily.exe File opened for modification C:\Windows\bzughdvpjnaxkmebdusnz.exe yborjrewily.exe File opened for modification C:\Windows\fzqyvnbrhhqjsqexv.exe bjokv.exe File opened for modification C:\Windows\zvoyxrhzrtezkkavvkg.exe bjokv.exe File opened for modification C:\Windows\yrhokbodsrzrzwjb.exe yborjrewily.exe File opened for modification C:\Windows\bzughdvpjnaxkmebdusnz.exe yborjrewily.exe File opened for modification C:\Windows\ojbkibqhyzjdnmbvui.exe bjokv.exe File opened for modification C:\Windows\yrhokbodsrzrzwjb.exe bjokv.exe File opened for modification C:\Windows\bzughdvpjnaxkmebdusnz.exe bjokv.exe File opened for modification C:\Windows\srnaczsninbznqjhkcbxkm.exe bjokv.exe File opened for modification C:\Windows\zvoyxrhzrtezkkavvkg.exe bjokv.exe File opened for modification C:\Windows\mjdoojatmpbxjkbxyolf.exe bjokv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 3712 bjokv.exe 3712 bjokv.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 3712 bjokv.exe 3712 bjokv.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3712 bjokv.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4240 wrote to memory of 980 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 82 PID 4240 wrote to memory of 980 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 82 PID 4240 wrote to memory of 980 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 82 PID 980 wrote to memory of 3712 980 yborjrewily.exe 86 PID 980 wrote to memory of 3712 980 yborjrewily.exe 86 PID 980 wrote to memory of 3712 980 yborjrewily.exe 86 PID 980 wrote to memory of 3656 980 yborjrewily.exe 85 PID 980 wrote to memory of 3656 980 yborjrewily.exe 85 PID 980 wrote to memory of 3656 980 yborjrewily.exe 85 PID 4240 wrote to memory of 3220 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 94 PID 4240 wrote to memory of 3220 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 94 PID 4240 wrote to memory of 3220 4240 ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe 94 -
System policy modification 1 TTPs 41 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yborjrewily.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" bjokv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" yborjrewily.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" bjokv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" bjokv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" yborjrewily.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" bjokv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" bjokv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe"C:\Users\Admin\AppData\Local\Temp\ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\yborjrewily.exe"C:\Users\Admin\AppData\Local\Temp\yborjrewily.exe" "c:\users\admin\appdata\local\temp\ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:980 -
C:\Users\Admin\AppData\Local\Temp\bjokv.exe"C:\Users\Admin\AppData\Local\Temp\bjokv.exe" "-C:\Users\Admin\AppData\Local\Temp\yrhokbodsrzrzwjb.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\bjokv.exe"C:\Users\Admin\AppData\Local\Temp\bjokv.exe" "-C:\Users\Admin\AppData\Local\Temp\yrhokbodsrzrzwjb.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3712
-
-
-
C:\Users\Admin\AppData\Local\Temp\yborjrewily.exe"C:\Users\Admin\AppData\Local\Temp\yborjrewily.exe" "c:\users\admin\appdata\local\temp\ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:3220
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
732KB
MD5b62b130bde2b9a3a00a3a8615ef35d90
SHA10bdef842f3aa19d04303ad55ee9ae563cf08bab0
SHA256125f517f05c7e0fc8f9155717de1c304edfd87e8b1de70c6212df43caef66e8d
SHA512bf3fc46fba04f9952825ada0e66d279ccd13d6cbd680d6030b114cd4925a3c03724e4659b9161f5ad5a4e6d26e19570bdd6d44c186dffd57c398275a379ce254
-
Filesize
732KB
MD5b62b130bde2b9a3a00a3a8615ef35d90
SHA10bdef842f3aa19d04303ad55ee9ae563cf08bab0
SHA256125f517f05c7e0fc8f9155717de1c304edfd87e8b1de70c6212df43caef66e8d
SHA512bf3fc46fba04f9952825ada0e66d279ccd13d6cbd680d6030b114cd4925a3c03724e4659b9161f5ad5a4e6d26e19570bdd6d44c186dffd57c398275a379ce254
-
Filesize
732KB
MD5b62b130bde2b9a3a00a3a8615ef35d90
SHA10bdef842f3aa19d04303ad55ee9ae563cf08bab0
SHA256125f517f05c7e0fc8f9155717de1c304edfd87e8b1de70c6212df43caef66e8d
SHA512bf3fc46fba04f9952825ada0e66d279ccd13d6cbd680d6030b114cd4925a3c03724e4659b9161f5ad5a4e6d26e19570bdd6d44c186dffd57c398275a379ce254
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
320KB
MD50d18c5ff0e54203507b477a5b8e1b359
SHA1868273609bc55e3844e2cc1b193ebdee5651336c
SHA2562073483a03bfc1fdf236bb81033e48be8bd0ac659bb29c19b2706c4030b7e2fb
SHA512e05f11191be3692fa088c731ad6a7e038566900edbf225d0442cc35e67c7ff24e9a6c1636604bbfabc6f0c43a74c60b645cf5afd8dc60fbc751d3127e4287196
-
Filesize
320KB
MD50d18c5ff0e54203507b477a5b8e1b359
SHA1868273609bc55e3844e2cc1b193ebdee5651336c
SHA2562073483a03bfc1fdf236bb81033e48be8bd0ac659bb29c19b2706c4030b7e2fb
SHA512e05f11191be3692fa088c731ad6a7e038566900edbf225d0442cc35e67c7ff24e9a6c1636604bbfabc6f0c43a74c60b645cf5afd8dc60fbc751d3127e4287196
-
Filesize
320KB
MD50d18c5ff0e54203507b477a5b8e1b359
SHA1868273609bc55e3844e2cc1b193ebdee5651336c
SHA2562073483a03bfc1fdf236bb81033e48be8bd0ac659bb29c19b2706c4030b7e2fb
SHA512e05f11191be3692fa088c731ad6a7e038566900edbf225d0442cc35e67c7ff24e9a6c1636604bbfabc6f0c43a74c60b645cf5afd8dc60fbc751d3127e4287196
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2
-
Filesize
1016KB
MD56bc3e0b80a3c762d5dd2a642a5768100
SHA17ca337fe678e0e2e28b18ae0da262517f909c771
SHA256ca488fcd2c128eccb56b5456699e42cb5c676251c971bd9a8b64777dd3ca1f7a
SHA5121b853ea2cdd624708f1de811dc1e70c8250a9da726c86a303a3a0fb1d49abc5106e9981bb6af54e91d7c772fb02fbcff0cc39c1e743de91f8e9e28ad0da303b2