Analysis
-
max time kernel
186s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe
Resource
win10v2004-20220812-en
General
-
Target
9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe
-
Size
1016KB
-
MD5
4f1d379e9c2e953f8c10b3460ef54880
-
SHA1
d08c5c9279e1b6db95021e9d32c351a84729efb0
-
SHA256
9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
-
SHA512
3daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
SSDEEP
6144:GIXsL0tvrSVz1DnemeYbpsnEf78AoXh6KkiD0OofzA+/VygHUmDa1is0f:GIXsgtvm1De5YlOx6lzBH46Umu1q
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" yborjrewily.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yborjrewily.exe -
Adds policy Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nykznthwfqlp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ysnlixuskeivsfhzwymgb.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qetlclcuguszqxt = "csjdwhauiyyhajhvo.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qetlclcuguszqxt = "jcwtpdzwngjvrdevrsfy.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nykznthwfqlp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jcwtpdzwngjvrdevrsfy.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qetlclcuguszqxt = "wohdylgcskmxsddtooa.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nykznthwfqlp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csjdwhauiyyhajhvo.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qetlclcuguszqxt = "lcupjvpkzqrbvfetnm.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qetlclcuguszqxt = "ysnlixuskeivsfhzwymgb.exe" ychpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qetlclcuguszqxt = "lcupjvpkzqrbvfetnm.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nykznthwfqlp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vkatlvngtihphpmz.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nykznthwfqlp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ysnlixuskeivsfhzwymgb.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qetlclcuguszqxt = "ysnlixuskeivsfhzwymgb.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nykznthwfqlp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csjdwhauiyyhajhvo.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nykznthwfqlp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lcupjvpkzqrbvfetnm.exe" ychpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nykznthwfqlp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csjdwhauiyyhajhvo.exe" yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qetlclcuguszqxt = "jcwtpdzwngjvrdevrsfy.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nykznthwfqlp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vkatlvngtihphpmz.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nykznthwfqlp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wohdylgcskmxsddtooa.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qetlclcuguszqxt = "csjdwhauiyyhajhvo.exe" ychpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qetlclcuguszqxt = "vkatlvngtihphpmz.exe" yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qetlclcuguszqxt = "vkatlvngtihphpmz.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qetlclcuguszqxt = "wohdylgcskmxsddtooa.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qetlclcuguszqxt = "lcupjvpkzqrbvfetnm.exe" yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nykznthwfqlp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jcwtpdzwngjvrdevrsfy.exe" yborjrewily.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\nykznthwfqlp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jcwtpdzwngjvrdevrsfy.exe" ychpw.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ychpw.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ychpw.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yborjrewily.exe -
Executes dropped EXE 4 IoCs
pid Process 3520 yborjrewily.exe 4368 ychpw.exe 4128 ychpw.exe 1760 yborjrewily.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation yborjrewily.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wohdylgcskmxsddtooa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csjdwhauiyyhajhvo.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wohdylgcskmxsddtooa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lcupjvpkzqrbvfetnm.exe" ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vkatlvngtihphpmz = "jcwtpdzwngjvrdevrsfy.exe" yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mylbqxmcmyuzo = "vkatlvngtihphpmz.exe" yborjrewily.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\naofvdtkviflbh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csjdwhauiyyhajhvo.exe ." yborjrewily.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mylbqxmcmyuzo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csjdwhauiyyhajhvo.exe" ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mylbqxmcmyuzo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wohdylgcskmxsddtooa.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wohdylgcskmxsddtooa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csjdwhauiyyhajhvo.exe" ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\csjdwhauiyyhajhvo = "vkatlvngtihphpmz.exe ." yborjrewily.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\csjdwhauiyyhajhvo = "jcwtpdzwngjvrdevrsfy.exe ." ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\csjdwhauiyyhajhvo = "csjdwhauiyyhajhvo.exe ." ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vkatlvngtihphpmz = "ysnlixuskeivsfhzwymgb.exe" ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\csjdwhauiyyhajhvo = "csjdwhauiyyhajhvo.exe ." ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\naofvdtkviflbh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wohdylgcskmxsddtooa.exe ." ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vkatlvngtihphpmz = "ysnlixuskeivsfhzwymgb.exe" yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lcupjvpkzqrbvfetnm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jcwtpdzwngjvrdevrsfy.exe ." ychpw.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce yborjrewily.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vkatlvngtihphpmz = "vkatlvngtihphpmz.exe" ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mylbqxmcmyuzo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vkatlvngtihphpmz.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wohdylgcskmxsddtooa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vkatlvngtihphpmz.exe" ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vkatlvngtihphpmz = "jcwtpdzwngjvrdevrsfy.exe" ychpw.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lcupjvpkzqrbvfetnm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ysnlixuskeivsfhzwymgb.exe ." ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mylbqxmcmyuzo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vkatlvngtihphpmz.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wohdylgcskmxsddtooa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ysnlixuskeivsfhzwymgb.exe" ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\csjdwhauiyyhajhvo = "lcupjvpkzqrbvfetnm.exe ." ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wohdylgcskmxsddtooa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jcwtpdzwngjvrdevrsfy.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\naofvdtkviflbh = "lcupjvpkzqrbvfetnm.exe ." ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mylbqxmcmyuzo = "lcupjvpkzqrbvfetnm.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lcupjvpkzqrbvfetnm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lcupjvpkzqrbvfetnm.exe ." ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mylbqxmcmyuzo = "wohdylgcskmxsddtooa.exe" ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mylbqxmcmyuzo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ysnlixuskeivsfhzwymgb.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\naofvdtkviflbh = "lcupjvpkzqrbvfetnm.exe ." ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mylbqxmcmyuzo = "ysnlixuskeivsfhzwymgb.exe" ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\csjdwhauiyyhajhvo = "vkatlvngtihphpmz.exe ." ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mylbqxmcmyuzo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jcwtpdzwngjvrdevrsfy.exe" ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\csjdwhauiyyhajhvo = "ysnlixuskeivsfhzwymgb.exe ." ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mylbqxmcmyuzo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lcupjvpkzqrbvfetnm.exe" ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\csjdwhauiyyhajhvo = "vkatlvngtihphpmz.exe ." ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lcupjvpkzqrbvfetnm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csjdwhauiyyhajhvo.exe ." ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lcupjvpkzqrbvfetnm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ysnlixuskeivsfhzwymgb.exe ." ychpw.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run yborjrewily.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce yborjrewily.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\csjdwhauiyyhajhvo = "csjdwhauiyyhajhvo.exe ." yborjrewily.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mylbqxmcmyuzo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ysnlixuskeivsfhzwymgb.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\naofvdtkviflbh = "ysnlixuskeivsfhzwymgb.exe ." ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mylbqxmcmyuzo = "vkatlvngtihphpmz.exe" ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vkatlvngtihphpmz = "lcupjvpkzqrbvfetnm.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lcupjvpkzqrbvfetnm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wohdylgcskmxsddtooa.exe ." ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\naofvdtkviflbh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lcupjvpkzqrbvfetnm.exe ." ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\naofvdtkviflbh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wohdylgcskmxsddtooa.exe ." ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\naofvdtkviflbh = "ysnlixuskeivsfhzwymgb.exe ." yborjrewily.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mylbqxmcmyuzo = "wohdylgcskmxsddtooa.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\lcupjvpkzqrbvfetnm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vkatlvngtihphpmz.exe ." ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mylbqxmcmyuzo = "jcwtpdzwngjvrdevrsfy.exe" ychpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wohdylgcskmxsddtooa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ysnlixuskeivsfhzwymgb.exe" ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vkatlvngtihphpmz = "ysnlixuskeivsfhzwymgb.exe" ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\naofvdtkviflbh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csjdwhauiyyhajhvo.exe ." ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\csjdwhauiyyhajhvo = "ysnlixuskeivsfhzwymgb.exe ." ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\naofvdtkviflbh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vkatlvngtihphpmz.exe ." ychpw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mylbqxmcmyuzo = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wohdylgcskmxsddtooa.exe" ychpw.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yborjrewily.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yborjrewily.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ychpw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ychpw.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 www.showmyipaddress.com 28 whatismyip.everdot.org 29 whatismyipaddress.com 43 whatismyip.everdot.org -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\csjdwhauiyyhajhvo.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\vkatlvngtihphpmz.exe ychpw.exe File opened for modification C:\Windows\SysWOW64\zyybdxzczyhzbtaxzgzyyb.xzc ychpw.exe File created C:\Windows\SysWOW64\qalzmresakehuxpxkcgqbpchuiqauxknf.asw ychpw.exe File opened for modification C:\Windows\SysWOW64\csjdwhauiyyhajhvo.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\ysnlixuskeivsfhzwymgb.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\wohdylgcskmxsddtooa.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\ysnlixuskeivsfhzwymgb.exe ychpw.exe File created C:\Windows\SysWOW64\zyybdxzczyhzbtaxzgzyyb.xzc ychpw.exe File opened for modification C:\Windows\SysWOW64\lcupjvpkzqrbvfetnm.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\csjdwhauiyyhajhvo.exe ychpw.exe File opened for modification C:\Windows\SysWOW64\lcupjvpkzqrbvfetnm.exe ychpw.exe File opened for modification C:\Windows\SysWOW64\pkgfdtrqjejxvjmfdgvqml.exe ychpw.exe File opened for modification C:\Windows\SysWOW64\vkatlvngtihphpmz.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\pkgfdtrqjejxvjmfdgvqml.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\vkatlvngtihphpmz.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\ysnlixuskeivsfhzwymgb.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\qalzmresakehuxpxkcgqbpchuiqauxknf.asw ychpw.exe File opened for modification C:\Windows\SysWOW64\jcwtpdzwngjvrdevrsfy.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\wohdylgcskmxsddtooa.exe ychpw.exe File opened for modification C:\Windows\SysWOW64\pkgfdtrqjejxvjmfdgvqml.exe ychpw.exe File opened for modification C:\Windows\SysWOW64\wohdylgcskmxsddtooa.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\pkgfdtrqjejxvjmfdgvqml.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\vkatlvngtihphpmz.exe ychpw.exe File opened for modification C:\Windows\SysWOW64\jcwtpdzwngjvrdevrsfy.exe ychpw.exe File opened for modification C:\Windows\SysWOW64\wohdylgcskmxsddtooa.exe ychpw.exe File opened for modification C:\Windows\SysWOW64\lcupjvpkzqrbvfetnm.exe ychpw.exe File opened for modification C:\Windows\SysWOW64\jcwtpdzwngjvrdevrsfy.exe ychpw.exe File opened for modification C:\Windows\SysWOW64\jcwtpdzwngjvrdevrsfy.exe yborjrewily.exe File opened for modification C:\Windows\SysWOW64\ysnlixuskeivsfhzwymgb.exe ychpw.exe File opened for modification C:\Windows\SysWOW64\csjdwhauiyyhajhvo.exe ychpw.exe File opened for modification C:\Windows\SysWOW64\lcupjvpkzqrbvfetnm.exe yborjrewily.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\zyybdxzczyhzbtaxzgzyyb.xzc ychpw.exe File created C:\Program Files (x86)\zyybdxzczyhzbtaxzgzyyb.xzc ychpw.exe File opened for modification C:\Program Files (x86)\qalzmresakehuxpxkcgqbpchuiqauxknf.asw ychpw.exe File created C:\Program Files (x86)\qalzmresakehuxpxkcgqbpchuiqauxknf.asw ychpw.exe -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\wohdylgcskmxsddtooa.exe yborjrewily.exe File opened for modification C:\Windows\pkgfdtrqjejxvjmfdgvqml.exe ychpw.exe File opened for modification C:\Windows\vkatlvngtihphpmz.exe ychpw.exe File opened for modification C:\Windows\lcupjvpkzqrbvfetnm.exe ychpw.exe File opened for modification C:\Windows\zyybdxzczyhzbtaxzgzyyb.xzc ychpw.exe File opened for modification C:\Windows\csjdwhauiyyhajhvo.exe yborjrewily.exe File created C:\Windows\zyybdxzczyhzbtaxzgzyyb.xzc ychpw.exe File opened for modification C:\Windows\csjdwhauiyyhajhvo.exe yborjrewily.exe File opened for modification C:\Windows\wohdylgcskmxsddtooa.exe yborjrewily.exe File opened for modification C:\Windows\csjdwhauiyyhajhvo.exe ychpw.exe File opened for modification C:\Windows\lcupjvpkzqrbvfetnm.exe yborjrewily.exe File opened for modification C:\Windows\jcwtpdzwngjvrdevrsfy.exe yborjrewily.exe File opened for modification C:\Windows\csjdwhauiyyhajhvo.exe ychpw.exe File created C:\Windows\qalzmresakehuxpxkcgqbpchuiqauxknf.asw ychpw.exe File opened for modification C:\Windows\qalzmresakehuxpxkcgqbpchuiqauxknf.asw ychpw.exe File opened for modification C:\Windows\ysnlixuskeivsfhzwymgb.exe yborjrewily.exe File opened for modification C:\Windows\wohdylgcskmxsddtooa.exe ychpw.exe File opened for modification C:\Windows\ysnlixuskeivsfhzwymgb.exe yborjrewily.exe File opened for modification C:\Windows\lcupjvpkzqrbvfetnm.exe yborjrewily.exe File opened for modification C:\Windows\wohdylgcskmxsddtooa.exe ychpw.exe File opened for modification C:\Windows\ysnlixuskeivsfhzwymgb.exe ychpw.exe File opened for modification C:\Windows\pkgfdtrqjejxvjmfdgvqml.exe ychpw.exe File opened for modification C:\Windows\vkatlvngtihphpmz.exe yborjrewily.exe File opened for modification C:\Windows\lcupjvpkzqrbvfetnm.exe ychpw.exe File opened for modification C:\Windows\jcwtpdzwngjvrdevrsfy.exe ychpw.exe File opened for modification C:\Windows\vkatlvngtihphpmz.exe yborjrewily.exe File opened for modification C:\Windows\vkatlvngtihphpmz.exe ychpw.exe File opened for modification C:\Windows\pkgfdtrqjejxvjmfdgvqml.exe yborjrewily.exe File opened for modification C:\Windows\ysnlixuskeivsfhzwymgb.exe ychpw.exe File opened for modification C:\Windows\jcwtpdzwngjvrdevrsfy.exe ychpw.exe File opened for modification C:\Windows\pkgfdtrqjejxvjmfdgvqml.exe yborjrewily.exe File opened for modification C:\Windows\jcwtpdzwngjvrdevrsfy.exe yborjrewily.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 4368 ychpw.exe 4368 ychpw.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 4368 ychpw.exe 4368 ychpw.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4368 ychpw.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2924 wrote to memory of 3520 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 80 PID 2924 wrote to memory of 3520 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 80 PID 2924 wrote to memory of 3520 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 80 PID 3520 wrote to memory of 4368 3520 yborjrewily.exe 84 PID 3520 wrote to memory of 4368 3520 yborjrewily.exe 84 PID 3520 wrote to memory of 4368 3520 yborjrewily.exe 84 PID 3520 wrote to memory of 4128 3520 yborjrewily.exe 85 PID 3520 wrote to memory of 4128 3520 yborjrewily.exe 85 PID 3520 wrote to memory of 4128 3520 yborjrewily.exe 85 PID 2924 wrote to memory of 1760 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 91 PID 2924 wrote to memory of 1760 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 91 PID 2924 wrote to memory of 1760 2924 9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe 91 -
System policy modification 1 TTPs 41 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" yborjrewily.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" yborjrewily.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" yborjrewily.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" ychpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" ychpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yborjrewily.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" ychpw.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" ychpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System yborjrewily.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe"C:\Users\Admin\AppData\Local\Temp\9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\yborjrewily.exe"C:\Users\Admin\AppData\Local\Temp\yborjrewily.exe" "c:\users\admin\appdata\local\temp\9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\ychpw.exe"C:\Users\Admin\AppData\Local\Temp\ychpw.exe" "-C:\Users\Admin\AppData\Local\Temp\vkatlvngtihphpmz.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:4368
-
-
C:\Users\Admin\AppData\Local\Temp\ychpw.exe"C:\Users\Admin\AppData\Local\Temp\ychpw.exe" "-C:\Users\Admin\AppData\Local\Temp\vkatlvngtihphpmz.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:4128
-
-
-
C:\Users\Admin\AppData\Local\Temp\yborjrewily.exe"C:\Users\Admin\AppData\Local\Temp\yborjrewily.exe" "c:\users\admin\appdata\local\temp\9f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:1760
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
320KB
MD51876fa9491a14cb7cd968f46002372ec
SHA1194663ef0739a04f93aa7c7d681e008100e437a5
SHA256160674f331758a1fc1ffa01edaf4fcb29dff5b79efc4c1988cbb822532a49454
SHA5122aeb951a108905a9d0d255e7f609b211fd63276ce669eb55e07b183ce27dd4a9dbb70bee6ab11c605dda6c20534ea5758da67d7bd41d2f360efe4eba682b55e2
-
Filesize
320KB
MD51876fa9491a14cb7cd968f46002372ec
SHA1194663ef0739a04f93aa7c7d681e008100e437a5
SHA256160674f331758a1fc1ffa01edaf4fcb29dff5b79efc4c1988cbb822532a49454
SHA5122aeb951a108905a9d0d255e7f609b211fd63276ce669eb55e07b183ce27dd4a9dbb70bee6ab11c605dda6c20534ea5758da67d7bd41d2f360efe4eba682b55e2
-
Filesize
320KB
MD51876fa9491a14cb7cd968f46002372ec
SHA1194663ef0739a04f93aa7c7d681e008100e437a5
SHA256160674f331758a1fc1ffa01edaf4fcb29dff5b79efc4c1988cbb822532a49454
SHA5122aeb951a108905a9d0d255e7f609b211fd63276ce669eb55e07b183ce27dd4a9dbb70bee6ab11c605dda6c20534ea5758da67d7bd41d2f360efe4eba682b55e2
-
Filesize
708KB
MD508b68a3e0e78f7bf6ab73e5acfb39187
SHA18434f65629bc50135143372894e19e006211ebff
SHA25607b06ea05d94f322cf43a25bc57ebd2c97e0639fa4d9f7e42ec9fdbdfc17dc7f
SHA512f25d5d4336c265e31e1b65dd76d8b10bfa34ae388e1f2988933f970a849afa58a5197d1ccefb1004fdca6af7ed7745b97186611bec588814390572afb43473fb
-
Filesize
708KB
MD508b68a3e0e78f7bf6ab73e5acfb39187
SHA18434f65629bc50135143372894e19e006211ebff
SHA25607b06ea05d94f322cf43a25bc57ebd2c97e0639fa4d9f7e42ec9fdbdfc17dc7f
SHA512f25d5d4336c265e31e1b65dd76d8b10bfa34ae388e1f2988933f970a849afa58a5197d1ccefb1004fdca6af7ed7745b97186611bec588814390572afb43473fb
-
Filesize
708KB
MD508b68a3e0e78f7bf6ab73e5acfb39187
SHA18434f65629bc50135143372894e19e006211ebff
SHA25607b06ea05d94f322cf43a25bc57ebd2c97e0639fa4d9f7e42ec9fdbdfc17dc7f
SHA512f25d5d4336c265e31e1b65dd76d8b10bfa34ae388e1f2988933f970a849afa58a5197d1ccefb1004fdca6af7ed7745b97186611bec588814390572afb43473fb
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a
-
Filesize
1016KB
MD54f1d379e9c2e953f8c10b3460ef54880
SHA1d08c5c9279e1b6db95021e9d32c351a84729efb0
SHA2569f1390d294ddd6ddde5074ba91e51dffdfddcab73929a0b39ea2321cb6bcc870
SHA5123daedf019b8b2b97e85a54bb82d7f258c1f8c125d2aa7e75f18f32ba739ed5555ebb16be52e2950e1a6336e339ad79f937eb86c0ad4b7b250dd8a7b7e3da5d0a