Analysis
-
max time kernel
157s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 20:42
Static task
static1
Behavioral task
behavioral1
Sample
8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe
Resource
win10v2004-20220812-en
General
-
Target
8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe
-
Size
504KB
-
MD5
a20aee683eb082a661ebeb02bbfe31d0
-
SHA1
8a80849c093e48d60f353cfb164ace797962d576
-
SHA256
8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
-
SHA512
25870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
SSDEEP
12288:ZgkDxdkL+6JNgKVcRa+fpHyWs3OBH4pUyX:JxsKXa+hHyWseBg7X
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" grrfdxtjqbb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe -
Adds policy Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qxfptwmv = "dxspgwzvkeqlvtbfllrlg.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\dhmtu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\btmhwklfskunvrxzdbf.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qxfptwmv = "dxspgwzvkeqlvtbfllrlg.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\dhmtu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\apfxjusjtipfkdgf.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qxfptwmv = "btmhwklfskunvrxzdbf.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qxfptwmv = "hxohugfxiygxdxbbd.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qxfptwmv = "hxohugfxiygxdxbbd.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\dhmtu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\qhzthuunzqzrytyzcz.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\dhmtu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\qhzthuunzqzrytyzcz.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\dhmtu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ohbxncezngrlurybgfkd.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\dhmtu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hxohugfxiygxdxbbd.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qxfptwmv = "qhzthuunzqzrytyzcz.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qxfptwmv = "ohbxncezngrlurybgfkd.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qxfptwmv = "dxspgwzvkeqlvtbfllrlg.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qxfptwmv = "hxohugfxiygxdxbbd.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\dhmtu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dxspgwzvkeqlvtbfllrlg.exe" grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\dhmtu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\btmhwklfskunvrxzdbf.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qxfptwmv = "qhzthuunzqzrytyzcz.exe" dhmtu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\dhmtu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\apfxjusjtipfkdgf.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qxfptwmv = "hxohugfxiygxdxbbd.exe" dhmtu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\dhmtu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dxspgwzvkeqlvtbfllrlg.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qxfptwmv = "apfxjusjtipfkdgf.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qxfptwmv = "apfxjusjtipfkdgf.exe" dhmtu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\qxfptwmv = "ohbxncezngrlurybgfkd.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\dhmtu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hxohugfxiygxdxbbd.exe" grrfdxtjqbb.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" dhmtu.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" dhmtu.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" grrfdxtjqbb.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" dhmtu.exe -
Executes dropped EXE 4 IoCs
pid Process 5092 grrfdxtjqbb.exe 1980 dhmtu.exe 4416 dhmtu.exe 1832 grrfdxtjqbb.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation grrfdxtjqbb.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\otzhjk = "hxohugfxiygxdxbbd.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bhoxacr = "hxohugfxiygxdxbbd.exe ." dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\otzhjk = "apfxjusjtipfkdgf.exe" dhmtu.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hpyjosjtw = "hxohugfxiygxdxbbd.exe" dhmtu.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hpyjosjtw = "btmhwklfskunvrxzdbf.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\otzhjk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ohbxncezngrlurybgfkd.exe" dhmtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hpyjosjtw = "hxohugfxiygxdxbbd.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\otzhjk = "qhzthuunzqzrytyzcz.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\otzhjk = "apfxjusjtipfkdgf.exe" grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\otzhjk = "ohbxncezngrlurybgfkd.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bhoxacr = "apfxjusjtipfkdgf.exe ." dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sdpdlsmzfqtf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\qhzthuunzqzrytyzcz.exe" grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dhmtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hpyjosjtw = "dxspgwzvkeqlvtbfllrlg.exe" dhmtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hpyjosjtw = "dxspgwzvkeqlvtbfllrlg.exe" dhmtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\otzhjk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\btmhwklfskunvrxzdbf.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ajtflqitxg = "dxspgwzvkeqlvtbfllrlg.exe ." dhmtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\otzhjk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\qhzthuunzqzrytyzcz.exe" dhmtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hpyjosjtw = "dxspgwzvkeqlvtbfllrlg.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vfqdkqjvakm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ohbxncezngrlurybgfkd.exe ." grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sdpdlsmzfqtf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ohbxncezngrlurybgfkd.exe" dhmtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hpyjosjtw = "btmhwklfskunvrxzdbf.exe" dhmtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bhoxacr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ohbxncezngrlurybgfkd.exe ." dhmtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ajtflqitxg = "hxohugfxiygxdxbbd.exe ." dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sdpdlsmzfqtf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\apfxjusjtipfkdgf.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sdpdlsmzfqtf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ohbxncezngrlurybgfkd.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vfqdkqjvakm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dxspgwzvkeqlvtbfllrlg.exe ." dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\otzhjk = "btmhwklfskunvrxzdbf.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\otzhjk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dxspgwzvkeqlvtbfllrlg.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sdpdlsmzfqtf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hxohugfxiygxdxbbd.exe" dhmtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hpyjosjtw = "qhzthuunzqzrytyzcz.exe" dhmtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bhoxacr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\qhzthuunzqzrytyzcz.exe ." grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\otzhjk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\apfxjusjtipfkdgf.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vfqdkqjvakm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\qhzthuunzqzrytyzcz.exe ." dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vfqdkqjvakm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hxohugfxiygxdxbbd.exe ." dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\otzhjk = "ohbxncezngrlurybgfkd.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vfqdkqjvakm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\btmhwklfskunvrxzdbf.exe ." grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bhoxacr = "btmhwklfskunvrxzdbf.exe ." dhmtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bhoxacr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dxspgwzvkeqlvtbfllrlg.exe ." dhmtu.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\otzhjk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\apfxjusjtipfkdgf.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sdpdlsmzfqtf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\qhzthuunzqzrytyzcz.exe" dhmtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ajtflqitxg = "btmhwklfskunvrxzdbf.exe ." grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bhoxacr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\btmhwklfskunvrxzdbf.exe ." grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hpyjosjtw = "apfxjusjtipfkdgf.exe" dhmtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bhoxacr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\qhzthuunzqzrytyzcz.exe ." dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sdpdlsmzfqtf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dxspgwzvkeqlvtbfllrlg.exe" dhmtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\otzhjk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dxspgwzvkeqlvtbfllrlg.exe" grrfdxtjqbb.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ajtflqitxg = "apfxjusjtipfkdgf.exe ." dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sdpdlsmzfqtf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\apfxjusjtipfkdgf.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bhoxacr = "qhzthuunzqzrytyzcz.exe ." dhmtu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ajtflqitxg = "ohbxncezngrlurybgfkd.exe ." dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\otzhjk = "btmhwklfskunvrxzdbf.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sdpdlsmzfqtf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\btmhwklfskunvrxzdbf.exe" dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sdpdlsmzfqtf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dxspgwzvkeqlvtbfllrlg.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bhoxacr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\hxohugfxiygxdxbbd.exe ." dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\vfqdkqjvakm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ohbxncezngrlurybgfkd.exe ." dhmtu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bhoxacr = "ohbxncezngrlurybgfkd.exe ." dhmtu.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dhmtu.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dhmtu.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dhmtu.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 37 whatismyip.everdot.org 40 whatismyipaddress.com 50 www.showmyipaddress.com 52 whatismyip.everdot.org -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf dhmtu.exe File opened for modification C:\autorun.inf dhmtu.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\qhzthuunzqzrytyzcz.exe dhmtu.exe File opened for modification C:\Windows\SysWOW64\ohbxncezngrlurybgfkd.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\upljbswtjernyxglstavrp.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\dxspgwzvkeqlvtbfllrlg.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\ohbxncezngrlurybgfkd.exe dhmtu.exe File opened for modification C:\Windows\SysWOW64\apfxjusjtipfkdgf.exe dhmtu.exe File opened for modification C:\Windows\SysWOW64\hxohugfxiygxdxbbd.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\dxspgwzvkeqlvtbfllrlg.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\apfxjusjtipfkdgf.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\qhzthuunzqzrytyzcz.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\ohbxncezngrlurybgfkd.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\btmhwklfskunvrxzdbf.exe dhmtu.exe File opened for modification C:\Windows\SysWOW64\fdcdyszzsqgftvhpzdnlk.gah dhmtu.exe File opened for modification C:\Windows\SysWOW64\btmhwklfskunvrxzdbf.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\dxspgwzvkeqlvtbfllrlg.exe dhmtu.exe File opened for modification C:\Windows\SysWOW64\qhzthuunzqzrytyzcz.exe dhmtu.exe File opened for modification C:\Windows\SysWOW64\dxspgwzvkeqlvtbfllrlg.exe dhmtu.exe File created C:\Windows\SysWOW64\ajtflqitxghrqdatodyhrdjogrvefpob.rmb dhmtu.exe File opened for modification C:\Windows\SysWOW64\hxohugfxiygxdxbbd.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\qhzthuunzqzrytyzcz.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\upljbswtjernyxglstavrp.exe dhmtu.exe File opened for modification C:\Windows\SysWOW64\hxohugfxiygxdxbbd.exe dhmtu.exe File opened for modification C:\Windows\SysWOW64\ohbxncezngrlurybgfkd.exe dhmtu.exe File opened for modification C:\Windows\SysWOW64\ajtflqitxghrqdatodyhrdjogrvefpob.rmb dhmtu.exe File opened for modification C:\Windows\SysWOW64\btmhwklfskunvrxzdbf.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\apfxjusjtipfkdgf.exe dhmtu.exe File opened for modification C:\Windows\SysWOW64\apfxjusjtipfkdgf.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\upljbswtjernyxglstavrp.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\hxohugfxiygxdxbbd.exe dhmtu.exe File opened for modification C:\Windows\SysWOW64\btmhwklfskunvrxzdbf.exe dhmtu.exe File opened for modification C:\Windows\SysWOW64\upljbswtjernyxglstavrp.exe dhmtu.exe File created C:\Windows\SysWOW64\fdcdyszzsqgftvhpzdnlk.gah dhmtu.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\ajtflqitxghrqdatodyhrdjogrvefpob.rmb dhmtu.exe File created C:\Program Files (x86)\ajtflqitxghrqdatodyhrdjogrvefpob.rmb dhmtu.exe File opened for modification C:\Program Files (x86)\fdcdyszzsqgftvhpzdnlk.gah dhmtu.exe File created C:\Program Files (x86)\fdcdyszzsqgftvhpzdnlk.gah dhmtu.exe -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\dxspgwzvkeqlvtbfllrlg.exe dhmtu.exe File opened for modification C:\Windows\dxspgwzvkeqlvtbfllrlg.exe dhmtu.exe File opened for modification C:\Windows\ajtflqitxghrqdatodyhrdjogrvefpob.rmb dhmtu.exe File created C:\Windows\ajtflqitxghrqdatodyhrdjogrvefpob.rmb dhmtu.exe File opened for modification C:\Windows\qhzthuunzqzrytyzcz.exe grrfdxtjqbb.exe File opened for modification C:\Windows\hxohugfxiygxdxbbd.exe grrfdxtjqbb.exe File opened for modification C:\Windows\qhzthuunzqzrytyzcz.exe dhmtu.exe File opened for modification C:\Windows\ohbxncezngrlurybgfkd.exe dhmtu.exe File opened for modification C:\Windows\qhzthuunzqzrytyzcz.exe dhmtu.exe File opened for modification C:\Windows\dxspgwzvkeqlvtbfllrlg.exe grrfdxtjqbb.exe File opened for modification C:\Windows\hxohugfxiygxdxbbd.exe dhmtu.exe File opened for modification C:\Windows\qhzthuunzqzrytyzcz.exe grrfdxtjqbb.exe File opened for modification C:\Windows\apfxjusjtipfkdgf.exe dhmtu.exe File opened for modification C:\Windows\hxohugfxiygxdxbbd.exe dhmtu.exe File opened for modification C:\Windows\apfxjusjtipfkdgf.exe dhmtu.exe File opened for modification C:\Windows\apfxjusjtipfkdgf.exe grrfdxtjqbb.exe File opened for modification C:\Windows\upljbswtjernyxglstavrp.exe grrfdxtjqbb.exe File opened for modification C:\Windows\upljbswtjernyxglstavrp.exe dhmtu.exe File opened for modification C:\Windows\apfxjusjtipfkdgf.exe grrfdxtjqbb.exe File opened for modification C:\Windows\btmhwklfskunvrxzdbf.exe grrfdxtjqbb.exe File opened for modification C:\Windows\btmhwklfskunvrxzdbf.exe dhmtu.exe File opened for modification C:\Windows\btmhwklfskunvrxzdbf.exe dhmtu.exe File opened for modification C:\Windows\upljbswtjernyxglstavrp.exe dhmtu.exe File opened for modification C:\Windows\ohbxncezngrlurybgfkd.exe grrfdxtjqbb.exe File created C:\Windows\fdcdyszzsqgftvhpzdnlk.gah dhmtu.exe File opened for modification C:\Windows\upljbswtjernyxglstavrp.exe grrfdxtjqbb.exe File opened for modification C:\Windows\fdcdyszzsqgftvhpzdnlk.gah dhmtu.exe File opened for modification C:\Windows\ohbxncezngrlurybgfkd.exe grrfdxtjqbb.exe File opened for modification C:\Windows\dxspgwzvkeqlvtbfllrlg.exe grrfdxtjqbb.exe File opened for modification C:\Windows\ohbxncezngrlurybgfkd.exe dhmtu.exe File opened for modification C:\Windows\hxohugfxiygxdxbbd.exe grrfdxtjqbb.exe File opened for modification C:\Windows\btmhwklfskunvrxzdbf.exe grrfdxtjqbb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1980 dhmtu.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2512 wrote to memory of 5092 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 81 PID 2512 wrote to memory of 5092 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 81 PID 2512 wrote to memory of 5092 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 81 PID 5092 wrote to memory of 1980 5092 grrfdxtjqbb.exe 84 PID 5092 wrote to memory of 1980 5092 grrfdxtjqbb.exe 84 PID 5092 wrote to memory of 1980 5092 grrfdxtjqbb.exe 84 PID 5092 wrote to memory of 4416 5092 grrfdxtjqbb.exe 85 PID 5092 wrote to memory of 4416 5092 grrfdxtjqbb.exe 85 PID 5092 wrote to memory of 4416 5092 grrfdxtjqbb.exe 85 PID 2512 wrote to memory of 1832 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 92 PID 2512 wrote to memory of 1832 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 92 PID 2512 wrote to memory of 1832 2512 8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe 92 -
System policy modification 1 TTPs 41 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" dhmtu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer dhmtu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dhmtu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" dhmtu.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe"C:\Users\Admin\AppData\Local\Temp\8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\grrfdxtjqbb.exe"C:\Users\Admin\AppData\Local\Temp\grrfdxtjqbb.exe" "c:\users\admin\appdata\local\temp\8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\dhmtu.exe"C:\Users\Admin\AppData\Local\Temp\dhmtu.exe" "-C:\Users\Admin\AppData\Local\Temp\apfxjusjtipfkdgf.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\dhmtu.exe"C:\Users\Admin\AppData\Local\Temp\dhmtu.exe" "-C:\Users\Admin\AppData\Local\Temp\apfxjusjtipfkdgf.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:4416
-
-
-
C:\Users\Admin\AppData\Local\Temp\grrfdxtjqbb.exe"C:\Users\Admin\AppData\Local\Temp\grrfdxtjqbb.exe" "c:\users\admin\appdata\local\temp\8c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:1832
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
700KB
MD57236e99418d6fd9df044f0fefa844b3a
SHA1301cdb5733f1b98f7b959e3cdacbd5f243497f81
SHA25635b9c5de0bd0eea4c05156567db292fc53a298215c343569ef81745eec64f4e2
SHA512db3c29c355cb4ac4e3f99ad39b33125c0072d56da88d59e6330a67eaf372f5de3df6fae1a1551fb0c4b5fe445b93a95e22eb89dc30d2ce6039e8b324260e16f8
-
Filesize
700KB
MD57236e99418d6fd9df044f0fefa844b3a
SHA1301cdb5733f1b98f7b959e3cdacbd5f243497f81
SHA25635b9c5de0bd0eea4c05156567db292fc53a298215c343569ef81745eec64f4e2
SHA512db3c29c355cb4ac4e3f99ad39b33125c0072d56da88d59e6330a67eaf372f5de3df6fae1a1551fb0c4b5fe445b93a95e22eb89dc30d2ce6039e8b324260e16f8
-
Filesize
700KB
MD57236e99418d6fd9df044f0fefa844b3a
SHA1301cdb5733f1b98f7b959e3cdacbd5f243497f81
SHA25635b9c5de0bd0eea4c05156567db292fc53a298215c343569ef81745eec64f4e2
SHA512db3c29c355cb4ac4e3f99ad39b33125c0072d56da88d59e6330a67eaf372f5de3df6fae1a1551fb0c4b5fe445b93a95e22eb89dc30d2ce6039e8b324260e16f8
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af
-
Filesize
504KB
MD5a20aee683eb082a661ebeb02bbfe31d0
SHA18a80849c093e48d60f353cfb164ace797962d576
SHA2568c1b59cbcdbb7f64639dd48a8da2b9834c5e18f3b4fd5052eba79a00dd88a8c7
SHA51225870a27756b03974325f8d0155ca71f4f88ab7428b27732a0d2b77d5958498d0d4dcdff934c5cdaa67c7a9adf9cf77c592398eed2ed29eb97bf120d46ad70af