Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe
Resource
win10v2004-20220901-en
General
-
Target
cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe
-
Size
504KB
-
MD5
43eaf4f250ffa09bab2b005d53f54240
-
SHA1
5d0319763f638a41c98bfcd212b2f0b811d4959b
-
SHA256
cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
-
SHA512
1a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
SSDEEP
12288:ygkDxdkL+6JNgKVcRa+fpHyWs3OBH4pUgA:8xsKXa+hHyWseBgXA
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" pwyrqtqlzgi.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pwyrqtqlzgi.exe -
Adds policy Run key to start application 2 TTPs 30 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wymamzdszlv = "bibuldmgsjykrptb.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqbmvfgs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cmieytfcrldscdkvadg.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wymamzdszlv = "eqomiftsjfzqcfobinsec.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqbmvfgs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\paxuplywmhaqbdlxdhlw.exe" pwyrqtqlzgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wymamzdszlv = "bibuldmgsjykrptb.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wymamzdszlv = "iqkewpzuhzpckjoxa.exe" pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqbmvfgs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iqkewpzuhzpckjoxa.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wymamzdszlv = "cmieytfcrldscdkvadg.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqbmvfgs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bibuldmgsjykrptb.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqbmvfgs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bibuldmgsjykrptb.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqbmvfgs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\paxuplywmhaqbdlxdhlw.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wymamzdszlv = "cmieytfcrldscdkvadg.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wymamzdszlv = "ravqjdokyriwfflvzb.exe" cakucll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wymamzdszlv = "ravqjdokyriwfflvzb.exe" pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wymamzdszlv = "ravqjdokyriwfflvzb.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqbmvfgs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eqomiftsjfzqcfobinsec.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqbmvfgs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eqomiftsjfzqcfobinsec.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqbmvfgs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\paxuplywmhaqbdlxdhlw.exe" pwyrqtqlzgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wymamzdszlv = "iqkewpzuhzpckjoxa.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wymamzdszlv = "eqomiftsjfzqcfobinsec.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wymamzdszlv = "paxuplywmhaqbdlxdhlw.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wymamzdszlv = "paxuplywmhaqbdlxdhlw.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqbmvfgs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ravqjdokyriwfflvzb.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\wymamzdszlv = "iqkewpzuhzpckjoxa.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqbmvfgs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\paxuplywmhaqbdlxdhlw.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rqbmvfgs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ravqjdokyriwfflvzb.exe" cakucll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run pwyrqtqlzgi.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" pwyrqtqlzgi.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cakucll.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cakucll.exe -
Executes dropped EXE 4 IoCs
pid Process 2444 pwyrqtqlzgi.exe 1672 cakucll.exe 1832 cakucll.exe 3616 pwyrqtqlzgi.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation pwyrqtqlzgi.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wcumctbufvjuaxa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bibuldmgsjykrptb.exe" pwyrqtqlzgi.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bcpcnzcqwh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eqomiftsjfzqcfobinsec.exe ." pwyrqtqlzgi.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bcpcnzcqwh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eqomiftsjfzqcfobinsec.exe ." cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\typgvlskujwglh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eqomiftsjfzqcfobinsec.exe ." cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bcpcnzcqwh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ravqjdokyriwfflvzb.exe ." cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bcpcnzcqwh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bibuldmgsjykrptb.exe ." cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iiugqbdqv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bibuldmgsjykrptb.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\typgvlskujwglh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bibuldmgsjykrptb.exe ." pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\typgvlskujwglh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bibuldmgsjykrptb.exe ." cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\swmcqflclzluy = "eqomiftsjfzqcfobinsec.exe ." cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\iiugqbdqv = "iqkewpzuhzpckjoxa.exe" cakucll.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\typgvlskujwglh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cmieytfcrldscdkvadg.exe ." cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\swmcqflclzluy = "paxuplywmhaqbdlxdhlw.exe ." cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\typgvlskujwglh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iqkewpzuhzpckjoxa.exe ." cakucll.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\typgvlskujwglh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bibuldmgsjykrptb.exe ." cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\twlanbgwerck = "ravqjdokyriwfflvzb.exe" cakucll.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce pwyrqtqlzgi.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\swmcqflclzluy = "cmieytfcrldscdkvadg.exe ." pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wcumctbufvjuaxa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\paxuplywmhaqbdlxdhlw.exe" cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\swmcqflclzluy = "ravqjdokyriwfflvzb.exe ." cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\typgvlskujwglh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eqomiftsjfzqcfobinsec.exe ." cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\twlanbgwerck = "iqkewpzuhzpckjoxa.exe" pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wcumctbufvjuaxa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iqkewpzuhzpckjoxa.exe" cakucll.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run pwyrqtqlzgi.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\swmcqflclzluy = "ravqjdokyriwfflvzb.exe ." cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wcumctbufvjuaxa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ravqjdokyriwfflvzb.exe" cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bcpcnzcqwh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\paxuplywmhaqbdlxdhlw.exe ." cakucll.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wcumctbufvjuaxa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\paxuplywmhaqbdlxdhlw.exe" cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iiugqbdqv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eqomiftsjfzqcfobinsec.exe" cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iiugqbdqv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cmieytfcrldscdkvadg.exe" pwyrqtqlzgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\iiugqbdqv = "eqomiftsjfzqcfobinsec.exe" cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\swmcqflclzluy = "iqkewpzuhzpckjoxa.exe ." cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\iiugqbdqv = "bibuldmgsjykrptb.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bcpcnzcqwh = "eqomiftsjfzqcfobinsec.exe ." cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bcpcnzcqwh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\paxuplywmhaqbdlxdhlw.exe ." cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bcpcnzcqwh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iqkewpzuhzpckjoxa.exe ." cakucll.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\twlanbgwerck = "bibuldmgsjykrptb.exe" cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bcpcnzcqwh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eqomiftsjfzqcfobinsec.exe ." cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\bcpcnzcqwh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ravqjdokyriwfflvzb.exe ." cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\typgvlskujwglh = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cmieytfcrldscdkvadg.exe ." cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iiugqbdqv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\iqkewpzuhzpckjoxa.exe" cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\twlanbgwerck = "eqomiftsjfzqcfobinsec.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bcpcnzcqwh = "ravqjdokyriwfflvzb.exe ." cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bcpcnzcqwh = "iqkewpzuhzpckjoxa.exe ." cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\iiugqbdqv = "eqomiftsjfzqcfobinsec.exe" pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\iiugqbdqv = "bibuldmgsjykrptb.exe" pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wcumctbufvjuaxa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cmieytfcrldscdkvadg.exe" cakucll.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iiugqbdqv = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ravqjdokyriwfflvzb.exe" cakucll.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\swmcqflclzluy = "cmieytfcrldscdkvadg.exe ." cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\twlanbgwerck = "cmieytfcrldscdkvadg.exe" cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\twlanbgwerck = "ravqjdokyriwfflvzb.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\iiugqbdqv = "paxuplywmhaqbdlxdhlw.exe" pwyrqtqlzgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run cakucll.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\twlanbgwerck = "cmieytfcrldscdkvadg.exe" cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bcpcnzcqwh = "cmieytfcrldscdkvadg.exe ." cakucll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bcpcnzcqwh = "iqkewpzuhzpckjoxa.exe ." pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wcumctbufvjuaxa = "C:\\Users\\Admin\\AppData\\Local\\Temp\\eqomiftsjfzqcfobinsec.exe" cakucll.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pwyrqtqlzgi.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cakucll.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cakucll.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pwyrqtqlzgi.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pwyrqtqlzgi.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 www.showmyipaddress.com 14 whatismyip.everdot.org 18 whatismyipaddress.com 23 whatismyip.everdot.org 43 whatismyip.everdot.org -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf cakucll.exe File created C:\autorun.inf cakucll.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\iqkewpzuhzpckjoxa.exe cakucll.exe File opened for modification C:\Windows\SysWOW64\vqxejpmuuzccxjbxnbpkrydjgo.tww cakucll.exe File opened for modification C:\Windows\SysWOW64\eqomiftsjfzqcfobinsec.exe cakucll.exe File opened for modification C:\Windows\SysWOW64\vihgdbqqifasfjthpvbonm.exe cakucll.exe File created C:\Windows\SysWOW64\wcumctbufvjuaxahihgmewmdlepftekhkrsrq.ogw cakucll.exe File opened for modification C:\Windows\SysWOW64\paxuplywmhaqbdlxdhlw.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\cmieytfcrldscdkvadg.exe cakucll.exe File opened for modification C:\Windows\SysWOW64\paxuplywmhaqbdlxdhlw.exe cakucll.exe File opened for modification C:\Windows\SysWOW64\iqkewpzuhzpckjoxa.exe cakucll.exe File opened for modification C:\Windows\SysWOW64\vihgdbqqifasfjthpvbonm.exe cakucll.exe File created C:\Windows\SysWOW64\vqxejpmuuzccxjbxnbpkrydjgo.tww cakucll.exe File opened for modification C:\Windows\SysWOW64\iqkewpzuhzpckjoxa.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\cmieytfcrldscdkvadg.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\eqomiftsjfzqcfobinsec.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\eqomiftsjfzqcfobinsec.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\vihgdbqqifasfjthpvbonm.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\bibuldmgsjykrptb.exe cakucll.exe File opened for modification C:\Windows\SysWOW64\ravqjdokyriwfflvzb.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\ravqjdokyriwfflvzb.exe cakucll.exe File opened for modification C:\Windows\SysWOW64\eqomiftsjfzqcfobinsec.exe cakucll.exe File opened for modification C:\Windows\SysWOW64\ravqjdokyriwfflvzb.exe cakucll.exe File opened for modification C:\Windows\SysWOW64\ravqjdokyriwfflvzb.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\wcumctbufvjuaxahihgmewmdlepftekhkrsrq.ogw cakucll.exe File opened for modification C:\Windows\SysWOW64\paxuplywmhaqbdlxdhlw.exe cakucll.exe File opened for modification C:\Windows\SysWOW64\vihgdbqqifasfjthpvbonm.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\bibuldmgsjykrptb.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\paxuplywmhaqbdlxdhlw.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\bibuldmgsjykrptb.exe cakucll.exe File opened for modification C:\Windows\SysWOW64\bibuldmgsjykrptb.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\iqkewpzuhzpckjoxa.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\cmieytfcrldscdkvadg.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\cmieytfcrldscdkvadg.exe cakucll.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\vqxejpmuuzccxjbxnbpkrydjgo.tww cakucll.exe File created C:\Program Files (x86)\vqxejpmuuzccxjbxnbpkrydjgo.tww cakucll.exe File opened for modification C:\Program Files (x86)\wcumctbufvjuaxahihgmewmdlepftekhkrsrq.ogw cakucll.exe File created C:\Program Files (x86)\wcumctbufvjuaxahihgmewmdlepftekhkrsrq.ogw cakucll.exe -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\paxuplywmhaqbdlxdhlw.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\eqomiftsjfzqcfobinsec.exe pwyrqtqlzgi.exe File created C:\Windows\vqxejpmuuzccxjbxnbpkrydjgo.tww cakucll.exe File opened for modification C:\Windows\iqkewpzuhzpckjoxa.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\vihgdbqqifasfjthpvbonm.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\iqkewpzuhzpckjoxa.exe cakucll.exe File opened for modification C:\Windows\ravqjdokyriwfflvzb.exe cakucll.exe File opened for modification C:\Windows\eqomiftsjfzqcfobinsec.exe cakucll.exe File opened for modification C:\Windows\iqkewpzuhzpckjoxa.exe cakucll.exe File created C:\Windows\wcumctbufvjuaxahihgmewmdlepftekhkrsrq.ogw cakucll.exe File opened for modification C:\Windows\eqomiftsjfzqcfobinsec.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\ravqjdokyriwfflvzb.exe cakucll.exe File opened for modification C:\Windows\paxuplywmhaqbdlxdhlw.exe cakucll.exe File opened for modification C:\Windows\iqkewpzuhzpckjoxa.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\cmieytfcrldscdkvadg.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\cmieytfcrldscdkvadg.exe cakucll.exe File opened for modification C:\Windows\eqomiftsjfzqcfobinsec.exe cakucll.exe File opened for modification C:\Windows\vqxejpmuuzccxjbxnbpkrydjgo.tww cakucll.exe File opened for modification C:\Windows\ravqjdokyriwfflvzb.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\vihgdbqqifasfjthpvbonm.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\cmieytfcrldscdkvadg.exe cakucll.exe File opened for modification C:\Windows\vihgdbqqifasfjthpvbonm.exe cakucll.exe File opened for modification C:\Windows\bibuldmgsjykrptb.exe cakucll.exe File opened for modification C:\Windows\vihgdbqqifasfjthpvbonm.exe cakucll.exe File opened for modification C:\Windows\bibuldmgsjykrptb.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\cmieytfcrldscdkvadg.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\ravqjdokyriwfflvzb.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\paxuplywmhaqbdlxdhlw.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\wcumctbufvjuaxahihgmewmdlepftekhkrsrq.ogw cakucll.exe File opened for modification C:\Windows\bibuldmgsjykrptb.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\bibuldmgsjykrptb.exe cakucll.exe File opened for modification C:\Windows\paxuplywmhaqbdlxdhlw.exe cakucll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 1672 cakucll.exe 1672 cakucll.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 1672 cakucll.exe 1672 cakucll.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1672 cakucll.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 816 wrote to memory of 2444 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 82 PID 816 wrote to memory of 2444 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 82 PID 816 wrote to memory of 2444 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 82 PID 2444 wrote to memory of 1672 2444 pwyrqtqlzgi.exe 83 PID 2444 wrote to memory of 1672 2444 pwyrqtqlzgi.exe 83 PID 2444 wrote to memory of 1672 2444 pwyrqtqlzgi.exe 83 PID 2444 wrote to memory of 1832 2444 pwyrqtqlzgi.exe 84 PID 2444 wrote to memory of 1832 2444 pwyrqtqlzgi.exe 84 PID 2444 wrote to memory of 1832 2444 pwyrqtqlzgi.exe 84 PID 816 wrote to memory of 3616 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 93 PID 816 wrote to memory of 3616 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 93 PID 816 wrote to memory of 3616 816 cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe 93 -
System policy modification 1 TTPs 41 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" pwyrqtqlzgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" cakucll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" pwyrqtqlzgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" cakucll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pwyrqtqlzgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" cakucll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" cakucll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer cakucll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System pwyrqtqlzgi.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe"C:\Users\Admin\AppData\Local\Temp\cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\pwyrqtqlzgi.exe"C:\Users\Admin\AppData\Local\Temp\pwyrqtqlzgi.exe" "c:\users\admin\appdata\local\temp\cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\cakucll.exe"C:\Users\Admin\AppData\Local\Temp\cakucll.exe" "-C:\Users\Admin\AppData\Local\Temp\bibuldmgsjykrptb.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\cakucll.exe"C:\Users\Admin\AppData\Local\Temp\cakucll.exe" "-C:\Users\Admin\AppData\Local\Temp\bibuldmgsjykrptb.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:1832
-
-
-
C:\Users\Admin\AppData\Local\Temp\pwyrqtqlzgi.exe"C:\Users\Admin\AppData\Local\Temp\pwyrqtqlzgi.exe" "c:\users\admin\appdata\local\temp\cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:3616
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
712KB
MD5c2f4b526a81a24a4e88377b9dfe2ba5e
SHA12d39b3bd786de17ce54fdf967b4895aec6d507ca
SHA256cbad84e4b40e132d1eb66a38fe5ef5f709b8d0d866d84d53338ee950927754d4
SHA5127c729c8145cf7658e27e2df03ec43b661d91135afeefbe9c4d25b52219f3dc3ef2f4ce823b367e1fcd82c7f58ff89a274f0a917f0339147483c6f2681b5f4684
-
Filesize
712KB
MD5c2f4b526a81a24a4e88377b9dfe2ba5e
SHA12d39b3bd786de17ce54fdf967b4895aec6d507ca
SHA256cbad84e4b40e132d1eb66a38fe5ef5f709b8d0d866d84d53338ee950927754d4
SHA5127c729c8145cf7658e27e2df03ec43b661d91135afeefbe9c4d25b52219f3dc3ef2f4ce823b367e1fcd82c7f58ff89a274f0a917f0339147483c6f2681b5f4684
-
Filesize
712KB
MD5c2f4b526a81a24a4e88377b9dfe2ba5e
SHA12d39b3bd786de17ce54fdf967b4895aec6d507ca
SHA256cbad84e4b40e132d1eb66a38fe5ef5f709b8d0d866d84d53338ee950927754d4
SHA5127c729c8145cf7658e27e2df03ec43b661d91135afeefbe9c4d25b52219f3dc3ef2f4ce823b367e1fcd82c7f58ff89a274f0a917f0339147483c6f2681b5f4684
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e
-
Filesize
504KB
MD543eaf4f250ffa09bab2b005d53f54240
SHA15d0319763f638a41c98bfcd212b2f0b811d4959b
SHA256cd5868f5fb751afc753bf4c675ecd9ac7423139eb6432725db66aec48d0caf77
SHA5121a076db48c169a1200ff4ebccad2c7a575327462493235fedc601e33dcdc083db899eb12d741c6b66697e6211eceedc40477c4cd9bbefccd5a808e35747fd41e