Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 13:59
Static task
static1
Behavioral task
behavioral1
Sample
b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe
Resource
win10v2004-20220901-en
General
-
Target
b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe
-
Size
564KB
-
MD5
83f33c91469fc991bbc584015ab497c3
-
SHA1
1f53eb45b325b0868f1ba0bacef2533ea10a7fea
-
SHA256
b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
-
SHA512
065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
SSDEEP
12288:qmaNhOPnxBnHkapLjTn/rhlUy1WotA7dM9BAYdNUGotp0:qCBnHZpLHrtWotkC/Ubp0
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" pwyrqtqlzgi.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" pwyrqtqlzgi.exe -
Adds policy Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eoagssipv = "ysoeakkbrmdscdkvadc.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsbenk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ewqeygethapckjoxa.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsbenk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ysoeakkbrmdscdkvadc.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsbenk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ysoeakkbrmdscdkvadc.exe" lsbenk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eoagssipv = "ysoeakkbrmdscdkvadc.exe" pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eoagssipv = "ewqeygethapckjoxa.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsbenk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngbqlutjysiwfflvzb.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsbenk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngbqlutjysiwfflvzb.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsbenk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lgdurcdvmiaqbdlxdhhc.exe" pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eoagssipv = "xohunurfskykrptb.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsbenk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ewqeygethapckjoxa.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsbenk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lgdurcdvmiaqbdlxdhhc.exe" lsbenk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eoagssipv = "ngbqlutjysiwfflvzb.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsbenk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xohunurfskykrptb.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsbenk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xohunurfskykrptb.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsbenk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lgdurcdvmiaqbdlxdhhc.exe" pwyrqtqlzgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eoagssipv = "ysoeakkbrmdscdkvadc.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eoagssipv = "lgdurcdvmiaqbdlxdhhc.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eoagssipv = "ngbqlutjysiwfflvzb.exe" pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsbenk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lgdurcdvmiaqbdlxdhhc.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eoagssipv = "xohunurfskykrptb.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eoagssipv = "lgdurcdvmiaqbdlxdhhc.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\eoagssipv = "ewqeygethapckjoxa.exe" pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsbenk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\awumkwyrjgzqcfobinoki.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\lsbenk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\awumkwyrjgzqcfobinoki.exe" lsbenk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run lsbenk.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsbenk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsbenk.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" pwyrqtqlzgi.exe -
Executes dropped EXE 4 IoCs
pid Process 3848 pwyrqtqlzgi.exe 1848 lsbenk.exe 3408 lsbenk.exe 4368 pwyrqtqlzgi.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation pwyrqtqlzgi.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ocscswqblaluy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xohunurfskykrptb.exe" pwyrqtqlzgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ygquecq = "lgdurcdvmiaqbdlxdhhc.exe" lsbenk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run pwyrqtqlzgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ocscswqblaluy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngbqlutjysiwfflvzb.exe" lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sesaoqirzmv = "ngbqlutjysiwfflvzb.exe ." lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pcrapslvesck = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ewqeygethapckjoxa.exe ." pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nwhmxwlr = "ysoeakkbrmdscdkvadc.exe ." lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ocscswqblaluy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xohunurfskykrptb.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pcrapslvesck = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ewqeygethapckjoxa.exe ." lsbenk.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ygquecq = "ewqeygethapckjoxa.exe" pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nwhmxwlr = "ewqeygethapckjoxa.exe ." lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sesaoqirzmv = "ngbqlutjysiwfflvzb.exe ." lsbenk.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sesaoqirzmv = "ysoeakkbrmdscdkvadc.exe ." lsbenk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sesaoqirzmv = "lgdurcdvmiaqbdlxdhhc.exe ." lsbenk.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run pwyrqtqlzgi.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xivcpqhpwi = "xohunurfskykrptb.exe" lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xivcpqhpwi = "ewqeygethapckjoxa.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pcrapslvesck = "C:\\Users\\Admin\\AppData\\Local\\Temp\\awumkwyrjgzqcfobinoki.exe ." lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sesaoqirzmv = "xohunurfskykrptb.exe ." lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nwhmxwlr = "awumkwyrjgzqcfobinoki.exe ." lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nwhmxwlr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lgdurcdvmiaqbdlxdhhc.exe ." lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ocscswqblaluy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lgdurcdvmiaqbdlxdhhc.exe" lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nwhmxwlr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ysoeakkbrmdscdkvadc.exe ." lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ygquecq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xohunurfskykrptb.exe" lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xivcpqhpwi = "ngbqlutjysiwfflvzb.exe" lsbenk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ygquecq = "awumkwyrjgzqcfobinoki.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nwhmxwlr = "xohunurfskykrptb.exe ." lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pcrapslvesck = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngbqlutjysiwfflvzb.exe ." lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nwhmxwlr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\awumkwyrjgzqcfobinoki.exe ." lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ygquecq = "xohunurfskykrptb.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ocscswqblaluy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ewqeygethapckjoxa.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ygquecq = "xohunurfskykrptb.exe" lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nwhmxwlr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ysoeakkbrmdscdkvadc.exe ." lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xivcpqhpwi = "ysoeakkbrmdscdkvadc.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ocscswqblaluy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xohunurfskykrptb.exe" lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ygquecq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lgdurcdvmiaqbdlxdhhc.exe" lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ygquecq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\awumkwyrjgzqcfobinoki.exe" lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xivcpqhpwi = "lgdurcdvmiaqbdlxdhhc.exe" pwyrqtqlzgi.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ygquecq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\awumkwyrjgzqcfobinoki.exe" pwyrqtqlzgi.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sesaoqirzmv = "xohunurfskykrptb.exe ." lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sesaoqirzmv = "ewqeygethapckjoxa.exe ." lsbenk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce pwyrqtqlzgi.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nwhmxwlr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngbqlutjysiwfflvzb.exe ." pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ygquecq = "awumkwyrjgzqcfobinoki.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ocscswqblaluy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\awumkwyrjgzqcfobinoki.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nwhmxwlr = "ngbqlutjysiwfflvzb.exe ." pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ocscswqblaluy = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ysoeakkbrmdscdkvadc.exe" lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nwhmxwlr = "lgdurcdvmiaqbdlxdhhc.exe ." lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ygquecq = "ysoeakkbrmdscdkvadc.exe" lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nwhmxwlr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngbqlutjysiwfflvzb.exe ." lsbenk.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run lsbenk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\pcrapslvesck = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ysoeakkbrmdscdkvadc.exe ." lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nwhmxwlr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xohunurfskykrptb.exe ." lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nwhmxwlr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngbqlutjysiwfflvzb.exe ." pwyrqtqlzgi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nwhmxwlr = "ysoeakkbrmdscdkvadc.exe ." pwyrqtqlzgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run lsbenk.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce lsbenk.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xivcpqhpwi = "xohunurfskykrptb.exe" lsbenk.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsbenk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pwyrqtqlzgi.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pwyrqtqlzgi.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsbenk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lsbenk.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 whatismyip.everdot.org 9 www.showmyipaddress.com 14 whatismyipaddress.com 21 whatismyip.everdot.org 39 whatismyip.everdot.org -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf lsbenk.exe File created C:\autorun.inf lsbenk.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\kouuaueffklkepgbqdmqwwcwg.hmn lsbenk.exe File opened for modification C:\Windows\SysWOW64\pevgxcxjukwglhjppnhwnypupbmcoydzbhhf.ofq lsbenk.exe File opened for modification C:\Windows\SysWOW64\ysoeakkbrmdscdkvadc.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\ewqeygethapckjoxa.exe lsbenk.exe File opened for modification C:\Windows\SysWOW64\xohunurfskykrptb.exe lsbenk.exe File opened for modification C:\Windows\SysWOW64\ewqeygethapckjoxa.exe lsbenk.exe File opened for modification C:\Windows\SysWOW64\rongfsvpigasfjthpvxutm.exe lsbenk.exe File opened for modification C:\Windows\SysWOW64\ngbqlutjysiwfflvzb.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\xohunurfskykrptb.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\rongfsvpigasfjthpvxutm.exe lsbenk.exe File opened for modification C:\Windows\SysWOW64\ngbqlutjysiwfflvzb.exe lsbenk.exe File opened for modification C:\Windows\SysWOW64\awumkwyrjgzqcfobinoki.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\lgdurcdvmiaqbdlxdhhc.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\ewqeygethapckjoxa.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\ewqeygethapckjoxa.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\xohunurfskykrptb.exe lsbenk.exe File opened for modification C:\Windows\SysWOW64\ngbqlutjysiwfflvzb.exe lsbenk.exe File opened for modification C:\Windows\SysWOW64\ysoeakkbrmdscdkvadc.exe lsbenk.exe File opened for modification C:\Windows\SysWOW64\lgdurcdvmiaqbdlxdhhc.exe lsbenk.exe File created C:\Windows\SysWOW64\kouuaueffklkepgbqdmqwwcwg.hmn lsbenk.exe File created C:\Windows\SysWOW64\pevgxcxjukwglhjppnhwnypupbmcoydzbhhf.ofq lsbenk.exe File opened for modification C:\Windows\SysWOW64\xohunurfskykrptb.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\lgdurcdvmiaqbdlxdhhc.exe lsbenk.exe File opened for modification C:\Windows\SysWOW64\ysoeakkbrmdscdkvadc.exe lsbenk.exe File opened for modification C:\Windows\SysWOW64\ysoeakkbrmdscdkvadc.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\rongfsvpigasfjthpvxutm.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\awumkwyrjgzqcfobinoki.exe lsbenk.exe File opened for modification C:\Windows\SysWOW64\awumkwyrjgzqcfobinoki.exe lsbenk.exe File opened for modification C:\Windows\SysWOW64\ngbqlutjysiwfflvzb.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\awumkwyrjgzqcfobinoki.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\rongfsvpigasfjthpvxutm.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\SysWOW64\lgdurcdvmiaqbdlxdhhc.exe pwyrqtqlzgi.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\kouuaueffklkepgbqdmqwwcwg.hmn lsbenk.exe File created C:\Program Files (x86)\kouuaueffklkepgbqdmqwwcwg.hmn lsbenk.exe File opened for modification C:\Program Files (x86)\pevgxcxjukwglhjppnhwnypupbmcoydzbhhf.ofq lsbenk.exe File created C:\Program Files (x86)\pevgxcxjukwglhjppnhwnypupbmcoydzbhhf.ofq lsbenk.exe -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\ngbqlutjysiwfflvzb.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\ewqeygethapckjoxa.exe lsbenk.exe File opened for modification C:\Windows\ysoeakkbrmdscdkvadc.exe lsbenk.exe File opened for modification C:\Windows\kouuaueffklkepgbqdmqwwcwg.hmn lsbenk.exe File opened for modification C:\Windows\xohunurfskykrptb.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\lgdurcdvmiaqbdlxdhhc.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\xohunurfskykrptb.exe lsbenk.exe File opened for modification C:\Windows\xohunurfskykrptb.exe lsbenk.exe File opened for modification C:\Windows\lgdurcdvmiaqbdlxdhhc.exe lsbenk.exe File opened for modification C:\Windows\ysoeakkbrmdscdkvadc.exe lsbenk.exe File opened for modification C:\Windows\ewqeygethapckjoxa.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\rongfsvpigasfjthpvxutm.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\ngbqlutjysiwfflvzb.exe lsbenk.exe File opened for modification C:\Windows\ngbqlutjysiwfflvzb.exe lsbenk.exe File opened for modification C:\Windows\rongfsvpigasfjthpvxutm.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\ysoeakkbrmdscdkvadc.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\awumkwyrjgzqcfobinoki.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\awumkwyrjgzqcfobinoki.exe lsbenk.exe File opened for modification C:\Windows\rongfsvpigasfjthpvxutm.exe lsbenk.exe File opened for modification C:\Windows\awumkwyrjgzqcfobinoki.exe lsbenk.exe File created C:\Windows\kouuaueffklkepgbqdmqwwcwg.hmn lsbenk.exe File opened for modification C:\Windows\ngbqlutjysiwfflvzb.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\ewqeygethapckjoxa.exe lsbenk.exe File opened for modification C:\Windows\lgdurcdvmiaqbdlxdhhc.exe lsbenk.exe File opened for modification C:\Windows\ewqeygethapckjoxa.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\lgdurcdvmiaqbdlxdhhc.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\rongfsvpigasfjthpvxutm.exe lsbenk.exe File opened for modification C:\Windows\pevgxcxjukwglhjppnhwnypupbmcoydzbhhf.ofq lsbenk.exe File created C:\Windows\pevgxcxjukwglhjppnhwnypupbmcoydzbhhf.ofq lsbenk.exe File opened for modification C:\Windows\ysoeakkbrmdscdkvadc.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\awumkwyrjgzqcfobinoki.exe pwyrqtqlzgi.exe File opened for modification C:\Windows\xohunurfskykrptb.exe pwyrqtqlzgi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 1848 lsbenk.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 1848 lsbenk.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 1848 lsbenk.exe 1848 lsbenk.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1848 lsbenk.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2160 wrote to memory of 3848 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 84 PID 2160 wrote to memory of 3848 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 84 PID 2160 wrote to memory of 3848 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 84 PID 3848 wrote to memory of 1848 3848 pwyrqtqlzgi.exe 85 PID 3848 wrote to memory of 1848 3848 pwyrqtqlzgi.exe 85 PID 3848 wrote to memory of 1848 3848 pwyrqtqlzgi.exe 85 PID 3848 wrote to memory of 3408 3848 pwyrqtqlzgi.exe 86 PID 3848 wrote to memory of 3408 3848 pwyrqtqlzgi.exe 86 PID 3848 wrote to memory of 3408 3848 pwyrqtqlzgi.exe 86 PID 2160 wrote to memory of 4368 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 95 PID 2160 wrote to memory of 4368 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 95 PID 2160 wrote to memory of 4368 2160 b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe 95 -
System policy modification 1 TTPs 41 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" pwyrqtqlzgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer pwyrqtqlzgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" lsbenk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer lsbenk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" lsbenk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" lsbenk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" pwyrqtqlzgi.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" pwyrqtqlzgi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System lsbenk.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" lsbenk.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe"C:\Users\Admin\AppData\Local\Temp\b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\pwyrqtqlzgi.exe"C:\Users\Admin\AppData\Local\Temp\pwyrqtqlzgi.exe" "c:\users\admin\appdata\local\temp\b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\lsbenk.exe"C:\Users\Admin\AppData\Local\Temp\lsbenk.exe" "-C:\Users\Admin\AppData\Local\Temp\xohunurfskykrptb.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1848
-
-
C:\Users\Admin\AppData\Local\Temp\lsbenk.exe"C:\Users\Admin\AppData\Local\Temp\lsbenk.exe" "-C:\Users\Admin\AppData\Local\Temp\xohunurfskykrptb.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:3408
-
-
-
C:\Users\Admin\AppData\Local\Temp\pwyrqtqlzgi.exe"C:\Users\Admin\AppData\Local\Temp\pwyrqtqlzgi.exe" "c:\users\admin\appdata\local\temp\b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:4368
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
712KB
MD5a9e9962276d67be775648de0b8db6d01
SHA1517d0075e98028ec213d6da78838f85f1abd464d
SHA256ad32c0d0dd8f00a1caf0274d57707fc9ffc3dc09d46691c09e367467e20fbfb9
SHA5120bfec81d368da82c2eff75490e3df201f383dbfd7e5a0d31b9b4922322b388db24e994bb872f0ac1fcf93f51e7426984041a22d493da9df858e2d551511e6f8b
-
Filesize
712KB
MD5a9e9962276d67be775648de0b8db6d01
SHA1517d0075e98028ec213d6da78838f85f1abd464d
SHA256ad32c0d0dd8f00a1caf0274d57707fc9ffc3dc09d46691c09e367467e20fbfb9
SHA5120bfec81d368da82c2eff75490e3df201f383dbfd7e5a0d31b9b4922322b388db24e994bb872f0ac1fcf93f51e7426984041a22d493da9df858e2d551511e6f8b
-
Filesize
712KB
MD5a9e9962276d67be775648de0b8db6d01
SHA1517d0075e98028ec213d6da78838f85f1abd464d
SHA256ad32c0d0dd8f00a1caf0274d57707fc9ffc3dc09d46691c09e367467e20fbfb9
SHA5120bfec81d368da82c2eff75490e3df201f383dbfd7e5a0d31b9b4922322b388db24e994bb872f0ac1fcf93f51e7426984041a22d493da9df858e2d551511e6f8b
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
320KB
MD506ad5ae775ecf2a51425fb915de97757
SHA1f26f3d83ac2286a97f74015f9b382060fd1024ef
SHA2565c1779f9f64c7c99f097f2b0ce96c60aabb4f7e22ae8a609cd0fe38c13d7b01c
SHA512440bc8cb968509129dae673f77a14bc3e1256954ede68a414ea52c2f7a0f35538319c4b85b629698b7e35300a13e18cc9b6b63f33432b1a9b6a4715b07ff4388
-
Filesize
320KB
MD506ad5ae775ecf2a51425fb915de97757
SHA1f26f3d83ac2286a97f74015f9b382060fd1024ef
SHA2565c1779f9f64c7c99f097f2b0ce96c60aabb4f7e22ae8a609cd0fe38c13d7b01c
SHA512440bc8cb968509129dae673f77a14bc3e1256954ede68a414ea52c2f7a0f35538319c4b85b629698b7e35300a13e18cc9b6b63f33432b1a9b6a4715b07ff4388
-
Filesize
320KB
MD506ad5ae775ecf2a51425fb915de97757
SHA1f26f3d83ac2286a97f74015f9b382060fd1024ef
SHA2565c1779f9f64c7c99f097f2b0ce96c60aabb4f7e22ae8a609cd0fe38c13d7b01c
SHA512440bc8cb968509129dae673f77a14bc3e1256954ede68a414ea52c2f7a0f35538319c4b85b629698b7e35300a13e18cc9b6b63f33432b1a9b6a4715b07ff4388
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9
-
Filesize
564KB
MD583f33c91469fc991bbc584015ab497c3
SHA11f53eb45b325b0868f1ba0bacef2533ea10a7fea
SHA256b7138253b4ebe17bcd38cfd48f8ee20f096588a42ad36922cf8fce4e187088f3
SHA512065e0133b35dfad3360b6d6bcbc1fc609c38d872c0352d3d40354baf36bc9666e286ec4b5d694f42edb0e112fe39a9b29e788d03abd70c1ee064bd972cf1c8e9