Analysis
-
max time kernel
152s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 08:31
Static task
static1
Behavioral task
behavioral1
Sample
f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe
Resource
win10v2004-20220812-en
General
-
Target
f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe
-
Size
556KB
-
MD5
04baf571ca0fa1f19fca9fb7275b4800
-
SHA1
052e16d714c18121c63b184ffd9c38cf7e8db98b
-
SHA256
f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
-
SHA512
cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
SSDEEP
12288:zgkDxdkL+6JNgKVcRa+fpHyWs3OBH4pUsTx5KEZh:vxsKXa+hHyWseBgnh
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" grrfdxtjqbb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" chmodcl.exe -
Adds policy Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bjrwoqcryx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ixmyxgzvjpgmgkkmi.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bjrwoqcryx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bpdomumhuzpunqpq.exe" chmodcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sdowrwldnpceu = "rhxkkuolahzgbghkhl.exe" grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bjrwoqcryx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bpdomumhuzpunqpq.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bjrwoqcryx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\phzoqcyxoxraxehmlrjb.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sdowrwldnpceu = "phzoqcyxoxraxehmlrjb.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bjrwoqcryx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\phzoqcyxoxraxehmlrjb.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sdowrwldnpceu = "bpdomumhuzpunqpq.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bjrwoqcryx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\exqgjwttlvqaygkqqxqjz.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sdowrwldnpceu = "rhxkkuolahzgbghkhl.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sdowrwldnpceu = "ctkyzkfdtbucyegkine.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sdowrwldnpceu = "ixmyxgzvjpgmgkkmi.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sdowrwldnpceu = "exqgjwttlvqaygkqqxqjz.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bjrwoqcryx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ctkyzkfdtbucyegkine.exe" chmodcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bjrwoqcryx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\exqgjwttlvqaygkqqxqjz.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bjrwoqcryx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rhxkkuolahzgbghkhl.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sdowrwldnpceu = "bpdomumhuzpunqpq.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bjrwoqcryx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ctkyzkfdtbucyegkine.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bjrwoqcryx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ixmyxgzvjpgmgkkmi.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bjrwoqcryx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ixmyxgzvjpgmgkkmi.exe" grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sdowrwldnpceu = "exqgjwttlvqaygkqqxqjz.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sdowrwldnpceu = "ctkyzkfdtbucyegkine.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\bjrwoqcryx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ixmyxgzvjpgmgkkmi.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\sdowrwldnpceu = "ixmyxgzvjpgmgkkmi.exe" chmodcl.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" chmodcl.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" chmodcl.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" grrfdxtjqbb.exe -
Executes dropped EXE 4 IoCs
pid Process 2340 grrfdxtjqbb.exe 952 chmodcl.exe 2388 chmodcl.exe 2664 grrfdxtjqbb.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation grrfdxtjqbb.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tdnuosgxghtu = "exqgjwttlvqaygkqqxqjz.exe ." chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ixmyxgzvjpgmgkkmi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ixmyxgzvjpgmgkkmi.exe" chmodcl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tfrawcslwznqhi = "rhxkkuolahzgbghkhl.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ixmyxgzvjpgmgkkmi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\exqgjwttlvqaygkqqxqjz.exe" grrfdxtjqbb.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ixmyxgzvjpgmgkkmi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ctkyzkfdtbucyegkine.exe" chmodcl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wjwgdkbvhlaewyw = "phzoqcyxoxraxehmlrjb.exe ." chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tdnuosgxghtu = "ixmyxgzvjpgmgkkmi.exe ." chmodcl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wfounqdtbbm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\phzoqcyxoxraxehmlrjb.exe" chmodcl.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tdnuosgxghtu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ctkyzkfdtbucyegkine.exe ." grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wfounqdtbbm = "exqgjwttlvqaygkqqxqjz.exe" chmodcl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tdnuosgxghtu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\exqgjwttlvqaygkqqxqjz.exe ." grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wfounqdtbbm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bpdomumhuzpunqpq.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wfounqdtbbm = "exqgjwttlvqaygkqqxqjz.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ixmyxgzvjpgmgkkmi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ixmyxgzvjpgmgkkmi.exe" chmodcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bpdomumhuzpunqpq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rhxkkuolahzgbghkhl.exe ." chmodcl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wfounqdtbbm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rhxkkuolahzgbghkhl.exe" chmodcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tdnuosgxghtu = "rhxkkuolahzgbghkhl.exe ." chmodcl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wfounqdtbbm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\phzoqcyxoxraxehmlrjb.exe" chmodcl.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce grrfdxtjqbb.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tdnuosgxghtu = "rhxkkuolahzgbghkhl.exe ." grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bpdomumhuzpunqpq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\phzoqcyxoxraxehmlrjb.exe ." chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bpdomumhuzpunqpq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ixmyxgzvjpgmgkkmi.exe ." chmodcl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wfounqdtbbm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rhxkkuolahzgbghkhl.exe" chmodcl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tdnuosgxghtu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ixmyxgzvjpgmgkkmi.exe ." chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bpdomumhuzpunqpq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bpdomumhuzpunqpq.exe ." chmodcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run chmodcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run chmodcl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wjwgdkbvhlaewyw = "bpdomumhuzpunqpq.exe ." chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ixmyxgzvjpgmgkkmi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bpdomumhuzpunqpq.exe" chmodcl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\tdnuosgxghtu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\exqgjwttlvqaygkqqxqjz.exe ." chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ixmyxgzvjpgmgkkmi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\exqgjwttlvqaygkqqxqjz.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tdnuosgxghtu = "rhxkkuolahzgbghkhl.exe ." chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ixmyxgzvjpgmgkkmi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\exqgjwttlvqaygkqqxqjz.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wfounqdtbbm = "exqgjwttlvqaygkqqxqjz.exe" grrfdxtjqbb.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wjwgdkbvhlaewyw = "phzoqcyxoxraxehmlrjb.exe ." grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wfounqdtbbm = "ctkyzkfdtbucyegkine.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wfounqdtbbm = "bpdomumhuzpunqpq.exe" chmodcl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wjwgdkbvhlaewyw = "rhxkkuolahzgbghkhl.exe ." chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ixmyxgzvjpgmgkkmi = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rhxkkuolahzgbghkhl.exe" chmodcl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tfrawcslwznqhi = "ixmyxgzvjpgmgkkmi.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wfounqdtbbm = "ixmyxgzvjpgmgkkmi.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bpdomumhuzpunqpq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\exqgjwttlvqaygkqqxqjz.exe ." chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wfounqdtbbm = "rhxkkuolahzgbghkhl.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tdnuosgxghtu = "ctkyzkfdtbucyegkine.exe ." chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tdnuosgxghtu = "ctkyzkfdtbucyegkine.exe ." chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bpdomumhuzpunqpq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\exqgjwttlvqaygkqqxqjz.exe ." chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tdnuosgxghtu = "phzoqcyxoxraxehmlrjb.exe ." chmodcl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wfounqdtbbm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ctkyzkfdtbucyegkine.exe" chmodcl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wjwgdkbvhlaewyw = "ctkyzkfdtbucyegkine.exe ." grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tfrawcslwznqhi = "phzoqcyxoxraxehmlrjb.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\bpdomumhuzpunqpq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rhxkkuolahzgbghkhl.exe ." chmodcl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tfrawcslwznqhi = "bpdomumhuzpunqpq.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wfounqdtbbm = "ixmyxgzvjpgmgkkmi.exe" chmodcl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wfounqdtbbm = "rhxkkuolahzgbghkhl.exe" chmodcl.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run chmodcl.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce chmodcl.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce chmodcl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wfounqdtbbm = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bpdomumhuzpunqpq.exe" chmodcl.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" chmodcl.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" chmodcl.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA grrfdxtjqbb.exe -
Looks up external IP address via web service 8 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 65 whatismyipaddress.com 82 www.showmyipaddress.com 84 whatismyip.everdot.org 90 whatismyip.everdot.org 13 www.showmyipaddress.com 22 whatismyip.everdot.org 28 whatismyip.everdot.org 31 whatismyipaddress.com -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\vpjaesqrkvrcbkpwxfztko.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\ixmyxgzvjpgmgkkmi.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\vpjaesqrkvrcbkpwxfztko.exe chmodcl.exe File opened for modification C:\Windows\SysWOW64\wfounqdtbbmmaysoebktzsviyggrrfdxt.gpy chmodcl.exe File opened for modification C:\Windows\SysWOW64\rhxkkuolahzgbghkhl.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\rhxkkuolahzgbghkhl.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\bpdomumhuzpunqpq.exe chmodcl.exe File opened for modification C:\Windows\SysWOW64\ctkyzkfdtbucyegkine.exe chmodcl.exe File opened for modification C:\Windows\SysWOW64\phzoqcyxoxraxehmlrjb.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\ctkyzkfdtbucyegkine.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\rhxkkuolahzgbghkhl.exe chmodcl.exe File opened for modification C:\Windows\SysWOW64\exqgjwttlvqaygkqqxqjz.exe chmodcl.exe File created C:\Windows\SysWOW64\wfounqdtbbmmaysoebktzsviyggrrfdxt.gpy chmodcl.exe File opened for modification C:\Windows\SysWOW64\exqgjwttlvqaygkqqxqjz.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\exqgjwttlvqaygkqqxqjz.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\ixmyxgzvjpgmgkkmi.exe chmodcl.exe File opened for modification C:\Windows\SysWOW64\bpdomumhuzpunqpq.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\ixmyxgzvjpgmgkkmi.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\ctkyzkfdtbucyegkine.exe chmodcl.exe File opened for modification C:\Windows\SysWOW64\vpjaesqrkvrcbkpwxfztko.exe chmodcl.exe File opened for modification C:\Windows\SysWOW64\ixmyxgzvjpgmgkkmi.exe chmodcl.exe File opened for modification C:\Windows\SysWOW64\exqgjwttlvqaygkqqxqjz.exe chmodcl.exe File created C:\Windows\SysWOW64\fdbwewydappehudotfdbwe.yda chmodcl.exe File opened for modification C:\Windows\SysWOW64\rhxkkuolahzgbghkhl.exe chmodcl.exe File opened for modification C:\Windows\SysWOW64\phzoqcyxoxraxehmlrjb.exe chmodcl.exe File opened for modification C:\Windows\SysWOW64\ctkyzkfdtbucyegkine.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\bpdomumhuzpunqpq.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\phzoqcyxoxraxehmlrjb.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\vpjaesqrkvrcbkpwxfztko.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\phzoqcyxoxraxehmlrjb.exe chmodcl.exe File opened for modification C:\Windows\SysWOW64\bpdomumhuzpunqpq.exe chmodcl.exe File opened for modification C:\Windows\SysWOW64\fdbwewydappehudotfdbwe.yda chmodcl.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\fdbwewydappehudotfdbwe.yda chmodcl.exe File created C:\Program Files (x86)\fdbwewydappehudotfdbwe.yda chmodcl.exe File opened for modification C:\Program Files (x86)\wfounqdtbbmmaysoebktzsviyggrrfdxt.gpy chmodcl.exe File created C:\Program Files (x86)\wfounqdtbbmmaysoebktzsviyggrrfdxt.gpy chmodcl.exe -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\phzoqcyxoxraxehmlrjb.exe grrfdxtjqbb.exe File opened for modification C:\Windows\vpjaesqrkvrcbkpwxfztko.exe grrfdxtjqbb.exe File created C:\Windows\wfounqdtbbmmaysoebktzsviyggrrfdxt.gpy chmodcl.exe File opened for modification C:\Windows\ixmyxgzvjpgmgkkmi.exe grrfdxtjqbb.exe File opened for modification C:\Windows\bpdomumhuzpunqpq.exe chmodcl.exe File opened for modification C:\Windows\exqgjwttlvqaygkqqxqjz.exe chmodcl.exe File opened for modification C:\Windows\wfounqdtbbmmaysoebktzsviyggrrfdxt.gpy chmodcl.exe File opened for modification C:\Windows\phzoqcyxoxraxehmlrjb.exe grrfdxtjqbb.exe File opened for modification C:\Windows\exqgjwttlvqaygkqqxqjz.exe grrfdxtjqbb.exe File opened for modification C:\Windows\bpdomumhuzpunqpq.exe grrfdxtjqbb.exe File opened for modification C:\Windows\rhxkkuolahzgbghkhl.exe chmodcl.exe File opened for modification C:\Windows\rhxkkuolahzgbghkhl.exe chmodcl.exe File opened for modification C:\Windows\ctkyzkfdtbucyegkine.exe chmodcl.exe File opened for modification C:\Windows\vpjaesqrkvrcbkpwxfztko.exe chmodcl.exe File opened for modification C:\Windows\exqgjwttlvqaygkqqxqjz.exe chmodcl.exe File opened for modification C:\Windows\phzoqcyxoxraxehmlrjb.exe chmodcl.exe File opened for modification C:\Windows\vpjaesqrkvrcbkpwxfztko.exe chmodcl.exe File created C:\Windows\fdbwewydappehudotfdbwe.yda chmodcl.exe File opened for modification C:\Windows\ctkyzkfdtbucyegkine.exe grrfdxtjqbb.exe File opened for modification C:\Windows\ixmyxgzvjpgmgkkmi.exe grrfdxtjqbb.exe File opened for modification C:\Windows\vpjaesqrkvrcbkpwxfztko.exe grrfdxtjqbb.exe File opened for modification C:\Windows\ctkyzkfdtbucyegkine.exe chmodcl.exe File opened for modification C:\Windows\ixmyxgzvjpgmgkkmi.exe chmodcl.exe File opened for modification C:\Windows\phzoqcyxoxraxehmlrjb.exe chmodcl.exe File opened for modification C:\Windows\bpdomumhuzpunqpq.exe grrfdxtjqbb.exe File opened for modification C:\Windows\exqgjwttlvqaygkqqxqjz.exe grrfdxtjqbb.exe File opened for modification C:\Windows\bpdomumhuzpunqpq.exe chmodcl.exe File opened for modification C:\Windows\fdbwewydappehudotfdbwe.yda chmodcl.exe File opened for modification C:\Windows\rhxkkuolahzgbghkhl.exe grrfdxtjqbb.exe File opened for modification C:\Windows\rhxkkuolahzgbghkhl.exe grrfdxtjqbb.exe File opened for modification C:\Windows\ctkyzkfdtbucyegkine.exe grrfdxtjqbb.exe File opened for modification C:\Windows\ixmyxgzvjpgmgkkmi.exe chmodcl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 952 chmodcl.exe 952 chmodcl.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 952 chmodcl.exe 952 chmodcl.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 952 chmodcl.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5000 wrote to memory of 2340 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 82 PID 5000 wrote to memory of 2340 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 82 PID 5000 wrote to memory of 2340 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 82 PID 2340 wrote to memory of 952 2340 grrfdxtjqbb.exe 83 PID 2340 wrote to memory of 952 2340 grrfdxtjqbb.exe 83 PID 2340 wrote to memory of 952 2340 grrfdxtjqbb.exe 83 PID 2340 wrote to memory of 2388 2340 grrfdxtjqbb.exe 84 PID 2340 wrote to memory of 2388 2340 grrfdxtjqbb.exe 84 PID 2340 wrote to memory of 2388 2340 grrfdxtjqbb.exe 84 PID 5000 wrote to memory of 2664 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 93 PID 5000 wrote to memory of 2664 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 93 PID 5000 wrote to memory of 2664 5000 f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe 93 -
System policy modification 1 TTPs 41 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" chmodcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" chmodcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System chmodcl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" chmodcl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" chmodcl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe"C:\Users\Admin\AppData\Local\Temp\f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\grrfdxtjqbb.exe"C:\Users\Admin\AppData\Local\Temp\grrfdxtjqbb.exe" "c:\users\admin\appdata\local\temp\f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\chmodcl.exe"C:\Users\Admin\AppData\Local\Temp\chmodcl.exe" "-C:\Users\Admin\AppData\Local\Temp\bpdomumhuzpunqpq.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\chmodcl.exe"C:\Users\Admin\AppData\Local\Temp\chmodcl.exe" "-C:\Users\Admin\AppData\Local\Temp\bpdomumhuzpunqpq.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:2388
-
-
-
C:\Users\Admin\AppData\Local\Temp\grrfdxtjqbb.exe"C:\Users\Admin\AppData\Local\Temp\grrfdxtjqbb.exe" "c:\users\admin\appdata\local\temp\f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:2664
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
688KB
MD5cb429bc66c94c2156098264297927724
SHA12f624be06da4e137c914312bb81541e28ed5cc10
SHA256401a33fabbada60783a78bf17c5ba1179a90a89a6de33a3353f3c9100312f155
SHA5125f56a60274f5d97fe5b586a530450e642398bb64505ed85745a5aeecd85d7707a8ad738b0cbc0d998d84039a509d5dbec22ba63fe17db43939d4cb92a61992a0
-
Filesize
688KB
MD5cb429bc66c94c2156098264297927724
SHA12f624be06da4e137c914312bb81541e28ed5cc10
SHA256401a33fabbada60783a78bf17c5ba1179a90a89a6de33a3353f3c9100312f155
SHA5125f56a60274f5d97fe5b586a530450e642398bb64505ed85745a5aeecd85d7707a8ad738b0cbc0d998d84039a509d5dbec22ba63fe17db43939d4cb92a61992a0
-
Filesize
688KB
MD5cb429bc66c94c2156098264297927724
SHA12f624be06da4e137c914312bb81541e28ed5cc10
SHA256401a33fabbada60783a78bf17c5ba1179a90a89a6de33a3353f3c9100312f155
SHA5125f56a60274f5d97fe5b586a530450e642398bb64505ed85745a5aeecd85d7707a8ad738b0cbc0d998d84039a509d5dbec22ba63fe17db43939d4cb92a61992a0
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
320KB
MD51dd5dd5561723f37ccc81e15ecdbf830
SHA1eeb9131c8d276ceb710d163e89fdc62b3e111971
SHA256c8c542ac3f6526d1501c2b9d6262bfa029a1ac0d9dd6b3c1965977abdd8bd126
SHA512b4881d7cd0c2ceeba067e13d23763e739389108d1269acd6c343dd308aa1fedde89da696a8482944342f44ea1094ea6b50021a15d4c6d03762ba032a9598bba5
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec
-
Filesize
556KB
MD504baf571ca0fa1f19fca9fb7275b4800
SHA1052e16d714c18121c63b184ffd9c38cf7e8db98b
SHA256f650c1c00b35d1e55d8b975578424fab32c7feeacae6503aaa2fbf350bdfb24d
SHA512cd1135104e8d9ea7f07793f816631c3559a6a8112a8ad8c1188bd961979b56036262a4f51bb0dd5b9b3dd637d28e65b374409a7f80eedde8f8c887f74a33aaec