Analysis
-
max time kernel
152s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 10:40
Static task
static1
Behavioral task
behavioral1
Sample
9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe
Resource
win10v2004-20220812-en
General
-
Target
9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe
-
Size
163KB
-
MD5
d7698c2f7324e6b8ee0b43b66543b7db
-
SHA1
ace8f658a1c9e164911faaba6c2fccefea29e9b2
-
SHA256
9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219
-
SHA512
3667ccd392c8747cce3a119a077e1d75edbef8acb59b968391ab7f777b4cc241df8d2138f566bce22cbf431c709076336301bd74be9cf9364a4c66af108ca06a
-
SSDEEP
3072:EqhMPsVMYjUtQl78voutbzoI7h+aS1Gnf:EqhMPsFjU2F8voSbzo0naGf
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
Processes:
services.exe winlogon.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe csrss.exe smss.exe lsass.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" lsass.exe -
Modifies system executable filetype association 2 TTPs 8 IoCs
Processes:
csrss.exe smss.exe lsass.exe services.exe csrss.exevcnv.exewinlogon.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt vcnv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
Processes:
vcnv.exewinlogon.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe csrss.exe smss.exe lsass.exe services.exe csrss.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" vcnv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
Processes:
csrss.exevcnv.exewinlogon.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe csrss.exe smss.exe lsass.exe services.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" vcnv.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" services.exe -
Processes:
winlogon.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe csrss.exe smss.exe lsass.exe services.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe -
Disables RegEdit via registry modification 6 IoCs
Processes:
csrss.exe smss.exe lsass.exe services.exe winlogon.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 64 IoCs
Processes:
9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe csrss.execsrss.exe csrss.execsrss.exe vcnv.exesmss.exesmss.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe winlogon.exewinlogon.exe csrss.execsrss.exe smss.exesmss.exe smss.exelsass.exesmss.exe lsass.exe services.exelsass.exeservices.exe lsass.exe winlogon.exewinlogon.exe services.exeservices.exe Paraysutki_VM_Communitywinlogon.exewinlogon.exe Paraysutki_VM_Communitylsass.exelsass.exe services.exeservices.exe services.exeservices.exe winlogon.exewinlogon.exe winlogon.exewinlogon.exe Paraysutki_VM_CommunityParaysutki_VM_Communitypid process 3996 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe 3092 csrss.exe 3864 csrss.exe 3376 csrss.exe 2376 csrss.exe 1444 vcnv.exe 4112 smss.exe 4712 smss.exe 936 csrss.exe 2408 csrss.exe 2312 smss.exe 4448 smss.exe 4988 lsass.exe 4884 lsass.exe 4320 csrss.exe 2784 csrss.exe 1216 smss.exe 2024 smss.exe 3684 lsass.exe 3292 lsass.exe 916 services.exe 4984 services.exe 3644 csrss.exe 4432 csrss.exe 1228 smss.exe 4516 smss.exe 3392 lsass.exe 4204 lsass.exe 3412 services.exe 3228 services.exe 1096 winlogon.exe 3760 winlogon.exe 4584 csrss.exe 364 csrss.exe 2976 smss.exe 1480 smss.exe 4480 smss.exe 4788 lsass.exe 4900 smss.exe 4400 lsass.exe 1080 services.exe 2676 lsass.exe 4552 services.exe 4912 lsass.exe 1184 winlogon.exe 4216 winlogon.exe 4336 services.exe 3852 services.exe 4920 Paraysutki_VM_Community 3968 winlogon.exe 4700 winlogon.exe 2908 Paraysutki_VM_Community 4344 lsass.exe 2968 lsass.exe 4392 services.exe 4948 services.exe 2788 services.exe 448 services.exe 2784 winlogon.exe 4160 winlogon.exe 2688 winlogon.exe 4440 winlogon.exe 4200 Paraysutki_VM_Community 1468 Paraysutki_VM_Community -
Sets file execution options in registry 2 TTPs 64 IoCs
Processes:
services.exe winlogon.exe smss.exe lsass.exe csrss.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMP.exe\Debugger = "cmd.exe /c del" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe\Debugger = "rundll32.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe\Debugger = "cmd.exe /c del" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe\Debugger = "cmd.exe /c del" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tasklist.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe\Debugger = "rundll32.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe\Debugger = "cmd.exe /c del" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe\Debugger = "cmd.exe /c del" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe\Debugger = "cmd.exe /c del" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "rundll32.exe" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SETUP.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "rundll32.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe\Debugger = "cmd.exe /c del" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SMP.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "rundll32.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Instal.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Instal.exe winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe\Debugger = "cmd.exe /c del" 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rundll32.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Install.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "rundll32.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansavgd.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-CLN.exe\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ansav.exe\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\boot.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Setup.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PCMAV-RTP.exe\Debugger = "cmd.exe /c del" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msiexec.exe services.exe -
Loads dropped DLL 64 IoCs
Processes:
csrss.execsrss.exe csrss.execsrss.exe smss.exesmss.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe winlogon.exewinlogon.exe csrss.execsrss.exe smss.exesmss.exe smss.exelsass.exesmss.exe lsass.exe services.exelsass.exeservices.exe lsass.exe winlogon.exewinlogon.exe services.exeservices.exe Paraysutki_VM_Communitywinlogon.exewinlogon.exe Paraysutki_VM_Communitylsass.exelsass.exe services.exeservices.exe services.exeservices.exe winlogon.exewinlogon.exe winlogon.exewinlogon.exe Paraysutki_VM_CommunityParaysutki_VM_Communitywinlogon.exewinlogon.exepid process 3092 csrss.exe 3864 csrss.exe 3376 csrss.exe 2376 csrss.exe 4112 smss.exe 4712 smss.exe 936 csrss.exe 2408 csrss.exe 2312 smss.exe 4448 smss.exe 4988 lsass.exe 4884 lsass.exe 4320 csrss.exe 2784 csrss.exe 1216 smss.exe 2024 smss.exe 3684 lsass.exe 3292 lsass.exe 916 services.exe 4984 services.exe 3644 csrss.exe 4432 csrss.exe 1228 smss.exe 4516 smss.exe 3392 lsass.exe 4204 lsass.exe 3412 services.exe 3228 services.exe 1096 winlogon.exe 3760 winlogon.exe 4584 csrss.exe 364 csrss.exe 2976 smss.exe 1480 smss.exe 4480 smss.exe 4788 lsass.exe 4900 smss.exe 4400 lsass.exe 1080 services.exe 2676 lsass.exe 4552 services.exe 4912 lsass.exe 1184 winlogon.exe 4216 winlogon.exe 4336 services.exe 3852 services.exe 4920 Paraysutki_VM_Community 3968 winlogon.exe 4700 winlogon.exe 2908 Paraysutki_VM_Community 4344 lsass.exe 2968 lsass.exe 4392 services.exe 4948 services.exe 2788 services.exe 448 services.exe 2784 winlogon.exe 4160 winlogon.exe 2688 winlogon.exe 4440 winlogon.exe 4200 Paraysutki_VM_Community 1468 Paraysutki_VM_Community 1704 winlogon.exe 4492 winlogon.exe -
Adds Run key to start application 2 TTPs 38 IoCs
Processes:
lsass.exe services.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe smss.exe winlogon.exe csrss.exe vcnv.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VisualStyle = "c:\\windows\\system32\\Desktop.sysm" vcnv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run vcnv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ConfigVir = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\services.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PaRaY_VM = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\winlogon.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AVManager = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NarmonVirusAnti = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\smss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NviDiaGT = "C:\\Windows\\System32\\~A~m~B~u~R~a~D~u~L~\\lsass.exe" services.exe -
Processes:
winlogon.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe csrss.exe smss.exe lsass.exe services.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
vcnv.exedescription ioc process File opened (read-only) \??\M: vcnv.exe File opened (read-only) \??\T: vcnv.exe File opened (read-only) \??\W: vcnv.exe File opened (read-only) \??\X: vcnv.exe File opened (read-only) \??\H: vcnv.exe File opened (read-only) \??\G: vcnv.exe File opened (read-only) \??\I: vcnv.exe File opened (read-only) \??\K: vcnv.exe File opened (read-only) \??\O: vcnv.exe File opened (read-only) \??\U: vcnv.exe File opened (read-only) \??\B: vcnv.exe File opened (read-only) \??\J: vcnv.exe File opened (read-only) \??\Q: vcnv.exe File opened (read-only) \??\R: vcnv.exe File opened (read-only) \??\V: vcnv.exe File opened (read-only) \??\Y: vcnv.exe File opened (read-only) \??\Z: vcnv.exe File opened (read-only) \??\F: vcnv.exe File opened (read-only) \??\L: vcnv.exe File opened (read-only) \??\N: vcnv.exe File opened (read-only) \??\P: vcnv.exe File opened (read-only) \??\S: vcnv.exe File opened (read-only) \??\E: vcnv.exe -
Drops file in System32 directory 64 IoCs
Processes:
9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe csrss.exe smss.exe services.exesmss.exelsass.execsrss.exewinlogon.exeservices.exe lsass.exeParaysutki_VM_Communitylsass.exeservices.exesmss.exelsass.exe winlogon.exe smss.exeParaysutki_VM_CommunityParaysutki_VM_Communityvcnv.exesmss.exeParaysutki_VM_Communitylsass.exeservices.exewinlogon.exedescription ioc process File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe smss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt smss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe smss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt Paraysutki_VM_Community File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt lsass.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~ smss.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~ services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe services.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe services.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe winlogon.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt Paraysutki_VM_Community File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt Paraysutki_VM_Community File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe csrss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt vcnv.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt smss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe lsass.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe winlogon.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe winlogon.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt Paraysutki_VM_Community File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe smss.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe lsass.exe File created C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe winlogon.exe File opened for modification \??\c:\windows\SysWOW64\maxtrox.txt services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe services.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community csrss.exe File opened for modification C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe smss.exe -
Drops file in Program Files directory 27 IoCs
Processes:
vcnv.exedescription ioc process File opened for modification \??\c:\Program Files\7-Zip\7z.exe vcnv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\crashreporter.exe vcnv.exe File opened for modification \??\c:\Program Files\Windows Mail\wabmig.exe vcnv.exe File opened for modification \??\c:\Program Files\Internet Explorer\ielowutil.exe vcnv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\default-browser-agent.exe vcnv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-hang-ui.exe vcnv.exe File opened for modification \??\c:\Program Files\Internet Explorer\iediagcmd.exe vcnv.exe File opened for modification \??\c:\Program Files\Internet Explorer\ieinstal.exe vcnv.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmprph.exe vcnv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\pingsender.exe vcnv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\updater.exe vcnv.exe File opened for modification \??\c:\Program Files\Windows Media Player\setup_wm.exe vcnv.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpconfig.exe vcnv.exe File opened for modification \??\c:\Program Files\7-Zip\Uninstall.exe vcnv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\minidump-analyzer.exe vcnv.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpshare.exe vcnv.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmlaunch.exe vcnv.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmplayer.exe vcnv.exe File opened for modification \??\c:\Program Files\7-Zip\7zG.exe vcnv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\firefox.exe vcnv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice.exe vcnv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe vcnv.exe File opened for modification \??\c:\Program Files\Mozilla Firefox\plugin-container.exe vcnv.exe File opened for modification \??\c:\Program Files\7-Zip\7zFM.exe vcnv.exe File opened for modification \??\c:\Program Files\Internet Explorer\iexplore.exe vcnv.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnetwk.exe vcnv.exe File opened for modification \??\c:\Program Files\Windows Media Player\wmpnscfg.exe vcnv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
winlogon.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe smss.exe lsass.exe services.exe csrss.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main winlogon.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" lsass.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main services.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" csrss.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main smss.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "++++ Hey, Hokage/babon (Anbu*Team*Sampit), Is this My places, Wanna start a War ++++" services.exe -
Modifies registry class 48 IoCs
Processes:
csrss.exevcnv.exewinlogon.exe csrss.exe smss.exe lsass.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe services.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd vcnv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" vcnv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command vcnv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile winlogon.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt vcnv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt vcnv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile vcnv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" vcnv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" vcnv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\NeverShowExt vcnv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command\ = "%1" vcnv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon\ = "c:\\windows\\SysWow64\\rasphone.exe" vcnv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon vcnv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\ = "System Mechanic" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\NeverShowExt csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\ = "Microsoft System Direct" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\Shell\Open\Command\ = "%1" vcnv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm\DefaultIcon\ = "c:\\windows\\SysWow64\\netsetup.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\DefaultIcon vcnv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Msd\Shell\Open\Command vcnv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.sysm vcnv.exe -
Runs ping.exe 1 TTPs 18 IoCs
Processes:
ping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exeping.exepid process 1524 ping.exe 3480 ping.exe 640 ping.exe 4748 ping.exe 2480 ping.exe 3876 ping.exe 2728 ping.exe 2832 ping.exe 520 ping.exe 3132 ping.exe 4392 ping.exe 4352 ping.exe 176 ping.exe 2976 ping.exe 1928 ping.exe 344 ping.exe 1748 ping.exe 4468 ping.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
csrss.exesmss.exepid process 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 3092 csrss.exe 4112 smss.exe 4112 smss.exe 4112 smss.exe 4112 smss.exe 4112 smss.exe 4112 smss.exe 4112 smss.exe 4112 smss.exe 4112 smss.exe 4112 smss.exe 4112 smss.exe 4112 smss.exe 4112 smss.exe 4112 smss.exe 4112 smss.exe 4112 smss.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exepid process 4528 rundll32.exe 3892 rundll32.exe 4256 rundll32.exe 1708 rundll32.exe 2692 rundll32.exe 2360 rundll32.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe csrss.execsrss.exe csrss.execsrss.exe vcnv.exesmss.exesmss.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe csrss.execsrss.exe smss.exesmss.exe lsass.exelsass.exe services.exeservices.exe winlogon.exewinlogon.exe csrss.execsrss.exe smss.exesmss.exe smss.exelsass.exesmss.exe lsass.exe services.exelsass.exelsass.exe services.exe winlogon.exewinlogon.exe services.exeservices.exe Paraysutki_VM_Communitywinlogon.exewinlogon.exe Paraysutki_VM_Communitylsass.exelsass.exe services.exeservices.exe services.exeservices.exe winlogon.exewinlogon.exe winlogon.exewinlogon.exe Paraysutki_VM_Communitypid process 5080 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe 3996 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe 3092 csrss.exe 3864 csrss.exe 3376 csrss.exe 2376 csrss.exe 1444 vcnv.exe 4112 smss.exe 4712 smss.exe 936 csrss.exe 2408 csrss.exe 2312 smss.exe 4448 smss.exe 4988 lsass.exe 4884 lsass.exe 4320 csrss.exe 2784 csrss.exe 1216 smss.exe 2024 smss.exe 3684 lsass.exe 3292 lsass.exe 916 services.exe 4984 services.exe 3644 csrss.exe 4432 csrss.exe 1228 smss.exe 4516 smss.exe 3392 lsass.exe 4204 lsass.exe 3412 services.exe 3228 services.exe 1096 winlogon.exe 3760 winlogon.exe 4584 csrss.exe 364 csrss.exe 2976 smss.exe 1480 smss.exe 4480 smss.exe 4788 lsass.exe 4900 smss.exe 4400 lsass.exe 1080 services.exe 2676 lsass.exe 4912 lsass.exe 4552 services.exe 1184 winlogon.exe 4216 winlogon.exe 4336 services.exe 3852 services.exe 4920 Paraysutki_VM_Community 3968 winlogon.exe 4700 winlogon.exe 2908 Paraysutki_VM_Community 4344 lsass.exe 2968 lsass.exe 4392 services.exe 4948 services.exe 2788 services.exe 448 services.exe 2784 winlogon.exe 4160 winlogon.exe 2688 winlogon.exe 4440 winlogon.exe 4200 Paraysutki_VM_Community -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe csrss.execsrss.exe csrss.exesmss.exesmss.exe csrss.exesmss.exelsass.exelsass.exe csrss.exesmss.exelsass.exeservices.exedescription pid process target process PID 5080 wrote to memory of 3996 5080 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe PID 5080 wrote to memory of 3996 5080 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe PID 5080 wrote to memory of 3996 5080 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe PID 3996 wrote to memory of 3092 3996 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe csrss.exe PID 3996 wrote to memory of 3092 3996 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe csrss.exe PID 3996 wrote to memory of 3092 3996 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe csrss.exe PID 3092 wrote to memory of 3864 3092 csrss.exe csrss.exe PID 3092 wrote to memory of 3864 3092 csrss.exe csrss.exe PID 3092 wrote to memory of 3864 3092 csrss.exe csrss.exe PID 3864 wrote to memory of 3376 3864 csrss.exe csrss.exe PID 3864 wrote to memory of 3376 3864 csrss.exe csrss.exe PID 3864 wrote to memory of 3376 3864 csrss.exe csrss.exe PID 3376 wrote to memory of 2376 3376 csrss.exe csrss.exe PID 3376 wrote to memory of 2376 3376 csrss.exe csrss.exe PID 3376 wrote to memory of 2376 3376 csrss.exe csrss.exe PID 3376 wrote to memory of 1444 3376 csrss.exe vcnv.exe PID 3376 wrote to memory of 1444 3376 csrss.exe vcnv.exe PID 3376 wrote to memory of 1444 3376 csrss.exe vcnv.exe PID 3864 wrote to memory of 4112 3864 csrss.exe smss.exe PID 3864 wrote to memory of 4112 3864 csrss.exe smss.exe PID 3864 wrote to memory of 4112 3864 csrss.exe smss.exe PID 4112 wrote to memory of 4712 4112 smss.exe smss.exe PID 4112 wrote to memory of 4712 4112 smss.exe smss.exe PID 4112 wrote to memory of 4712 4112 smss.exe smss.exe PID 4712 wrote to memory of 936 4712 smss.exe csrss.exe PID 4712 wrote to memory of 936 4712 smss.exe csrss.exe PID 4712 wrote to memory of 936 4712 smss.exe csrss.exe PID 936 wrote to memory of 2408 936 csrss.exe csrss.exe PID 936 wrote to memory of 2408 936 csrss.exe csrss.exe PID 936 wrote to memory of 2408 936 csrss.exe csrss.exe PID 4712 wrote to memory of 2312 4712 smss.exe smss.exe PID 4712 wrote to memory of 2312 4712 smss.exe smss.exe PID 4712 wrote to memory of 2312 4712 smss.exe smss.exe PID 2312 wrote to memory of 4448 2312 smss.exe smss.exe PID 2312 wrote to memory of 4448 2312 smss.exe smss.exe PID 2312 wrote to memory of 4448 2312 smss.exe smss.exe PID 4712 wrote to memory of 4988 4712 smss.exe lsass.exe PID 4712 wrote to memory of 4988 4712 smss.exe lsass.exe PID 4712 wrote to memory of 4988 4712 smss.exe lsass.exe PID 4988 wrote to memory of 4884 4988 lsass.exe lsass.exe PID 4988 wrote to memory of 4884 4988 lsass.exe lsass.exe PID 4988 wrote to memory of 4884 4988 lsass.exe lsass.exe PID 4884 wrote to memory of 4320 4884 lsass.exe csrss.exe PID 4884 wrote to memory of 4320 4884 lsass.exe csrss.exe PID 4884 wrote to memory of 4320 4884 lsass.exe csrss.exe PID 4320 wrote to memory of 2784 4320 csrss.exe csrss.exe PID 4320 wrote to memory of 2784 4320 csrss.exe csrss.exe PID 4320 wrote to memory of 2784 4320 csrss.exe csrss.exe PID 4884 wrote to memory of 1216 4884 lsass.exe smss.exe PID 4884 wrote to memory of 1216 4884 lsass.exe smss.exe PID 4884 wrote to memory of 1216 4884 lsass.exe smss.exe PID 1216 wrote to memory of 2024 1216 smss.exe smss.exe PID 1216 wrote to memory of 2024 1216 smss.exe smss.exe PID 1216 wrote to memory of 2024 1216 smss.exe smss.exe PID 4884 wrote to memory of 3684 4884 lsass.exe lsass.exe PID 4884 wrote to memory of 3684 4884 lsass.exe lsass.exe PID 4884 wrote to memory of 3684 4884 lsass.exe lsass.exe PID 3684 wrote to memory of 3292 3684 lsass.exe lsass.exe PID 3684 wrote to memory of 3292 3684 lsass.exe lsass.exe PID 3684 wrote to memory of 3292 3684 lsass.exe lsass.exe PID 4884 wrote to memory of 916 4884 lsass.exe services.exe PID 4884 wrote to memory of 916 4884 lsass.exe services.exe PID 4884 wrote to memory of 916 4884 lsass.exe services.exe PID 916 wrote to memory of 4984 916 services.exe services.exe -
System policy modification 1 TTPs 12 IoCs
Processes:
csrss.exe smss.exe lsass.exe services.exe winlogon.exe 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" winlogon.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System lsass.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe"C:\Users\Admin\AppData\Local\Temp\9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exeC:\Users\Admin\AppData\Local\Temp\9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3996 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe4⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3864 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe5⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2376 -
\??\c:\Documents and Settings\Admin\Application Data\Microsoft\vcnv.exe"c:\Documents and Settings\Admin\Application Data\Microsoft\vcnv.exe" csrss6⤵
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1444 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe6⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4712 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2408 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4448 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe8⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4884 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2784 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3292 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe10⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4984 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3644 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1228 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4516 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3392 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3412 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1096 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe12⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3760 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4584 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:364 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1480 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4788 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4400 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1080 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4552 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1184 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4216 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen13⤵
- Suspicious use of FindShellTrayWindow
PID:1708 -
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 134013⤵
- Runs ping.exe
PID:1748 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 134013⤵
- Runs ping.exe
PID:3480 -
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 134013⤵
- Runs ping.exe
PID:2480 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community11⤵
- Drops file in System32 directory
PID:364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen11⤵
- Suspicious use of FindShellTrayWindow
PID:4528 -
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 134011⤵
- Runs ping.exe
PID:4392 -
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 134011⤵
- Runs ping.exe
PID:1928 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 134011⤵
- Runs ping.exe
PID:3876 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe9⤵
- Loads dropped DLL
- Drops file in System32 directory
PID:1704 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe10⤵
- Loads dropped DLL
PID:4492 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community9⤵PID:944
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen9⤵
- Suspicious use of FindShellTrayWindow
PID:4256 -
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 13409⤵
- Runs ping.exe
PID:344 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13409⤵
- Runs ping.exe
PID:2976 -
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13409⤵
- Runs ping.exe
PID:4468 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:448 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4440 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen7⤵
- Suspicious use of FindShellTrayWindow
PID:3892 -
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 13407⤵
- Runs ping.exe
PID:4352 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13407⤵
- Runs ping.exe
PID:176 -
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13407⤵
- Runs ping.exe
PID:2728 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4344 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4392 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4948 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2784 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4160 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4200 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen5⤵
- Suspicious use of FindShellTrayWindow
PID:2360 -
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 13405⤵
- Runs ping.exe
PID:520 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13405⤵
- Runs ping.exe
PID:640 -
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13405⤵
- Runs ping.exe
PID:3132 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4480 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4900 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2676 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4912 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4336 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3852 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3968 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4700 -
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_CommunityC:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen3⤵
- Suspicious use of FindShellTrayWindow
PID:2692 -
C:\Windows\SysWOW64\ping.exeping www.rasasayang.com.my -n 65500 -l 13403⤵
- Runs ping.exe
PID:1524 -
C:\Windows\SysWOW64\ping.exeping www.data0.net -n 65500 -l 13403⤵
- Runs ping.exe
PID:4748 -
C:\Windows\SysWOW64\ping.exeping www.duniasex.com -n 65500 -l 13403⤵
- Runs ping.exe
PID:2832
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2024
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4432
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4204
-
C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exeC:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3228
Network
MITRE ATT&CK Enterprise v6
Persistence
Change Default File Association
1Hidden Files and Directories
2Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
1Hidden Files and Directories
2Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe
Filesize86KB
MD5f8c8afe96c9efaecac648f1a96e45fd3
SHA121947b2ce0d2827d84ee4db4b8aa31bedb4d6298
SHA25618fcd8e9650e18c390405ad0d12841f9c5640b3ae5057fbae9ffd04b7e920021
SHA512fb92249a85d1a57f9048efd8b829f0edbdd131eacd6cc564f366877e135e27ecb246b71a1cea08bf573caae28921621c50c5b1823a8d907b011713d6f0e850af
-
C:\Users\Admin\AppData\Local\Temp\9794140876af52d9df2ec6da5a3dfbc46cf8032922ead79d2857a390100d6219.exe
Filesize86KB
MD5f8c8afe96c9efaecac648f1a96e45fd3
SHA121947b2ce0d2827d84ee4db4b8aa31bedb4d6298
SHA25618fcd8e9650e18c390405ad0d12841f9c5640b3ae5057fbae9ffd04b7e920021
SHA512fb92249a85d1a57f9048efd8b829f0edbdd131eacd6cc564f366877e135e27ecb246b71a1cea08bf573caae28921621c50c5b1823a8d907b011713d6f0e850af
-
Filesize
76KB
MD59878ead5a7e0a3f951f54fc335703399
SHA1d28850ff969d60ed0dc44f0257e88eafc7491141
SHA25620eaf15faabc27fbdc1516bcc43bf8db473dbec57c2dadaeb2a75e6dfb5c1d33
SHA512bc556b8704061f150ae449923b3bcd72b208a54c038f5a2177f4639f935fdf45be3a205375ed3f7807e5d7c2c2e317403d0b44d5a554b5999f5218b936467e5f
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
163KB
MD5074e3007b249ca82b01d358bff1067b7
SHA1f258fa640841c883713b24a187522f81f1ccd3a6
SHA2564d86b156a534dbadb5a54f9484f7afcd3bd8845473a73ec044c2d65773ede9db
SHA512f40004ad511ba9bbb35a6be1cb8e10eace2f82e6417fbfc7e8f8710f411f02bf1e97fb8c23fc5408535616b4c8600f564540295deb41adb1aff73a651fa3cb6e
-
Filesize
163KB
MD5074e3007b249ca82b01d358bff1067b7
SHA1f258fa640841c883713b24a187522f81f1ccd3a6
SHA2564d86b156a534dbadb5a54f9484f7afcd3bd8845473a73ec044c2d65773ede9db
SHA512f40004ad511ba9bbb35a6be1cb8e10eace2f82e6417fbfc7e8f8710f411f02bf1e97fb8c23fc5408535616b4c8600f564540295deb41adb1aff73a651fa3cb6e
-
Filesize
163KB
MD5074e3007b249ca82b01d358bff1067b7
SHA1f258fa640841c883713b24a187522f81f1ccd3a6
SHA2564d86b156a534dbadb5a54f9484f7afcd3bd8845473a73ec044c2d65773ede9db
SHA512f40004ad511ba9bbb35a6be1cb8e10eace2f82e6417fbfc7e8f8710f411f02bf1e97fb8c23fc5408535616b4c8600f564540295deb41adb1aff73a651fa3cb6e
-
Filesize
163KB
MD5074e3007b249ca82b01d358bff1067b7
SHA1f258fa640841c883713b24a187522f81f1ccd3a6
SHA2564d86b156a534dbadb5a54f9484f7afcd3bd8845473a73ec044c2d65773ede9db
SHA512f40004ad511ba9bbb35a6be1cb8e10eace2f82e6417fbfc7e8f8710f411f02bf1e97fb8c23fc5408535616b4c8600f564540295deb41adb1aff73a651fa3cb6e
-
Filesize
163KB
MD5074e3007b249ca82b01d358bff1067b7
SHA1f258fa640841c883713b24a187522f81f1ccd3a6
SHA2564d86b156a534dbadb5a54f9484f7afcd3bd8845473a73ec044c2d65773ede9db
SHA512f40004ad511ba9bbb35a6be1cb8e10eace2f82e6417fbfc7e8f8710f411f02bf1e97fb8c23fc5408535616b4c8600f564540295deb41adb1aff73a651fa3cb6e
-
Filesize
163KB
MD5074e3007b249ca82b01d358bff1067b7
SHA1f258fa640841c883713b24a187522f81f1ccd3a6
SHA2564d86b156a534dbadb5a54f9484f7afcd3bd8845473a73ec044c2d65773ede9db
SHA512f40004ad511ba9bbb35a6be1cb8e10eace2f82e6417fbfc7e8f8710f411f02bf1e97fb8c23fc5408535616b4c8600f564540295deb41adb1aff73a651fa3cb6e
-
Filesize
86KB
MD5f8c8afe96c9efaecac648f1a96e45fd3
SHA121947b2ce0d2827d84ee4db4b8aa31bedb4d6298
SHA25618fcd8e9650e18c390405ad0d12841f9c5640b3ae5057fbae9ffd04b7e920021
SHA512fb92249a85d1a57f9048efd8b829f0edbdd131eacd6cc564f366877e135e27ecb246b71a1cea08bf573caae28921621c50c5b1823a8d907b011713d6f0e850af
-
Filesize
86KB
MD5f8c8afe96c9efaecac648f1a96e45fd3
SHA121947b2ce0d2827d84ee4db4b8aa31bedb4d6298
SHA25618fcd8e9650e18c390405ad0d12841f9c5640b3ae5057fbae9ffd04b7e920021
SHA512fb92249a85d1a57f9048efd8b829f0edbdd131eacd6cc564f366877e135e27ecb246b71a1cea08bf573caae28921621c50c5b1823a8d907b011713d6f0e850af
-
Filesize
86KB
MD5f8c8afe96c9efaecac648f1a96e45fd3
SHA121947b2ce0d2827d84ee4db4b8aa31bedb4d6298
SHA25618fcd8e9650e18c390405ad0d12841f9c5640b3ae5057fbae9ffd04b7e920021
SHA512fb92249a85d1a57f9048efd8b829f0edbdd131eacd6cc564f366877e135e27ecb246b71a1cea08bf573caae28921621c50c5b1823a8d907b011713d6f0e850af
-
Filesize
86KB
MD5f8c8afe96c9efaecac648f1a96e45fd3
SHA121947b2ce0d2827d84ee4db4b8aa31bedb4d6298
SHA25618fcd8e9650e18c390405ad0d12841f9c5640b3ae5057fbae9ffd04b7e920021
SHA512fb92249a85d1a57f9048efd8b829f0edbdd131eacd6cc564f366877e135e27ecb246b71a1cea08bf573caae28921621c50c5b1823a8d907b011713d6f0e850af
-
Filesize
86KB
MD5f8c8afe96c9efaecac648f1a96e45fd3
SHA121947b2ce0d2827d84ee4db4b8aa31bedb4d6298
SHA25618fcd8e9650e18c390405ad0d12841f9c5640b3ae5057fbae9ffd04b7e920021
SHA512fb92249a85d1a57f9048efd8b829f0edbdd131eacd6cc564f366877e135e27ecb246b71a1cea08bf573caae28921621c50c5b1823a8d907b011713d6f0e850af
-
Filesize
163KB
MD5074e3007b249ca82b01d358bff1067b7
SHA1f258fa640841c883713b24a187522f81f1ccd3a6
SHA2564d86b156a534dbadb5a54f9484f7afcd3bd8845473a73ec044c2d65773ede9db
SHA512f40004ad511ba9bbb35a6be1cb8e10eace2f82e6417fbfc7e8f8710f411f02bf1e97fb8c23fc5408535616b4c8600f564540295deb41adb1aff73a651fa3cb6e
-
Filesize
163KB
MD5074e3007b249ca82b01d358bff1067b7
SHA1f258fa640841c883713b24a187522f81f1ccd3a6
SHA2564d86b156a534dbadb5a54f9484f7afcd3bd8845473a73ec044c2d65773ede9db
SHA512f40004ad511ba9bbb35a6be1cb8e10eace2f82e6417fbfc7e8f8710f411f02bf1e97fb8c23fc5408535616b4c8600f564540295deb41adb1aff73a651fa3cb6e
-
Filesize
163KB
MD5074e3007b249ca82b01d358bff1067b7
SHA1f258fa640841c883713b24a187522f81f1ccd3a6
SHA2564d86b156a534dbadb5a54f9484f7afcd3bd8845473a73ec044c2d65773ede9db
SHA512f40004ad511ba9bbb35a6be1cb8e10eace2f82e6417fbfc7e8f8710f411f02bf1e97fb8c23fc5408535616b4c8600f564540295deb41adb1aff73a651fa3cb6e
-
Filesize
86KB
MD5f8c8afe96c9efaecac648f1a96e45fd3
SHA121947b2ce0d2827d84ee4db4b8aa31bedb4d6298
SHA25618fcd8e9650e18c390405ad0d12841f9c5640b3ae5057fbae9ffd04b7e920021
SHA512fb92249a85d1a57f9048efd8b829f0edbdd131eacd6cc564f366877e135e27ecb246b71a1cea08bf573caae28921621c50c5b1823a8d907b011713d6f0e850af
-
Filesize
86KB
MD5f8c8afe96c9efaecac648f1a96e45fd3
SHA121947b2ce0d2827d84ee4db4b8aa31bedb4d6298
SHA25618fcd8e9650e18c390405ad0d12841f9c5640b3ae5057fbae9ffd04b7e920021
SHA512fb92249a85d1a57f9048efd8b829f0edbdd131eacd6cc564f366877e135e27ecb246b71a1cea08bf573caae28921621c50c5b1823a8d907b011713d6f0e850af
-
Filesize
86KB
MD5f8c8afe96c9efaecac648f1a96e45fd3
SHA121947b2ce0d2827d84ee4db4b8aa31bedb4d6298
SHA25618fcd8e9650e18c390405ad0d12841f9c5640b3ae5057fbae9ffd04b7e920021
SHA512fb92249a85d1a57f9048efd8b829f0edbdd131eacd6cc564f366877e135e27ecb246b71a1cea08bf573caae28921621c50c5b1823a8d907b011713d6f0e850af
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
163KB
MD5074e3007b249ca82b01d358bff1067b7
SHA1f258fa640841c883713b24a187522f81f1ccd3a6
SHA2564d86b156a534dbadb5a54f9484f7afcd3bd8845473a73ec044c2d65773ede9db
SHA512f40004ad511ba9bbb35a6be1cb8e10eace2f82e6417fbfc7e8f8710f411f02bf1e97fb8c23fc5408535616b4c8600f564540295deb41adb1aff73a651fa3cb6e
-
Filesize
163KB
MD5074e3007b249ca82b01d358bff1067b7
SHA1f258fa640841c883713b24a187522f81f1ccd3a6
SHA2564d86b156a534dbadb5a54f9484f7afcd3bd8845473a73ec044c2d65773ede9db
SHA512f40004ad511ba9bbb35a6be1cb8e10eace2f82e6417fbfc7e8f8710f411f02bf1e97fb8c23fc5408535616b4c8600f564540295deb41adb1aff73a651fa3cb6e
-
Filesize
163KB
MD5074e3007b249ca82b01d358bff1067b7
SHA1f258fa640841c883713b24a187522f81f1ccd3a6
SHA2564d86b156a534dbadb5a54f9484f7afcd3bd8845473a73ec044c2d65773ede9db
SHA512f40004ad511ba9bbb35a6be1cb8e10eace2f82e6417fbfc7e8f8710f411f02bf1e97fb8c23fc5408535616b4c8600f564540295deb41adb1aff73a651fa3cb6e
-
Filesize
163KB
MD5074e3007b249ca82b01d358bff1067b7
SHA1f258fa640841c883713b24a187522f81f1ccd3a6
SHA2564d86b156a534dbadb5a54f9484f7afcd3bd8845473a73ec044c2d65773ede9db
SHA512f40004ad511ba9bbb35a6be1cb8e10eace2f82e6417fbfc7e8f8710f411f02bf1e97fb8c23fc5408535616b4c8600f564540295deb41adb1aff73a651fa3cb6e
-
Filesize
163KB
MD5074e3007b249ca82b01d358bff1067b7
SHA1f258fa640841c883713b24a187522f81f1ccd3a6
SHA2564d86b156a534dbadb5a54f9484f7afcd3bd8845473a73ec044c2d65773ede9db
SHA512f40004ad511ba9bbb35a6be1cb8e10eace2f82e6417fbfc7e8f8710f411f02bf1e97fb8c23fc5408535616b4c8600f564540295deb41adb1aff73a651fa3cb6e
-
Filesize
163KB
MD5074e3007b249ca82b01d358bff1067b7
SHA1f258fa640841c883713b24a187522f81f1ccd3a6
SHA2564d86b156a534dbadb5a54f9484f7afcd3bd8845473a73ec044c2d65773ede9db
SHA512f40004ad511ba9bbb35a6be1cb8e10eace2f82e6417fbfc7e8f8710f411f02bf1e97fb8c23fc5408535616b4c8600f564540295deb41adb1aff73a651fa3cb6e
-
Filesize
86KB
MD5f8c8afe96c9efaecac648f1a96e45fd3
SHA121947b2ce0d2827d84ee4db4b8aa31bedb4d6298
SHA25618fcd8e9650e18c390405ad0d12841f9c5640b3ae5057fbae9ffd04b7e920021
SHA512fb92249a85d1a57f9048efd8b829f0edbdd131eacd6cc564f366877e135e27ecb246b71a1cea08bf573caae28921621c50c5b1823a8d907b011713d6f0e850af
-
Filesize
86KB
MD5f8c8afe96c9efaecac648f1a96e45fd3
SHA121947b2ce0d2827d84ee4db4b8aa31bedb4d6298
SHA25618fcd8e9650e18c390405ad0d12841f9c5640b3ae5057fbae9ffd04b7e920021
SHA512fb92249a85d1a57f9048efd8b829f0edbdd131eacd6cc564f366877e135e27ecb246b71a1cea08bf573caae28921621c50c5b1823a8d907b011713d6f0e850af
-
Filesize
86KB
MD5f8c8afe96c9efaecac648f1a96e45fd3
SHA121947b2ce0d2827d84ee4db4b8aa31bedb4d6298
SHA25618fcd8e9650e18c390405ad0d12841f9c5640b3ae5057fbae9ffd04b7e920021
SHA512fb92249a85d1a57f9048efd8b829f0edbdd131eacd6cc564f366877e135e27ecb246b71a1cea08bf573caae28921621c50c5b1823a8d907b011713d6f0e850af
-
Filesize
86KB
MD5f8c8afe96c9efaecac648f1a96e45fd3
SHA121947b2ce0d2827d84ee4db4b8aa31bedb4d6298
SHA25618fcd8e9650e18c390405ad0d12841f9c5640b3ae5057fbae9ffd04b7e920021
SHA512fb92249a85d1a57f9048efd8b829f0edbdd131eacd6cc564f366877e135e27ecb246b71a1cea08bf573caae28921621c50c5b1823a8d907b011713d6f0e850af
-
Filesize
163KB
MD5074e3007b249ca82b01d358bff1067b7
SHA1f258fa640841c883713b24a187522f81f1ccd3a6
SHA2564d86b156a534dbadb5a54f9484f7afcd3bd8845473a73ec044c2d65773ede9db
SHA512f40004ad511ba9bbb35a6be1cb8e10eace2f82e6417fbfc7e8f8710f411f02bf1e97fb8c23fc5408535616b4c8600f564540295deb41adb1aff73a651fa3cb6e
-
Filesize
76KB
MD59878ead5a7e0a3f951f54fc335703399
SHA1d28850ff969d60ed0dc44f0257e88eafc7491141
SHA25620eaf15faabc27fbdc1516bcc43bf8db473dbec57c2dadaeb2a75e6dfb5c1d33
SHA512bc556b8704061f150ae449923b3bcd72b208a54c038f5a2177f4639f935fdf45be3a205375ed3f7807e5d7c2c2e317403d0b44d5a554b5999f5218b936467e5f
-
Filesize
76KB
MD52f7c8c7ffea1b3571e4b302346c3a958
SHA1ec2b8834dbd80f3965c1063d52fec01c008ee039
SHA256e4724c55472d8acbd434adafa6ac20fe89312a49cc4d6cae62d177f9e3512f92
SHA51204fe51c6075fe9cd7886d41856f43ab0abcc30be3c25b8333970c683674eac394585501621635a1d2087eef2c670364e50554efd97494d358b16aa39f29acff9
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062
-
Filesize
8B
MD524865ca220aa1936cbac0a57685217c5
SHA137f687cafe79e91eae6cbdffbf2f7ad3975f5e83
SHA256841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743
SHA512c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062