Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2022, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe
Resource
win10v2004-20220812-en
General
-
Target
7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe
-
Size
600KB
-
MD5
4f87499129b41b8d336caa50f12aea40
-
SHA1
652e9243745e77cd1d3844062c902dac2d03285e
-
SHA256
7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
-
SHA512
2b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
SSDEEP
6144:Kj6/wndfF/gl0LQIk8DR3dEuAI7pEfxsZozAm9TMdGQLUg1nYmefPImdrion:Y6onxOp8FySpE5zvIdtU+Ymef
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" aihsydo.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe -
Adds policy Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pyykrxjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pisofvriwpzrytyzcz.exe" aihsydo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ugjyirgqxjm = "niusldbukfrlurybgfje.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ugjyirgqxjm = "zqyshvpeqhpfkdgf.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ugjyirgqxjm = "zqyshvpeqhpfkdgf.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ugjyirgqxjm = "zqyshvpeqhpfkdgf.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pyykrxjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cylkexwqhdqlvtbfllqmz.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ugjyirgqxjm = "cylkexwqhdqlvtbfllqmz.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pyykrxjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gyhcshcsfxgxdxbbd.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pyykrxjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aufculiapjunvrxzdbe.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pyykrxjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\niusldbukfrlurybgfje.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pyykrxjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gyhcshcsfxgxdxbbd.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ugjyirgqxjm = "aufculiapjunvrxzdbe.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pyykrxjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zqyshvpeqhpfkdgf.exe" aihsydo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pyykrxjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zqyshvpeqhpfkdgf.exe" grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pyykrxjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cylkexwqhdqlvtbfllqmz.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ugjyirgqxjm = "niusldbukfrlurybgfje.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pyykrxjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aufculiapjunvrxzdbe.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ugjyirgqxjm = "gyhcshcsfxgxdxbbd.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ugjyirgqxjm = "pisofvriwpzrytyzcz.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pyykrxjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aufculiapjunvrxzdbe.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pyykrxjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pisofvriwpzrytyzcz.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\pyykrxjq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\niusldbukfrlurybgfje.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ugjyirgqxjm = "zqyshvpeqhpfkdgf.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ugjyirgqxjm = "aufculiapjunvrxzdbe.exe" aihsydo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ugjyirgqxjm = "pisofvriwpzrytyzcz.exe" aihsydo.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aihsydo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" grrfdxtjqbb.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aihsydo.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aihsydo.exe -
Executes dropped EXE 4 IoCs
pid Process 876 grrfdxtjqbb.exe 940 aihsydo.exe 4936 aihsydo.exe 1488 grrfdxtjqbb.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation grrfdxtjqbb.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "pisofvriwpzrytyzcz.exe ." aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ukrkylesdtaptln = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gyhcshcsfxgxdxbbd.exe" aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zqyshvpeqhpfkdgf.exe ." aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qejamxoajxcpr = "pisofvriwpzrytyzcz.exe ." grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rgmerdvishnbev = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pisofvriwpzrytyzcz.exe ." grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reiyjtjucptf = "pisofvriwpzrytyzcz.exe" aihsydo.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reiyjtjucptf = "aufculiapjunvrxzdbe.exe" aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gqremtgot = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cylkexwqhdqlvtbfllqmz.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gqremtgot = "zqyshvpeqhpfkdgf.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gqremtgot = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cylkexwqhdqlvtbfllqmz.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\niusldbukfrlurybgfje.exe ." grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "aufculiapjunvrxzdbe.exe ." grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gqremtgot = "zqyshvpeqhpfkdgf.exe" aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gyhcshcsfxgxdxbbd.exe ." aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pisofvriwpzrytyzcz.exe ." aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reiyjtjucptf = "gyhcshcsfxgxdxbbd.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ukrkylesdtaptln = "C:\\Users\\Admin\\AppData\\Local\\Temp\\niusldbukfrlurybgfje.exe" aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qejamxoajxcpr = "niusldbukfrlurybgfje.exe ." aihsydo.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rgmerdvishnbev = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aufculiapjunvrxzdbe.exe ." aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\niusldbukfrlurybgfje.exe ." aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ukrkylesdtaptln = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zqyshvpeqhpfkdgf.exe" aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reiyjtjucptf = "niusldbukfrlurybgfje.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rgmerdvishnbev = "C:\\Users\\Admin\\AppData\\Local\\Temp\\niusldbukfrlurybgfje.exe ." aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gqremtgot = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gyhcshcsfxgxdxbbd.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gqremtgot = "aufculiapjunvrxzdbe.exe" aihsydo.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gqremtgot = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pisofvriwpzrytyzcz.exe" aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gyhcshcsfxgxdxbbd.exe ." aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qejamxoajxcpr = "gyhcshcsfxgxdxbbd.exe ." aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "cylkexwqhdqlvtbfllqmz.exe ." aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rgmerdvishnbev = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gyhcshcsfxgxdxbbd.exe ." aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qejamxoajxcpr = "zqyshvpeqhpfkdgf.exe ." aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gqremtgot = "cylkexwqhdqlvtbfllqmz.exe" grrfdxtjqbb.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gqremtgot = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cylkexwqhdqlvtbfllqmz.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ukrkylesdtaptln = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aufculiapjunvrxzdbe.exe" aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reiyjtjucptf = "gyhcshcsfxgxdxbbd.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aufculiapjunvrxzdbe.exe ." aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rgmerdvishnbev = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pisofvriwpzrytyzcz.exe ." aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zqyshvpeqhpfkdgf.exe ." aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "zqyshvpeqhpfkdgf.exe ." aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ukrkylesdtaptln = "C:\\Users\\Admin\\AppData\\Local\\Temp\\niusldbukfrlurybgfje.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\rgmerdvishnbev = "C:\\Users\\Admin\\AppData\\Local\\Temp\\niusldbukfrlurybgfje.exe ." aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ukrkylesdtaptln = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aufculiapjunvrxzdbe.exe" grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qejamxoajxcpr = "pisofvriwpzrytyzcz.exe ." aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "niusldbukfrlurybgfje.exe ." aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gqremtgot = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aufculiapjunvrxzdbe.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gqremtgot = "gyhcshcsfxgxdxbbd.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "aufculiapjunvrxzdbe.exe ." aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "gyhcshcsfxgxdxbbd.exe ." aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reiyjtjucptf = "zqyshvpeqhpfkdgf.exe" aihsydo.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run grrfdxtjqbb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reiyjtjucptf = "gyhcshcsfxgxdxbbd.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "niusldbukfrlurybgfje.exe ." grrfdxtjqbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zkmajrfouf = "niusldbukfrlurybgfje.exe ." aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gqremtgot = "aufculiapjunvrxzdbe.exe" aihsydo.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gqremtgot = "pisofvriwpzrytyzcz.exe" aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\reiyjtjucptf = "cylkexwqhdqlvtbfllqmz.exe" aihsydo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gqremtgot = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zqyshvpeqhpfkdgf.exe" aihsydo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\gqremtgot = "pisofvriwpzrytyzcz.exe" aihsydo.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aihsydo.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aihsydo.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA aihsydo.exe -
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 whatismyipaddress.com 24 whatismyip.everdot.org 49 whatismyip.everdot.org 52 www.showmyipaddress.com 55 whatismyip.everdot.org 66 whatismyip.everdot.org 18 whatismyip.everdot.org -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\autorun.inf aihsydo.exe File created C:\autorun.inf aihsydo.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tqeezttogdrnyxglstzwkk.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\aufculiapjunvrxzdbe.exe aihsydo.exe File opened for modification C:\Windows\SysWOW64\tqeezttogdrnyxglstzwkk.exe aihsydo.exe File opened for modification C:\Windows\SysWOW64\qejamxoajxcprhhdbtqejamxoajxcprhhdb.qej aihsydo.exe File opened for modification C:\Windows\SysWOW64\zqyshvpeqhpfkdgf.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\gyhcshcsfxgxdxbbd.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\gyhcshcsfxgxdxbbd.exe aihsydo.exe File opened for modification C:\Windows\SysWOW64\gyhcshcsfxgxdxbbd.exe aihsydo.exe File opened for modification C:\Windows\SysWOW64\zqyshvpeqhpfkdgf.exe aihsydo.exe File created C:\Windows\SysWOW64\qejamxoajxcprhhdbtqejamxoajxcprhhdb.qej aihsydo.exe File opened for modification C:\Windows\SysWOW64\cylkexwqhdqlvtbfllqmz.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\zqyshvpeqhpfkdgf.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\niusldbukfrlurybgfje.exe aihsydo.exe File opened for modification C:\Windows\SysWOW64\cylkexwqhdqlvtbfllqmz.exe aihsydo.exe File opened for modification C:\Windows\SysWOW64\aufculiapjunvrxzdbe.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\niusldbukfrlurybgfje.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\pisofvriwpzrytyzcz.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\tqeezttogdrnyxglstzwkk.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\cylkexwqhdqlvtbfllqmz.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\pisofvriwpzrytyzcz.exe aihsydo.exe File opened for modification C:\Windows\SysWOW64\aufculiapjunvrxzdbe.exe aihsydo.exe File opened for modification C:\Windows\SysWOW64\pisofvriwpzrytyzcz.exe aihsydo.exe File opened for modification C:\Windows\SysWOW64\niusldbukfrlurybgfje.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\zqyshvpeqhpfkdgf.exe aihsydo.exe File opened for modification C:\Windows\SysWOW64\niusldbukfrlurybgfje.exe aihsydo.exe File opened for modification C:\Windows\SysWOW64\hkekllrsqtnpglalyfruouvv.cad aihsydo.exe File opened for modification C:\Windows\SysWOW64\pisofvriwpzrytyzcz.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\cylkexwqhdqlvtbfllqmz.exe aihsydo.exe File opened for modification C:\Windows\SysWOW64\tqeezttogdrnyxglstzwkk.exe aihsydo.exe File created C:\Windows\SysWOW64\hkekllrsqtnpglalyfruouvv.cad aihsydo.exe File opened for modification C:\Windows\SysWOW64\gyhcshcsfxgxdxbbd.exe grrfdxtjqbb.exe File opened for modification C:\Windows\SysWOW64\aufculiapjunvrxzdbe.exe grrfdxtjqbb.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\hkekllrsqtnpglalyfruouvv.cad aihsydo.exe File created C:\Program Files (x86)\hkekllrsqtnpglalyfruouvv.cad aihsydo.exe File opened for modification C:\Program Files (x86)\qejamxoajxcprhhdbtqejamxoajxcprhhdb.qej aihsydo.exe File created C:\Program Files (x86)\qejamxoajxcprhhdbtqejamxoajxcprhhdb.qej aihsydo.exe -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\zqyshvpeqhpfkdgf.exe grrfdxtjqbb.exe File opened for modification C:\Windows\aufculiapjunvrxzdbe.exe grrfdxtjqbb.exe File created C:\Windows\qejamxoajxcprhhdbtqejamxoajxcprhhdb.qej aihsydo.exe File opened for modification C:\Windows\gyhcshcsfxgxdxbbd.exe grrfdxtjqbb.exe File opened for modification C:\Windows\niusldbukfrlurybgfje.exe aihsydo.exe File opened for modification C:\Windows\tqeezttogdrnyxglstzwkk.exe aihsydo.exe File opened for modification C:\Windows\niusldbukfrlurybgfje.exe grrfdxtjqbb.exe File opened for modification C:\Windows\aufculiapjunvrxzdbe.exe aihsydo.exe File opened for modification C:\Windows\niusldbukfrlurybgfje.exe aihsydo.exe File opened for modification C:\Windows\tqeezttogdrnyxglstzwkk.exe grrfdxtjqbb.exe File opened for modification C:\Windows\pisofvriwpzrytyzcz.exe grrfdxtjqbb.exe File opened for modification C:\Windows\niusldbukfrlurybgfje.exe grrfdxtjqbb.exe File opened for modification C:\Windows\cylkexwqhdqlvtbfllqmz.exe grrfdxtjqbb.exe File opened for modification C:\Windows\pisofvriwpzrytyzcz.exe grrfdxtjqbb.exe File opened for modification C:\Windows\tqeezttogdrnyxglstzwkk.exe aihsydo.exe File opened for modification C:\Windows\aufculiapjunvrxzdbe.exe aihsydo.exe File opened for modification C:\Windows\zqyshvpeqhpfkdgf.exe grrfdxtjqbb.exe File opened for modification C:\Windows\gyhcshcsfxgxdxbbd.exe grrfdxtjqbb.exe File opened for modification C:\Windows\gyhcshcsfxgxdxbbd.exe aihsydo.exe File created C:\Windows\hkekllrsqtnpglalyfruouvv.cad aihsydo.exe File opened for modification C:\Windows\aufculiapjunvrxzdbe.exe grrfdxtjqbb.exe File opened for modification C:\Windows\cylkexwqhdqlvtbfllqmz.exe grrfdxtjqbb.exe File opened for modification C:\Windows\tqeezttogdrnyxglstzwkk.exe grrfdxtjqbb.exe File opened for modification C:\Windows\gyhcshcsfxgxdxbbd.exe aihsydo.exe File opened for modification C:\Windows\hkekllrsqtnpglalyfruouvv.cad aihsydo.exe File opened for modification C:\Windows\qejamxoajxcprhhdbtqejamxoajxcprhhdb.qej aihsydo.exe File opened for modification C:\Windows\pisofvriwpzrytyzcz.exe aihsydo.exe File opened for modification C:\Windows\cylkexwqhdqlvtbfllqmz.exe aihsydo.exe File opened for modification C:\Windows\zqyshvpeqhpfkdgf.exe aihsydo.exe File opened for modification C:\Windows\pisofvriwpzrytyzcz.exe aihsydo.exe File opened for modification C:\Windows\cylkexwqhdqlvtbfllqmz.exe aihsydo.exe File opened for modification C:\Windows\zqyshvpeqhpfkdgf.exe aihsydo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 940 aihsydo.exe 940 aihsydo.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 940 aihsydo.exe 940 aihsydo.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 940 aihsydo.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3648 wrote to memory of 876 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 80 PID 3648 wrote to memory of 876 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 80 PID 3648 wrote to memory of 876 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 80 PID 876 wrote to memory of 940 876 grrfdxtjqbb.exe 81 PID 876 wrote to memory of 940 876 grrfdxtjqbb.exe 81 PID 876 wrote to memory of 940 876 grrfdxtjqbb.exe 81 PID 876 wrote to memory of 4936 876 grrfdxtjqbb.exe 82 PID 876 wrote to memory of 4936 876 grrfdxtjqbb.exe 82 PID 876 wrote to memory of 4936 876 grrfdxtjqbb.exe 82 PID 3648 wrote to memory of 1488 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 92 PID 3648 wrote to memory of 1488 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 92 PID 3648 wrote to memory of 1488 3648 7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe 92 -
System policy modification 1 TTPs 41 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" aihsydo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" aihsydo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" grrfdxtjqbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" grrfdxtjqbb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" aihsydo.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" aihsydo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe"C:\Users\Admin\AppData\Local\Temp\7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\grrfdxtjqbb.exe"C:\Users\Admin\AppData\Local\Temp\grrfdxtjqbb.exe" "c:\users\admin\appdata\local\temp\7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:876 -
C:\Users\Admin\AppData\Local\Temp\aihsydo.exe"C:\Users\Admin\AppData\Local\Temp\aihsydo.exe" "-C:\Users\Admin\AppData\Local\Temp\zqyshvpeqhpfkdgf.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\aihsydo.exe"C:\Users\Admin\AppData\Local\Temp\aihsydo.exe" "-C:\Users\Admin\AppData\Local\Temp\zqyshvpeqhpfkdgf.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:4936
-
-
-
C:\Users\Admin\AppData\Local\Temp\grrfdxtjqbb.exe"C:\Users\Admin\AppData\Local\Temp\grrfdxtjqbb.exe" "c:\users\admin\appdata\local\temp\7f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:1488
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712KB
MD50189a52914cddf06d13fc0827f9b2caa
SHA1da9d479aac5bf7640bc064798617a8a327c2b848
SHA256ee195553d245f93f73df75ee96bf1bd3ea0c42f088b58f61a117b409592a561c
SHA512c4b1fb045ce2af18e0e0ee500ed9e353f1e13707eb0393ec2ecbd98ee2b4ac6a95b7798e9781a3ad24dc439dbe6cf5bacdfc749184f378b89e2f24c8dca55ea5
-
Filesize
712KB
MD50189a52914cddf06d13fc0827f9b2caa
SHA1da9d479aac5bf7640bc064798617a8a327c2b848
SHA256ee195553d245f93f73df75ee96bf1bd3ea0c42f088b58f61a117b409592a561c
SHA512c4b1fb045ce2af18e0e0ee500ed9e353f1e13707eb0393ec2ecbd98ee2b4ac6a95b7798e9781a3ad24dc439dbe6cf5bacdfc749184f378b89e2f24c8dca55ea5
-
Filesize
712KB
MD50189a52914cddf06d13fc0827f9b2caa
SHA1da9d479aac5bf7640bc064798617a8a327c2b848
SHA256ee195553d245f93f73df75ee96bf1bd3ea0c42f088b58f61a117b409592a561c
SHA512c4b1fb045ce2af18e0e0ee500ed9e353f1e13707eb0393ec2ecbd98ee2b4ac6a95b7798e9781a3ad24dc439dbe6cf5bacdfc749184f378b89e2f24c8dca55ea5
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0
-
Filesize
600KB
MD54f87499129b41b8d336caa50f12aea40
SHA1652e9243745e77cd1d3844062c902dac2d03285e
SHA2567f0dbef75346f14c2ea0b1cf363d3cd8f23a2a8aeacfd46325dd536ac7668962
SHA5122b236ac889b2cd670b7a041af04712ccb59e6e557d8d6670072a572e4f412a0455dda0ba4adc19cf93acf43a50352d64d97647f76f393d17e84278b1b9b301e0