Analysis
-
max time kernel
191s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe
Resource
win10v2004-20221111-en
General
-
Target
5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe
-
Size
504KB
-
MD5
0470d85816b561d645e1bbacde4b8836
-
SHA1
93410b37cf75b5d5916d794136bb0591a3384c67
-
SHA256
5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
-
SHA512
3e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
SSDEEP
6144:Uj6/wndfF/gl0LQIk8DR3dEuAI7pEfxsZozAm9TMdGQLUg1nYmefPImdrionKysy:e6onxOp8FySpE5zvIdtU+YmefnB
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" nsvemr.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xsglwjgvhcq.exe -
Adds policy Run key to start application 2 TTPs 28 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\twxe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zobumbsjyiggzjzr.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\twxe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngxuqjezsgimjxrntrjc.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\agkudjr = "ngxuqjezsgimjxrntrjc.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\agkudjr = "gwkexnfxnyxysdunq.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\agkudjr = "ngxuqjezsgimjxrntrjc.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\twxe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cwomjdzvpehmkzuryxqkc.exe" xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\agkudjr = "asiezrlfxklokxqlqne.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\twxe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pgvqkbuneqqsnzrlpl.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\agkudjr = "zobumbsjyiggzjzr.exe" nsvemr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\twxe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngxuqjezsgimjxrntrjc.exe" xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\agkudjr = "zobumbsjyiggzjzr.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\agkudjr = "cwomjdzvpehmkzuryxqkc.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\twxe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pgvqkbuneqqsnzrlpl.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\agkudjr = "asiezrlfxklokxqlqne.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\twxe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngxuqjezsgimjxrntrjc.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\agkudjr = "gwkexnfxnyxysdunq.exe" xsglwjgvhcq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run nsvemr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\agkudjr = "ngxuqjezsgimjxrntrjc.exe" xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\twxe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gwkexnfxnyxysdunq.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\agkudjr = "gwkexnfxnyxysdunq.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\twxe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\asiezrlfxklokxqlqne.exe" xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\twxe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cwomjdzvpehmkzuryxqkc.exe" nsvemr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\twxe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zobumbsjyiggzjzr.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\twxe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\asiezrlfxklokxqlqne.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\twxe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gwkexnfxnyxysdunq.exe" nsvemr.exe -
Disables RegEdit via registry modification 7 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xsglwjgvhcq.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" nsvemr.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" nsvemr.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xsglwjgvhcq.exe -
Executes dropped EXE 4 IoCs
pid Process 5080 xsglwjgvhcq.exe 3648 nsvemr.exe 1472 nsvemr.exe 1240 xsglwjgvhcq.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation xsglwjgvhcq.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nsvemr = "gwkexnfxnyxysdunq.exe ." xsglwjgvhcq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nsvemr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pgvqkbuneqqsnzrlpl.exe ." xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uemanxjvfkd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cwomjdzvpehmkzuryxqkc.exe" nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nsvemr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngxuqjezsgimjxrntrjc.exe ." nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gougrzjtb = "pgvqkbuneqqsnzrlpl.exe ." nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uemanxjvfkd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zobumbsjyiggzjzr.exe" xsglwjgvhcq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cgiqx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngxuqjezsgimjxrntrjc.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cgiqx = "gwkexnfxnyxysdunq.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cgiqx = "pgvqkbuneqqsnzrlpl.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cgiqx = "gwkexnfxnyxysdunq.exe" nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nsvemr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pgvqkbuneqqsnzrlpl.exe ." nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cgiqx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gwkexnfxnyxysdunq.exe" xsglwjgvhcq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nsvemr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zobumbsjyiggzjzr.exe ." xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zipcoxitcg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gwkexnfxnyxysdunq.exe ." nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nsvemr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zobumbsjyiggzjzr.exe ." nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nsvemr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cwomjdzvpehmkzuryxqkc.exe ." nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nsvemr = "gwkexnfxnyxysdunq.exe ." nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zipcoxitcg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\asiezrlfxklokxqlqne.exe ." nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nsvemr = "ngxuqjezsgimjxrntrjc.exe ." nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gougrzjtb = "gwkexnfxnyxysdunq.exe ." nsvemr.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cgiqx = "pgvqkbuneqqsnzrlpl.exe" nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gougrzjtb = "asiezrlfxklokxqlqne.exe ." nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zipcoxitcg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zobumbsjyiggzjzr.exe ." nsvemr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uemanxjvfkd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zobumbsjyiggzjzr.exe" nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gougrzjtb = "pgvqkbuneqqsnzrlpl.exe ." nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cgiqx = "zobumbsjyiggzjzr.exe" nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pwbmwdmv = "asiezrlfxklokxqlqne.exe" xsglwjgvhcq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pwbmwdmv = "pgvqkbuneqqsnzrlpl.exe" nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cgiqx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gwkexnfxnyxysdunq.exe" nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gougrzjtb = "asiezrlfxklokxqlqne.exe ." nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zipcoxitcg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngxuqjezsgimjxrntrjc.exe ." nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nsvemr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cwomjdzvpehmkzuryxqkc.exe ." xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zipcoxitcg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cwomjdzvpehmkzuryxqkc.exe ." nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nsvemr = "cwomjdzvpehmkzuryxqkc.exe ." nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pwbmwdmv = "gwkexnfxnyxysdunq.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zipcoxitcg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngxuqjezsgimjxrntrjc.exe ." xsglwjgvhcq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nsvemr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\asiezrlfxklokxqlqne.exe ." nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\nsvemr = "C:\\Users\\Admin\\AppData\\Local\\Temp\\asiezrlfxklokxqlqne.exe ." nsvemr.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nsvemr = "asiezrlfxklokxqlqne.exe ." nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uemanxjvfkd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gwkexnfxnyxysdunq.exe" xsglwjgvhcq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\gougrzjtb = "ngxuqjezsgimjxrntrjc.exe ." xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uemanxjvfkd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gwkexnfxnyxysdunq.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uemanxjvfkd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ngxuqjezsgimjxrntrjc.exe" nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pwbmwdmv = "asiezrlfxklokxqlqne.exe" nsvemr.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zipcoxitcg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zobumbsjyiggzjzr.exe ." xsglwjgvhcq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cgiqx = "asiezrlfxklokxqlqne.exe" nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pwbmwdmv = "cwomjdzvpehmkzuryxqkc.exe" nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pwbmwdmv = "cwomjdzvpehmkzuryxqkc.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cgiqx = "ngxuqjezsgimjxrntrjc.exe" nsvemr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce xsglwjgvhcq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pwbmwdmv = "pgvqkbuneqqsnzrlpl.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\zipcoxitcg = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pgvqkbuneqqsnzrlpl.exe ." nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pwbmwdmv = "asiezrlfxklokxqlqne.exe" nsvemr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nsvemr = "gwkexnfxnyxysdunq.exe ." nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cgiqx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gwkexnfxnyxysdunq.exe" nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\nsvemr = "pgvqkbuneqqsnzrlpl.exe ." nsvemr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uemanxjvfkd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\asiezrlfxklokxqlqne.exe" nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cgiqx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zobumbsjyiggzjzr.exe" nsvemr.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\pwbmwdmv = "zobumbsjyiggzjzr.exe" nsvemr.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" nsvemr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" nsvemr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xsglwjgvhcq.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xsglwjgvhcq.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xsglwjgvhcq.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 45 whatismyip.everdot.org 51 whatismyipaddress.com 60 whatismyip.everdot.org 78 www.showmyipaddress.com 82 whatismyip.everdot.org -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\pgvqkbuneqqsnzrlpl.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\cwomjdzvpehmkzuryxqkc.exe nsvemr.exe File opened for modification C:\Windows\SysWOW64\pgvqkbuneqqsnzrlpl.exe nsvemr.exe File opened for modification C:\Windows\SysWOW64\zobumbsjyiggzjzr.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\asiezrlfxklokxqlqne.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\zobumbsjyiggzjzr.exe nsvemr.exe File opened for modification C:\Windows\SysWOW64\asiezrlfxklokxqlqne.exe nsvemr.exe File opened for modification C:\Windows\SysWOW64\ngxuqjezsgimjxrntrjc.exe nsvemr.exe File opened for modification C:\Windows\SysWOW64\tohgezwtoeiondzxffzunm.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\gwkexnfxnyxysdunq.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\cwomjdzvpehmkzuryxqkc.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\gwkexnfxnyxysdunq.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\ngxuqjezsgimjxrntrjc.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\gwkexnfxnyxysdunq.exe nsvemr.exe File created C:\Windows\SysWOW64\ecyabzzzxqxgibabmpmkg.jhh nsvemr.exe File opened for modification C:\Windows\SysWOW64\zobumbsjyiggzjzr.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\cwomjdzvpehmkzuryxqkc.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\ngxuqjezsgimjxrntrjc.exe nsvemr.exe File opened for modification C:\Windows\SysWOW64\ecyabzzzxqxgibabmpmkg.jhh nsvemr.exe File opened for modification C:\Windows\SysWOW64\cwomjdzvpehmkzuryxqkc.exe nsvemr.exe File opened for modification C:\Windows\SysWOW64\tohgezwtoeiondzxffzunm.exe nsvemr.exe File opened for modification C:\Windows\SysWOW64\zobumbsjyiggzjzr.exe nsvemr.exe File opened for modification C:\Windows\SysWOW64\pgvqkbuneqqsnzrlpl.exe nsvemr.exe File opened for modification C:\Windows\SysWOW64\ngxuqjezsgimjxrntrjc.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\tohgezwtoeiondzxffzunm.exe xsglwjgvhcq.exe File created C:\Windows\SysWOW64\zipcoxitcgysfjtfbpxgnamvgraewqdh.dzn nsvemr.exe File opened for modification C:\Windows\SysWOW64\pgvqkbuneqqsnzrlpl.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\tohgezwtoeiondzxffzunm.exe nsvemr.exe File opened for modification C:\Windows\SysWOW64\zipcoxitcgysfjtfbpxgnamvgraewqdh.dzn nsvemr.exe File opened for modification C:\Windows\SysWOW64\asiezrlfxklokxqlqne.exe xsglwjgvhcq.exe File opened for modification C:\Windows\SysWOW64\asiezrlfxklokxqlqne.exe nsvemr.exe File opened for modification C:\Windows\SysWOW64\gwkexnfxnyxysdunq.exe nsvemr.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\ecyabzzzxqxgibabmpmkg.jhh nsvemr.exe File created C:\Program Files (x86)\ecyabzzzxqxgibabmpmkg.jhh nsvemr.exe File opened for modification C:\Program Files (x86)\zipcoxitcgysfjtfbpxgnamvgraewqdh.dzn nsvemr.exe File created C:\Program Files (x86)\zipcoxitcgysfjtfbpxgnamvgraewqdh.dzn nsvemr.exe -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\cwomjdzvpehmkzuryxqkc.exe xsglwjgvhcq.exe File opened for modification C:\Windows\ngxuqjezsgimjxrntrjc.exe nsvemr.exe File opened for modification C:\Windows\asiezrlfxklokxqlqne.exe xsglwjgvhcq.exe File opened for modification C:\Windows\zobumbsjyiggzjzr.exe nsvemr.exe File opened for modification C:\Windows\pgvqkbuneqqsnzrlpl.exe nsvemr.exe File opened for modification C:\Windows\ngxuqjezsgimjxrntrjc.exe nsvemr.exe File opened for modification C:\Windows\asiezrlfxklokxqlqne.exe xsglwjgvhcq.exe File opened for modification C:\Windows\tohgezwtoeiondzxffzunm.exe xsglwjgvhcq.exe File opened for modification C:\Windows\gwkexnfxnyxysdunq.exe nsvemr.exe File opened for modification C:\Windows\asiezrlfxklokxqlqne.exe nsvemr.exe File opened for modification C:\Windows\zobumbsjyiggzjzr.exe xsglwjgvhcq.exe File opened for modification C:\Windows\ngxuqjezsgimjxrntrjc.exe xsglwjgvhcq.exe File opened for modification C:\Windows\pgvqkbuneqqsnzrlpl.exe nsvemr.exe File opened for modification C:\Windows\tohgezwtoeiondzxffzunm.exe nsvemr.exe File created C:\Windows\zipcoxitcgysfjtfbpxgnamvgraewqdh.dzn nsvemr.exe File opened for modification C:\Windows\gwkexnfxnyxysdunq.exe xsglwjgvhcq.exe File opened for modification C:\Windows\cwomjdzvpehmkzuryxqkc.exe xsglwjgvhcq.exe File opened for modification C:\Windows\gwkexnfxnyxysdunq.exe xsglwjgvhcq.exe File opened for modification C:\Windows\pgvqkbuneqqsnzrlpl.exe xsglwjgvhcq.exe File opened for modification C:\Windows\zobumbsjyiggzjzr.exe nsvemr.exe File opened for modification C:\Windows\cwomjdzvpehmkzuryxqkc.exe nsvemr.exe File opened for modification C:\Windows\tohgezwtoeiondzxffzunm.exe nsvemr.exe File created C:\Windows\ecyabzzzxqxgibabmpmkg.jhh nsvemr.exe File opened for modification C:\Windows\cwomjdzvpehmkzuryxqkc.exe nsvemr.exe File opened for modification C:\Windows\ecyabzzzxqxgibabmpmkg.jhh nsvemr.exe File opened for modification C:\Windows\zobumbsjyiggzjzr.exe xsglwjgvhcq.exe File opened for modification C:\Windows\gwkexnfxnyxysdunq.exe nsvemr.exe File opened for modification C:\Windows\asiezrlfxklokxqlqne.exe nsvemr.exe File opened for modification C:\Windows\zipcoxitcgysfjtfbpxgnamvgraewqdh.dzn nsvemr.exe File opened for modification C:\Windows\pgvqkbuneqqsnzrlpl.exe xsglwjgvhcq.exe File opened for modification C:\Windows\ngxuqjezsgimjxrntrjc.exe xsglwjgvhcq.exe File opened for modification C:\Windows\tohgezwtoeiondzxffzunm.exe xsglwjgvhcq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 3648 nsvemr.exe 3648 nsvemr.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3648 nsvemr.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2184 wrote to memory of 5080 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 82 PID 2184 wrote to memory of 5080 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 82 PID 2184 wrote to memory of 5080 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 82 PID 5080 wrote to memory of 3648 5080 xsglwjgvhcq.exe 83 PID 5080 wrote to memory of 3648 5080 xsglwjgvhcq.exe 83 PID 5080 wrote to memory of 3648 5080 xsglwjgvhcq.exe 83 PID 5080 wrote to memory of 1472 5080 xsglwjgvhcq.exe 84 PID 5080 wrote to memory of 1472 5080 xsglwjgvhcq.exe 84 PID 5080 wrote to memory of 1472 5080 xsglwjgvhcq.exe 84 PID 2184 wrote to memory of 1240 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 100 PID 2184 wrote to memory of 1240 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 100 PID 2184 wrote to memory of 1240 2184 5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe 100 -
System policy modification 1 TTPs 41 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xsglwjgvhcq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" xsglwjgvhcq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" nsvemr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" nsvemr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" nsvemr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" xsglwjgvhcq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer xsglwjgvhcq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" nsvemr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" nsvemr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xsglwjgvhcq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe"C:\Users\Admin\AppData\Local\Temp\5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\xsglwjgvhcq.exe"C:\Users\Admin\AppData\Local\Temp\xsglwjgvhcq.exe" "c:\users\admin\appdata\local\temp\5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\nsvemr.exe"C:\Users\Admin\AppData\Local\Temp\nsvemr.exe" "-c:\users\admin\appdata\local\temp\5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\nsvemr.exe"C:\Users\Admin\AppData\Local\Temp\nsvemr.exe" "-c:\users\admin\appdata\local\temp\5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:1472
-
-
-
C:\Users\Admin\AppData\Local\Temp\xsglwjgvhcq.exe"C:\Users\Admin\AppData\Local\Temp\xsglwjgvhcq.exe" "c:\users\admin\appdata\local\temp\5352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:1240
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
712KB
MD537270c4a52f475672fcac47e21c4ab57
SHA1c7086416f9a178ac22708ae931fb47fec63f8d49
SHA256ff7990e7ecf3e06a9f177783f511c2e1c1e6066a18bc99c97f625fc2584a530b
SHA512ab959b7293eedf8922dcc465d730a5dab4fe5094f4fb04524082c08b40231303095afbab502e29e529d0e2ba636b148840d125ff94e5757957a1302d31c0547e
-
Filesize
712KB
MD537270c4a52f475672fcac47e21c4ab57
SHA1c7086416f9a178ac22708ae931fb47fec63f8d49
SHA256ff7990e7ecf3e06a9f177783f511c2e1c1e6066a18bc99c97f625fc2584a530b
SHA512ab959b7293eedf8922dcc465d730a5dab4fe5094f4fb04524082c08b40231303095afbab502e29e529d0e2ba636b148840d125ff94e5757957a1302d31c0547e
-
Filesize
712KB
MD537270c4a52f475672fcac47e21c4ab57
SHA1c7086416f9a178ac22708ae931fb47fec63f8d49
SHA256ff7990e7ecf3e06a9f177783f511c2e1c1e6066a18bc99c97f625fc2584a530b
SHA512ab959b7293eedf8922dcc465d730a5dab4fe5094f4fb04524082c08b40231303095afbab502e29e529d0e2ba636b148840d125ff94e5757957a1302d31c0547e
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471
-
Filesize
320KB
MD55203b6ea0901877fbf2d8d6f6d8d338e
SHA1c803e92561921b38abe13239c1fd85605b570936
SHA2560cc02d34d5fd4cf892fed282f98c1ad3e7dd6159a8877ae5c46d3f834ed36060
SHA512d48a41b4fc4c38a6473f789c02918fb7353a4b4199768a3624f3b685d91d38519887a1ccd3616e0d2b079a346afaec5a0f2ef2c46d72d3097ef561cedb476471
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9
-
Filesize
504KB
MD50470d85816b561d645e1bbacde4b8836
SHA193410b37cf75b5d5916d794136bb0591a3384c67
SHA2565352365d564950a3889746b795d5ae0d67e5d1ec2b8e1be68c1a47124fd9b5fe
SHA5123e790c577829d606110ebbf3ecaac6b649723693dca0e1b09b0b22f12b9b466b3a4cdbe93f2da84e35bd6527baec172c0598013d61caa2e915fdf303981377c9