Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
392s -
max time network
463s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe
Resource
win10v2004-20221111-en
General
-
Target
ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe
-
Size
796KB
-
MD5
11bd03379101ef560bb21ba8c76b5853
-
SHA1
d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
-
SHA256
ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
-
SHA512
8e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
SSDEEP
6144:V8XXRUw9Oz5+iUPO4RJtvRx7HfnSzObtkLo5vOFTaLTGu0yvHcr+JB8aUEj:enRy+vvtHfRVxOFuPyAHcqrU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" fdiwjegfpns.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" wehvdis.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" wehvdis.exe -
Adds policy Run key to start application 2 TTPs 20 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\cmrhryksy = "vmyvmativyblewwd.exe" wehvdis.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fdiwjegfpns.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\cmrhryksy = "lesrkavmbglxsmoxdf.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqsfmq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lesrkavmbglxsmoxdf.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqsfmq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yulnjcaumucrpmrdmrneg.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqsfmq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lesrkavmbglxsmoxdf.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\cmrhryksy = "lesrkavmbglxsmoxdf.exe" fdiwjegfpns.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqsfmq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vmyvmativyblewwd.exe" fdiwjegfpns.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\cmrhryksy = "yulnjcaumucrpmrdmrneg.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\cmrhryksy = "cuhfxmgwkosdxqrze.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\cmrhryksy = "jeuvqifypwdrokozhlgw.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqsfmq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yulnjcaumucrpmrdmrneg.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\cmrhryksy = "wqffzqmeuagtpknxehb.exe" fdiwjegfpns.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqsfmq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jeuvqifypwdrokozhlgw.exe" fdiwjegfpns.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqsfmq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cuhfxmgwkosdxqrze.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqsfmq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vmyvmativyblewwd.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\jqsfmq = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jeuvqifypwdrokozhlgw.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\cmrhryksy = "wqffzqmeuagtpknxehb.exe" wehvdis.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wehvdis.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" fdiwjegfpns.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wehvdis.exe -
Executes dropped EXE 11 IoCs
pid Process 1628 fdiwjegfpns.exe 2308 wehvdis.exe 3516 wehvdis.exe 4228 wehvdis.exe 1388 wehvdis.exe 784 wehvdis.exe 5116 wehvdis.exe 1084 wehvdis.exe 4560 wehvdis.exe 1908 wehvdis.exe 628 wehvdis.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation fdiwjegfpns.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\majdrcseooovl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqffzqmeuagtpknxehb.exe" fdiwjegfpns.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\luynwcnu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yulnjcaumucrpmrdmrneg.exe ." fdiwjegfpns.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\naiboynyhgfl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yulnjcaumucrpmrdmrneg.exe ." fdiwjegfpns.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wehvdis = "vmyvmativyblewwd.exe" wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vgmdowjszw = "cuhfxmgwkosdxqrze.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\majdrcseooovl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqffzqmeuagtpknxehb.exe" wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vgmdowjszw = "jeuvqifypwdrokozhlgw.exe" wehvdis.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run fdiwjegfpns.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qcjbnwkucay = "wqffzqmeuagtpknxehb.exe ." wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wehvdis = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yulnjcaumucrpmrdmrneg.exe" wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\luynwcnu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yulnjcaumucrpmrdmrneg.exe ." wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\majdrcseooovl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lesrkavmbglxsmoxdf.exe" wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vgmdowjszw = "jeuvqifypwdrokozhlgw.exe" fdiwjegfpns.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\luynwcnu = "jeuvqifypwdrokozhlgw.exe ." wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\majdrcseooovl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lesrkavmbglxsmoxdf.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\naiboynyhgfl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yulnjcaumucrpmrdmrneg.exe ." wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\luynwcnu = "vmyvmativyblewwd.exe ." wehvdis.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\luynwcnu = "yulnjcaumucrpmrdmrneg.exe ." wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wehvdis = "wqffzqmeuagtpknxehb.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\majdrcseooovl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vmyvmativyblewwd.exe" wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qcjbnwkucay = "lesrkavmbglxsmoxdf.exe ." fdiwjegfpns.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\luynwcnu = "jeuvqifypwdrokozhlgw.exe ." fdiwjegfpns.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vgmdowjszw = "lesrkavmbglxsmoxdf.exe" fdiwjegfpns.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qcjbnwkucay = "yulnjcaumucrpmrdmrneg.exe ." wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\luynwcnu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lesrkavmbglxsmoxdf.exe ." wehvdis.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run fdiwjegfpns.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\majdrcseooovl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lesrkavmbglxsmoxdf.exe" fdiwjegfpns.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wehvdis = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jeuvqifypwdrokozhlgw.exe" wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vgmdowjszw = "jeuvqifypwdrokozhlgw.exe" wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\luynwcnu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lesrkavmbglxsmoxdf.exe ." wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\luynwcnu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lesrkavmbglxsmoxdf.exe ." fdiwjegfpns.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qcjbnwkucay = "wqffzqmeuagtpknxehb.exe ." wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\luynwcnu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yulnjcaumucrpmrdmrneg.exe ." wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wehvdis = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqffzqmeuagtpknxehb.exe" wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wehvdis = "C:\\Users\\Admin\\AppData\\Local\\Temp\\lesrkavmbglxsmoxdf.exe" fdiwjegfpns.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce fdiwjegfpns.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\majdrcseooovl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vmyvmativyblewwd.exe" fdiwjegfpns.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\luynwcnu = "vmyvmativyblewwd.exe ." wehvdis.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wehvdis = "yulnjcaumucrpmrdmrneg.exe" wehvdis.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fdiwjegfpns.exe Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\majdrcseooovl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cuhfxmgwkosdxqrze.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\naiboynyhgfl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\yulnjcaumucrpmrdmrneg.exe ." wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qcjbnwkucay = "cuhfxmgwkosdxqrze.exe ." wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vgmdowjszw = "cuhfxmgwkosdxqrze.exe" wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\luynwcnu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cuhfxmgwkosdxqrze.exe ." fdiwjegfpns.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vgmdowjszw = "vmyvmativyblewwd.exe" wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qcjbnwkucay = "vmyvmativyblewwd.exe ." fdiwjegfpns.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wehvdis = "jeuvqifypwdrokozhlgw.exe" wehvdis.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vgmdowjszw = "lesrkavmbglxsmoxdf.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\majdrcseooovl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqffzqmeuagtpknxehb.exe" wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\naiboynyhgfl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqffzqmeuagtpknxehb.exe ." wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\naiboynyhgfl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wqffzqmeuagtpknxehb.exe ." wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qcjbnwkucay = "yulnjcaumucrpmrdmrneg.exe ." fdiwjegfpns.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\qcjbnwkucay = "yulnjcaumucrpmrdmrneg.exe ." wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\luynwcnu = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vmyvmativyblewwd.exe ." wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\luynwcnu = "lesrkavmbglxsmoxdf.exe ." wehvdis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\naiboynyhgfl = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vmyvmativyblewwd.exe ." wehvdis.exe Set value (str) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wehvdis = "C:\\Users\\Admin\\AppData\\Local\\Temp\\jeuvqifypwdrokozhlgw.exe" fdiwjegfpns.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fdiwjegfpns.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wehvdis.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wehvdis.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wehvdis.exe -
Drops file in System32 directory 46 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\yulnjcaumucrpmrdmrneg.exe wehvdis.exe File opened for modification C:\Windows\SysWOW64\wqffzqmeuagtpknxehb.exe fdiwjegfpns.exe File created C:\Windows\SysWOW64\jeuvqifypwdrokozhlgw.exe fdiwjegfpns.exe File created C:\Windows\SysWOW64\cuhfxmgwkosdxqrze.exe wehvdis.exe File created C:\Windows\SysWOW64\cuhfxmgwkosdxqrze.exe wehvdis.exe File opened for modification C:\Windows\SysWOW64\pmeheyxsludtsqwjtzworo.exe wehvdis.exe File opened for modification C:\Windows\SysWOW64\vmyvmativyblewwd.exe wehvdis.exe File created C:\Windows\SysWOW64\vmyvmativyblewwd.exe wehvdis.exe File opened for modification C:\Windows\SysWOW64\cuhfxmgwkosdxqrze.exe wehvdis.exe File created C:\Windows\SysWOW64\lesrkavmbglxsmoxdf.exe wehvdis.exe File created C:\Windows\SysWOW64\wqffzqmeuagtpknxehb.exe wehvdis.exe File created C:\Windows\SysWOW64\cuhfxmgwkosdxqrze.exe fdiwjegfpns.exe File opened for modification C:\Windows\SysWOW64\yulnjcaumucrpmrdmrneg.exe fdiwjegfpns.exe File created C:\Windows\SysWOW64\yulnjcaumucrpmrdmrneg.exe fdiwjegfpns.exe File opened for modification C:\Windows\SysWOW64\jeuvqifypwdrokozhlgw.exe wehvdis.exe File opened for modification C:\Windows\SysWOW64\vgmdowjszwtxkwqrpjuarckxgnkhlyke.dxi wehvdis.exe File created C:\Windows\SysWOW64\lesrkavmbglxsmoxdf.exe fdiwjegfpns.exe File created C:\Windows\SysWOW64\pmeheyxsludtsqwjtzworo.exe wehvdis.exe File opened for modification C:\Windows\SysWOW64\vmyvmativyblewwd.exe fdiwjegfpns.exe File created C:\Windows\SysWOW64\vmyvmativyblewwd.exe fdiwjegfpns.exe File opened for modification C:\Windows\SysWOW64\lesrkavmbglxsmoxdf.exe fdiwjegfpns.exe File created C:\Windows\SysWOW64\yulnjcaumucrpmrdmrneg.exe wehvdis.exe File opened for modification C:\Windows\SysWOW64\aavbbyayugslnoxnajjek.hjh wehvdis.exe File opened for modification C:\Windows\SysWOW64\pmeheyxsludtsqwjtzworo.exe fdiwjegfpns.exe File opened for modification C:\Windows\SysWOW64\cuhfxmgwkosdxqrze.exe wehvdis.exe File opened for modification C:\Windows\SysWOW64\wqffzqmeuagtpknxehb.exe wehvdis.exe File opened for modification C:\Windows\SysWOW64\pmeheyxsludtsqwjtzworo.exe wehvdis.exe File created C:\Windows\SysWOW64\pmeheyxsludtsqwjtzworo.exe wehvdis.exe File created C:\Windows\SysWOW64\vmyvmativyblewwd.exe wehvdis.exe File opened for modification C:\Windows\SysWOW64\jeuvqifypwdrokozhlgw.exe wehvdis.exe File opened for modification C:\Windows\SysWOW64\yulnjcaumucrpmrdmrneg.exe wehvdis.exe File opened for modification C:\Windows\SysWOW64\vmyvmativyblewwd.exe wehvdis.exe File created C:\Windows\SysWOW64\lesrkavmbglxsmoxdf.exe wehvdis.exe File created C:\Windows\SysWOW64\jeuvqifypwdrokozhlgw.exe wehvdis.exe File created C:\Windows\SysWOW64\yulnjcaumucrpmrdmrneg.exe wehvdis.exe File created C:\Windows\SysWOW64\aavbbyayugslnoxnajjek.hjh wehvdis.exe File created C:\Windows\SysWOW64\wqffzqmeuagtpknxehb.exe fdiwjegfpns.exe File opened for modification C:\Windows\SysWOW64\jeuvqifypwdrokozhlgw.exe fdiwjegfpns.exe File created C:\Windows\SysWOW64\pmeheyxsludtsqwjtzworo.exe fdiwjegfpns.exe File created C:\Windows\SysWOW64\wqffzqmeuagtpknxehb.exe wehvdis.exe File opened for modification C:\Windows\SysWOW64\lesrkavmbglxsmoxdf.exe wehvdis.exe File created C:\Windows\SysWOW64\jeuvqifypwdrokozhlgw.exe wehvdis.exe File created C:\Windows\SysWOW64\vgmdowjszwtxkwqrpjuarckxgnkhlyke.dxi wehvdis.exe File opened for modification C:\Windows\SysWOW64\cuhfxmgwkosdxqrze.exe fdiwjegfpns.exe File opened for modification C:\Windows\SysWOW64\lesrkavmbglxsmoxdf.exe wehvdis.exe File opened for modification C:\Windows\SysWOW64\wqffzqmeuagtpknxehb.exe wehvdis.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\aavbbyayugslnoxnajjek.hjh wehvdis.exe File created C:\Program Files (x86)\aavbbyayugslnoxnajjek.hjh wehvdis.exe File opened for modification C:\Program Files (x86)\vgmdowjszwtxkwqrpjuarckxgnkhlyke.dxi wehvdis.exe File created C:\Program Files (x86)\vgmdowjszwtxkwqrpjuarckxgnkhlyke.dxi wehvdis.exe -
Drops file in Windows directory 33 IoCs
description ioc Process File opened for modification C:\Windows\pmeheyxsludtsqwjtzworo.exe fdiwjegfpns.exe File created C:\Windows\vmyvmativyblewwd.exe wehvdis.exe File opened for modification C:\Windows\lesrkavmbglxsmoxdf.exe wehvdis.exe File created C:\Windows\yulnjcaumucrpmrdmrneg.exe fdiwjegfpns.exe File opened for modification C:\Windows\lesrkavmbglxsmoxdf.exe fdiwjegfpns.exe File opened for modification C:\Windows\vmyvmativyblewwd.exe wehvdis.exe File opened for modification C:\Windows\cuhfxmgwkosdxqrze.exe wehvdis.exe File opened for modification C:\Windows\wqffzqmeuagtpknxehb.exe wehvdis.exe File opened for modification C:\Windows\jeuvqifypwdrokozhlgw.exe wehvdis.exe File opened for modification C:\Windows\yulnjcaumucrpmrdmrneg.exe wehvdis.exe File opened for modification C:\Windows\lesrkavmbglxsmoxdf.exe wehvdis.exe File opened for modification C:\Windows\cuhfxmgwkosdxqrze.exe fdiwjegfpns.exe File created C:\Windows\pmeheyxsludtsqwjtzworo.exe fdiwjegfpns.exe File opened for modification C:\Windows\yulnjcaumucrpmrdmrneg.exe wehvdis.exe File opened for modification C:\Windows\aavbbyayugslnoxnajjek.hjh wehvdis.exe File created C:\Windows\cuhfxmgwkosdxqrze.exe fdiwjegfpns.exe File opened for modification C:\Windows\jeuvqifypwdrokozhlgw.exe fdiwjegfpns.exe File opened for modification C:\Windows\jeuvqifypwdrokozhlgw.exe wehvdis.exe File created C:\Windows\vmyvmativyblewwd.exe fdiwjegfpns.exe File opened for modification C:\Windows\pmeheyxsludtsqwjtzworo.exe wehvdis.exe File created C:\Windows\aavbbyayugslnoxnajjek.hjh wehvdis.exe File created C:\Windows\vgmdowjszwtxkwqrpjuarckxgnkhlyke.dxi wehvdis.exe File created C:\Windows\jeuvqifypwdrokozhlgw.exe fdiwjegfpns.exe File created C:\Windows\lesrkavmbglxsmoxdf.exe fdiwjegfpns.exe File created C:\Windows\wqffzqmeuagtpknxehb.exe fdiwjegfpns.exe File opened for modification C:\Windows\yulnjcaumucrpmrdmrneg.exe fdiwjegfpns.exe File opened for modification C:\Windows\cuhfxmgwkosdxqrze.exe wehvdis.exe File opened for modification C:\Windows\vgmdowjszwtxkwqrpjuarckxgnkhlyke.dxi wehvdis.exe File opened for modification C:\Windows\vmyvmativyblewwd.exe fdiwjegfpns.exe File opened for modification C:\Windows\vmyvmativyblewwd.exe wehvdis.exe File opened for modification C:\Windows\wqffzqmeuagtpknxehb.exe wehvdis.exe File opened for modification C:\Windows\pmeheyxsludtsqwjtzworo.exe wehvdis.exe File opened for modification C:\Windows\wqffzqmeuagtpknxehb.exe fdiwjegfpns.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4180 wrote to memory of 1628 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 80 PID 4180 wrote to memory of 1628 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 80 PID 4180 wrote to memory of 1628 4180 ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe 80 PID 1628 wrote to memory of 2308 1628 fdiwjegfpns.exe 83 PID 1628 wrote to memory of 2308 1628 fdiwjegfpns.exe 83 PID 1628 wrote to memory of 2308 1628 fdiwjegfpns.exe 83 PID 1628 wrote to memory of 3516 1628 fdiwjegfpns.exe 84 PID 1628 wrote to memory of 3516 1628 fdiwjegfpns.exe 84 PID 1628 wrote to memory of 3516 1628 fdiwjegfpns.exe 84 PID 1628 wrote to memory of 4228 1628 fdiwjegfpns.exe 85 PID 1628 wrote to memory of 4228 1628 fdiwjegfpns.exe 85 PID 1628 wrote to memory of 4228 1628 fdiwjegfpns.exe 85 PID 1628 wrote to memory of 1388 1628 fdiwjegfpns.exe 86 PID 1628 wrote to memory of 1388 1628 fdiwjegfpns.exe 86 PID 1628 wrote to memory of 1388 1628 fdiwjegfpns.exe 86 PID 1628 wrote to memory of 784 1628 fdiwjegfpns.exe 87 PID 1628 wrote to memory of 784 1628 fdiwjegfpns.exe 87 PID 1628 wrote to memory of 784 1628 fdiwjegfpns.exe 87 PID 1628 wrote to memory of 5116 1628 fdiwjegfpns.exe 88 PID 1628 wrote to memory of 5116 1628 fdiwjegfpns.exe 88 PID 1628 wrote to memory of 5116 1628 fdiwjegfpns.exe 88 PID 1628 wrote to memory of 1084 1628 fdiwjegfpns.exe 89 PID 1628 wrote to memory of 1084 1628 fdiwjegfpns.exe 89 PID 1628 wrote to memory of 1084 1628 fdiwjegfpns.exe 89 PID 1628 wrote to memory of 4560 1628 fdiwjegfpns.exe 90 PID 1628 wrote to memory of 4560 1628 fdiwjegfpns.exe 90 PID 1628 wrote to memory of 4560 1628 fdiwjegfpns.exe 90 PID 1628 wrote to memory of 1908 1628 fdiwjegfpns.exe 91 PID 1628 wrote to memory of 1908 1628 fdiwjegfpns.exe 91 PID 1628 wrote to memory of 1908 1628 fdiwjegfpns.exe 91 PID 1628 wrote to memory of 628 1628 fdiwjegfpns.exe 92 PID 1628 wrote to memory of 628 1628 fdiwjegfpns.exe 92 PID 1628 wrote to memory of 628 1628 fdiwjegfpns.exe 92 -
System policy modification 1 TTPs 39 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wehvdis.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" fdiwjegfpns.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer fdiwjegfpns.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System wehvdis.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" wehvdis.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" fdiwjegfpns.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" wehvdis.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" wehvdis.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer wehvdis.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe"C:\Users\Admin\AppData\Local\Temp\ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\fdiwjegfpns.exe"C:\Users\Admin\AppData\Local\Temp\fdiwjegfpns.exe" "c:\users\admin\appdata\local\temp\ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\wehvdis.exe"C:\Users\Admin\AppData\Local\Temp\wehvdis.exe" "-c:\users\admin\appdata\local\temp\ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe"3⤵
- Executes dropped EXE
PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\wehvdis.exe"C:\Users\Admin\AppData\Local\Temp\wehvdis.exe" "-c:\users\admin\appdata\local\temp\ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe"3⤵
- Executes dropped EXE
PID:3516
-
-
C:\Users\Admin\AppData\Local\Temp\wehvdis.exe"C:\Users\Admin\AppData\Local\Temp\wehvdis.exe" "-c:\users\admin\appdata\local\temp\ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe"3⤵
- Executes dropped EXE
PID:4228
-
-
C:\Users\Admin\AppData\Local\Temp\wehvdis.exe"C:\Users\Admin\AppData\Local\Temp\wehvdis.exe" "-c:\users\admin\appdata\local\temp\ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe"3⤵
- Executes dropped EXE
PID:1388
-
-
C:\Users\Admin\AppData\Local\Temp\wehvdis.exe"C:\Users\Admin\AppData\Local\Temp\wehvdis.exe" "-c:\users\admin\appdata\local\temp\ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe"3⤵
- Executes dropped EXE
PID:784
-
-
C:\Users\Admin\AppData\Local\Temp\wehvdis.exe"C:\Users\Admin\AppData\Local\Temp\wehvdis.exe" "-c:\users\admin\appdata\local\temp\ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe"3⤵
- Executes dropped EXE
PID:5116
-
-
C:\Users\Admin\AppData\Local\Temp\wehvdis.exe"C:\Users\Admin\AppData\Local\Temp\wehvdis.exe" "-c:\users\admin\appdata\local\temp\ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe"3⤵
- Executes dropped EXE
PID:1084
-
-
C:\Users\Admin\AppData\Local\Temp\wehvdis.exe"C:\Users\Admin\AppData\Local\Temp\wehvdis.exe" "-c:\users\admin\appdata\local\temp\ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe"3⤵
- Executes dropped EXE
PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\wehvdis.exe"C:\Users\Admin\AppData\Local\Temp\wehvdis.exe" "-c:\users\admin\appdata\local\temp\ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System policy modification
PID:1908
-
-
C:\Users\Admin\AppData\Local\Temp\wehvdis.exe"C:\Users\Admin\AppData\Local\Temp\wehvdis.exe" "-c:\users\admin\appdata\local\temp\ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:628
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
308KB
MD5b58393335b3621bfb1fc631823248577
SHA1315ffce8bae73f153679650cb580659cae1df77a
SHA2566ea5753634bcae5b7fb519f8556eb8d09b0a7b547e3b0214e7141ce8e92302d9
SHA512456450a5dceb3f1cdbafb7d5f65766b1c5c0a3de04abaa2601b178b330dcfb217c4f362285055a5bb1daa88fa0dbdfb7810b05d073cc04ea540f7a4b5b9dc053
-
Filesize
308KB
MD5b58393335b3621bfb1fc631823248577
SHA1315ffce8bae73f153679650cb580659cae1df77a
SHA2566ea5753634bcae5b7fb519f8556eb8d09b0a7b547e3b0214e7141ce8e92302d9
SHA512456450a5dceb3f1cdbafb7d5f65766b1c5c0a3de04abaa2601b178b330dcfb217c4f362285055a5bb1daa88fa0dbdfb7810b05d073cc04ea540f7a4b5b9dc053
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
684KB
MD5d7245d8de8b452220e35f8b48785f5e9
SHA1905f04955daa76fe0dfcfb5e8fc3495b4a371aa0
SHA25671036a10ef095452f0111782900cae27adac3c4b709a5a09e42a7714bf6f2f1a
SHA512a3bbf2a2bebe90b2ee01fcfe21069805f8b67dbc996e599921db7ddb396d57126dacbe78ad1d360ac0301b93025c4e20432097a1d4bd2fbb8cdc3510d670b954
-
Filesize
684KB
MD5d7245d8de8b452220e35f8b48785f5e9
SHA1905f04955daa76fe0dfcfb5e8fc3495b4a371aa0
SHA25671036a10ef095452f0111782900cae27adac3c4b709a5a09e42a7714bf6f2f1a
SHA512a3bbf2a2bebe90b2ee01fcfe21069805f8b67dbc996e599921db7ddb396d57126dacbe78ad1d360ac0301b93025c4e20432097a1d4bd2fbb8cdc3510d670b954
-
Filesize
684KB
MD5d7245d8de8b452220e35f8b48785f5e9
SHA1905f04955daa76fe0dfcfb5e8fc3495b4a371aa0
SHA25671036a10ef095452f0111782900cae27adac3c4b709a5a09e42a7714bf6f2f1a
SHA512a3bbf2a2bebe90b2ee01fcfe21069805f8b67dbc996e599921db7ddb396d57126dacbe78ad1d360ac0301b93025c4e20432097a1d4bd2fbb8cdc3510d670b954
-
Filesize
684KB
MD5d7245d8de8b452220e35f8b48785f5e9
SHA1905f04955daa76fe0dfcfb5e8fc3495b4a371aa0
SHA25671036a10ef095452f0111782900cae27adac3c4b709a5a09e42a7714bf6f2f1a
SHA512a3bbf2a2bebe90b2ee01fcfe21069805f8b67dbc996e599921db7ddb396d57126dacbe78ad1d360ac0301b93025c4e20432097a1d4bd2fbb8cdc3510d670b954
-
Filesize
684KB
MD5d7245d8de8b452220e35f8b48785f5e9
SHA1905f04955daa76fe0dfcfb5e8fc3495b4a371aa0
SHA25671036a10ef095452f0111782900cae27adac3c4b709a5a09e42a7714bf6f2f1a
SHA512a3bbf2a2bebe90b2ee01fcfe21069805f8b67dbc996e599921db7ddb396d57126dacbe78ad1d360ac0301b93025c4e20432097a1d4bd2fbb8cdc3510d670b954
-
Filesize
684KB
MD5d7245d8de8b452220e35f8b48785f5e9
SHA1905f04955daa76fe0dfcfb5e8fc3495b4a371aa0
SHA25671036a10ef095452f0111782900cae27adac3c4b709a5a09e42a7714bf6f2f1a
SHA512a3bbf2a2bebe90b2ee01fcfe21069805f8b67dbc996e599921db7ddb396d57126dacbe78ad1d360ac0301b93025c4e20432097a1d4bd2fbb8cdc3510d670b954
-
Filesize
684KB
MD5d7245d8de8b452220e35f8b48785f5e9
SHA1905f04955daa76fe0dfcfb5e8fc3495b4a371aa0
SHA25671036a10ef095452f0111782900cae27adac3c4b709a5a09e42a7714bf6f2f1a
SHA512a3bbf2a2bebe90b2ee01fcfe21069805f8b67dbc996e599921db7ddb396d57126dacbe78ad1d360ac0301b93025c4e20432097a1d4bd2fbb8cdc3510d670b954
-
Filesize
684KB
MD5d7245d8de8b452220e35f8b48785f5e9
SHA1905f04955daa76fe0dfcfb5e8fc3495b4a371aa0
SHA25671036a10ef095452f0111782900cae27adac3c4b709a5a09e42a7714bf6f2f1a
SHA512a3bbf2a2bebe90b2ee01fcfe21069805f8b67dbc996e599921db7ddb396d57126dacbe78ad1d360ac0301b93025c4e20432097a1d4bd2fbb8cdc3510d670b954
-
Filesize
684KB
MD5d7245d8de8b452220e35f8b48785f5e9
SHA1905f04955daa76fe0dfcfb5e8fc3495b4a371aa0
SHA25671036a10ef095452f0111782900cae27adac3c4b709a5a09e42a7714bf6f2f1a
SHA512a3bbf2a2bebe90b2ee01fcfe21069805f8b67dbc996e599921db7ddb396d57126dacbe78ad1d360ac0301b93025c4e20432097a1d4bd2fbb8cdc3510d670b954
-
Filesize
684KB
MD5d7245d8de8b452220e35f8b48785f5e9
SHA1905f04955daa76fe0dfcfb5e8fc3495b4a371aa0
SHA25671036a10ef095452f0111782900cae27adac3c4b709a5a09e42a7714bf6f2f1a
SHA512a3bbf2a2bebe90b2ee01fcfe21069805f8b67dbc996e599921db7ddb396d57126dacbe78ad1d360ac0301b93025c4e20432097a1d4bd2fbb8cdc3510d670b954
-
Filesize
684KB
MD5d7245d8de8b452220e35f8b48785f5e9
SHA1905f04955daa76fe0dfcfb5e8fc3495b4a371aa0
SHA25671036a10ef095452f0111782900cae27adac3c4b709a5a09e42a7714bf6f2f1a
SHA512a3bbf2a2bebe90b2ee01fcfe21069805f8b67dbc996e599921db7ddb396d57126dacbe78ad1d360ac0301b93025c4e20432097a1d4bd2fbb8cdc3510d670b954
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682
-
Filesize
796KB
MD511bd03379101ef560bb21ba8c76b5853
SHA1d5ecd45ea5e3dfdc5e53b40281a4e2f01b5df549
SHA256ed2a347c165ca9e2fc1fdd50a4554e575c17407dc9c865778390e7e076bb152d
SHA5128e11e68a54bbdc69cfc1d61d79cee1bd3f0586251764e4805536933a1bfd1049f56f71273ae78dd51d0a867cb494cd7db8f0605c0ec01e8ef9570f637b1cb682