Analysis
-
max time kernel
190s -
max time network
236s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe
Resource
win10v2004-20221111-en
General
-
Target
a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe
-
Size
488KB
-
MD5
7ffd687e3046eba7d819628442e83fa3
-
SHA1
819ab64fe969ee3d37ecf205875f4d686af9a34b
-
SHA256
a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
-
SHA512
5ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
SSDEEP
12288:x6bvdl0zCB8EDItMTzwg7lMQsvNuqZBRbZEYTwdD7IjLgB:SvdezCByqTtlMQsFuqzRbzI7IE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" xzsqxqazhjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" xzsqxqazhjc.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xhqucik.exe -
Adds policy Run key to start application 2 TTPs 33 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofvgvirnwhejfg = "khdupixzofitvcsunvgd.exe" xzsqxqazhjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfsamwcvbjd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dxqewmyxjxxfeivuk.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofvgvirnwhejfg = "dxqewmyxjxxfeivuk.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfsamwcvbjd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zxumicsvldhtwevysbnli.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfsamwcvbjd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khdupixzofitvcsunvgd.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfsamwcvbjd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wphulaljuhgnloay.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfsamwcvbjd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zxumicsvldhtwevysbnli.exe" xzsqxqazhjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofvgvirnwhejfg = "zxumicsvldhtwevysbnli.exe" xzsqxqazhjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofvgvirnwhejfg = "xtoeyqeftjlvwcrskrb.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfsamwcvbjd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xtoeyqeftjlvwcrskrb.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfsamwcvbjd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mhbqjannapqzzessjp.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfsamwcvbjd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khdupixzofitvcsunvgd.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofvgvirnwhejfg = "dxqewmyxjxxfeivuk.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfsamwcvbjd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zxumicsvldhtwevysbnli.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfsamwcvbjd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mhbqjannapqzzessjp.exe" xzsqxqazhjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofvgvirnwhejfg = "zxumicsvldhtwevysbnli.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfsamwcvbjd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wphulaljuhgnloay.exe" xhqucik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xzsqxqazhjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xzsqxqazhjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofvgvirnwhejfg = "wphulaljuhgnloay.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofvgvirnwhejfg = "mhbqjannapqzzessjp.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofvgvirnwhejfg = "khdupixzofitvcsunvgd.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofvgvirnwhejfg = "zxumicsvldhtwevysbnli.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofvgvirnwhejfg = "mhbqjannapqzzessjp.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfsamwcvbjd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xtoeyqeftjlvwcrskrb.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofvgvirnwhejfg = "khdupixzofitvcsunvgd.exe" xzsqxqazhjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofvgvirnwhejfg = "xtoeyqeftjlvwcrskrb.exe" xzsqxqazhjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfsamwcvbjd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zxumicsvldhtwevysbnli.exe" xzsqxqazhjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfsamwcvbjd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khdupixzofitvcsunvgd.exe" xzsqxqazhjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\rfsamwcvbjd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mhbqjannapqzzessjp.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ofvgvirnwhejfg = "xtoeyqeftjlvwcrskrb.exe" xhqucik.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xhqucik.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xzsqxqazhjc.exe Set value (int) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xhqucik.exe -
Executes dropped EXE 4 IoCs
pid Process 3596 xzsqxqazhjc.exe 2268 xhqucik.exe 3376 xhqucik.exe 344 xzsqxqazhjc.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation xzsqxqazhjc.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\odranyfzgpkn = "zxumicsvldhtwevysbnli.exe" xzsqxqazhjc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ndscqckfnxtxs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wphulaljuhgnloay.exe ." xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dxqewmyxjxxfeivuk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khdupixzofitvcsunvgd.exe ." xhqucik.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce xzsqxqazhjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\odranyfzgpkn = "mhbqjannapqzzessjp.exe" xzsqxqazhjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\odranyfzgpkn = "wphulaljuhgnloay.exe" xhqucik.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wphulaljuhgnloay = "xtoeyqeftjlvwcrskrb.exe ." xzsqxqazhjc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\odranyfzgpkn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dxqewmyxjxxfeivuk.exe" xzsqxqazhjc.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ndscqckfnxtxs = "mhbqjannapqzzessjp.exe ." xzsqxqazhjc.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xzsqxqazhjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xhqucik.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rjamcqaxhtrxuwh = "khdupixzofitvcsunvgd.exe" xhqucik.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wphulaljuhgnloay = "mhbqjannapqzzessjp.exe ." xzsqxqazhjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ndscqckfnxtxs = "wphulaljuhgnloay.exe ." xzsqxqazhjc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ndscqckfnxtxs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mhbqjannapqzzessjp.exe ." xzsqxqazhjc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rjamcqaxhtrxuwh = "dxqewmyxjxxfeivuk.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dxqewmyxjxxfeivuk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zxumicsvldhtwevysbnli.exe ." xhqucik.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rjamcqaxhtrxuwh = "zxumicsvldhtwevysbnli.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mhbqjannapqzzessjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xtoeyqeftjlvwcrskrb.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\odranyfzgpkn = "xtoeyqeftjlvwcrskrb.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dxqewmyxjxxfeivuk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dxqewmyxjxxfeivuk.exe ." xhqucik.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wphulaljuhgnloay = "dxqewmyxjxxfeivuk.exe ." xzsqxqazhjc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\odranyfzgpkn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wphulaljuhgnloay.exe" xhqucik.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\odranyfzgpkn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zxumicsvldhtwevysbnli.exe" xhqucik.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wphulaljuhgnloay = "zxumicsvldhtwevysbnli.exe ." xhqucik.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\odranyfzgpkn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khdupixzofitvcsunvgd.exe" xzsqxqazhjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ndscqckfnxtxs = "zxumicsvldhtwevysbnli.exe ." xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ndscqckfnxtxs = "dxqewmyxjxxfeivuk.exe ." xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dxqewmyxjxxfeivuk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wphulaljuhgnloay.exe ." xzsqxqazhjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mhbqjannapqzzessjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wphulaljuhgnloay.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ndscqckfnxtxs = "mhbqjannapqzzessjp.exe ." xhqucik.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\odranyfzgpkn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zxumicsvldhtwevysbnli.exe" xzsqxqazhjc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wphulaljuhgnloay = "wphulaljuhgnloay.exe ." xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ndscqckfnxtxs = "khdupixzofitvcsunvgd.exe ." xhqucik.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce xzsqxqazhjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mhbqjannapqzzessjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xtoeyqeftjlvwcrskrb.exe" xzsqxqazhjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mhbqjannapqzzessjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mhbqjannapqzzessjp.exe" xhqucik.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xzsqxqazhjc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ndscqckfnxtxs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xtoeyqeftjlvwcrskrb.exe ." xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\odranyfzgpkn = "dxqewmyxjxxfeivuk.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mhbqjannapqzzessjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khdupixzofitvcsunvgd.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dxqewmyxjxxfeivuk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\dxqewmyxjxxfeivuk.exe ." xzsqxqazhjc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rjamcqaxhtrxuwh = "zxumicsvldhtwevysbnli.exe" xhqucik.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wphulaljuhgnloay = "xtoeyqeftjlvwcrskrb.exe ." xhqucik.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ndscqckfnxtxs = "C:\\Users\\Admin\\AppData\\Local\\Temp\\zxumicsvldhtwevysbnli.exe ." xhqucik.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\odranyfzgpkn = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khdupixzofitvcsunvgd.exe" xhqucik.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xzsqxqazhjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce xzsqxqazhjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dxqewmyxjxxfeivuk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xtoeyqeftjlvwcrskrb.exe ." xzsqxqazhjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run xhqucik.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\odranyfzgpkn = "zxumicsvldhtwevysbnli.exe" xhqucik.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mhbqjannapqzzessjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khdupixzofitvcsunvgd.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dxqewmyxjxxfeivuk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wphulaljuhgnloay.exe ." xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\ndscqckfnxtxs = "khdupixzofitvcsunvgd.exe ." xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mhbqjannapqzzessjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\khdupixzofitvcsunvgd.exe" xzsqxqazhjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\dxqewmyxjxxfeivuk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mhbqjannapqzzessjp.exe ." xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mhbqjannapqzzessjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\xtoeyqeftjlvwcrskrb.exe" xhqucik.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mhbqjannapqzzessjp = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mhbqjannapqzzessjp.exe" xhqucik.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rjamcqaxhtrxuwh = "zxumicsvldhtwevysbnli.exe" xzsqxqazhjc.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xhqucik.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xhqucik.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xzsqxqazhjc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xzsqxqazhjc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xzsqxqazhjc.exe -
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 69 whatismyip.everdot.org 72 whatismyipaddress.com 81 www.showmyipaddress.com 85 whatismyip.everdot.org 95 whatismyip.everdot.org -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mhbqjannapqzzessjp.exe xzsqxqazhjc.exe File opened for modification C:\Windows\SysWOW64\wphulaljuhgnloay.exe xzsqxqazhjc.exe File opened for modification C:\Windows\SysWOW64\zxumicsvldhtwevysbnli.exe xzsqxqazhjc.exe File opened for modification C:\Windows\SysWOW64\wphulaljuhgnloay.exe xhqucik.exe File opened for modification C:\Windows\SysWOW64\zxumicsvldhtwevysbnli.exe xhqucik.exe File opened for modification C:\Windows\SysWOW64\qpngdyptkdivziaezjwvtm.exe xhqucik.exe File opened for modification C:\Windows\SysWOW64\wjvcnwbtyfyzroumvtuhtaluzrwdwxpm.ktr xhqucik.exe File opened for modification C:\Windows\SysWOW64\xtoeyqeftjlvwcrskrb.exe xzsqxqazhjc.exe File opened for modification C:\Windows\SysWOW64\dxqewmyxjxxfeivuk.exe xzsqxqazhjc.exe File opened for modification C:\Windows\SysWOW64\xtoeyqeftjlvwcrskrb.exe xzsqxqazhjc.exe File opened for modification C:\Windows\SysWOW64\khdupixzofitvcsunvgd.exe xzsqxqazhjc.exe File opened for modification C:\Windows\SysWOW64\zxumicsvldhtwevysbnli.exe xzsqxqazhjc.exe File opened for modification C:\Windows\SysWOW64\mhbqjannapqzzessjp.exe xhqucik.exe File opened for modification C:\Windows\SysWOW64\zxumicsvldhtwevysbnli.exe xhqucik.exe File opened for modification C:\Windows\SysWOW64\khdupixzofitvcsunvgd.exe xzsqxqazhjc.exe File opened for modification C:\Windows\SysWOW64\wphulaljuhgnloay.exe xhqucik.exe File opened for modification C:\Windows\SysWOW64\xtoeyqeftjlvwcrskrb.exe xhqucik.exe File opened for modification C:\Windows\SysWOW64\khdupixzofitvcsunvgd.exe xhqucik.exe File created C:\Windows\SysWOW64\wjvcnwbtyfyzroumvtuhtaluzrwdwxpm.ktr xhqucik.exe File opened for modification C:\Windows\SysWOW64\wphulaljuhgnloay.exe xzsqxqazhjc.exe File opened for modification C:\Windows\SysWOW64\dxqewmyxjxxfeivuk.exe xhqucik.exe File created C:\Windows\SysWOW64\bdeaaysztpxnugbigtjlm.iga xhqucik.exe File opened for modification C:\Windows\SysWOW64\mhbqjannapqzzessjp.exe xzsqxqazhjc.exe File opened for modification C:\Windows\SysWOW64\qpngdyptkdivziaezjwvtm.exe xhqucik.exe File opened for modification C:\Windows\SysWOW64\khdupixzofitvcsunvgd.exe xhqucik.exe File opened for modification C:\Windows\SysWOW64\bdeaaysztpxnugbigtjlm.iga xhqucik.exe File opened for modification C:\Windows\SysWOW64\qpngdyptkdivziaezjwvtm.exe xzsqxqazhjc.exe File opened for modification C:\Windows\SysWOW64\qpngdyptkdivziaezjwvtm.exe xzsqxqazhjc.exe File opened for modification C:\Windows\SysWOW64\mhbqjannapqzzessjp.exe xhqucik.exe File opened for modification C:\Windows\SysWOW64\dxqewmyxjxxfeivuk.exe xzsqxqazhjc.exe File opened for modification C:\Windows\SysWOW64\dxqewmyxjxxfeivuk.exe xhqucik.exe File opened for modification C:\Windows\SysWOW64\xtoeyqeftjlvwcrskrb.exe xhqucik.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\wjvcnwbtyfyzroumvtuhtaluzrwdwxpm.ktr xhqucik.exe File opened for modification C:\Program Files (x86)\bdeaaysztpxnugbigtjlm.iga xhqucik.exe File created C:\Program Files (x86)\bdeaaysztpxnugbigtjlm.iga xhqucik.exe File opened for modification C:\Program Files (x86)\wjvcnwbtyfyzroumvtuhtaluzrwdwxpm.ktr xhqucik.exe -
Drops file in Windows directory 32 IoCs
description ioc Process File opened for modification C:\Windows\dxqewmyxjxxfeivuk.exe xzsqxqazhjc.exe File opened for modification C:\Windows\mhbqjannapqzzessjp.exe xzsqxqazhjc.exe File opened for modification C:\Windows\xtoeyqeftjlvwcrskrb.exe xhqucik.exe File created C:\Windows\bdeaaysztpxnugbigtjlm.iga xhqucik.exe File opened for modification C:\Windows\dxqewmyxjxxfeivuk.exe xhqucik.exe File opened for modification C:\Windows\wphulaljuhgnloay.exe xhqucik.exe File opened for modification C:\Windows\xtoeyqeftjlvwcrskrb.exe xzsqxqazhjc.exe File opened for modification C:\Windows\zxumicsvldhtwevysbnli.exe xhqucik.exe File created C:\Windows\wjvcnwbtyfyzroumvtuhtaluzrwdwxpm.ktr xhqucik.exe File opened for modification C:\Windows\wphulaljuhgnloay.exe xzsqxqazhjc.exe File opened for modification C:\Windows\khdupixzofitvcsunvgd.exe xzsqxqazhjc.exe File opened for modification C:\Windows\zxumicsvldhtwevysbnli.exe xzsqxqazhjc.exe File opened for modification C:\Windows\qpngdyptkdivziaezjwvtm.exe xzsqxqazhjc.exe File opened for modification C:\Windows\khdupixzofitvcsunvgd.exe xhqucik.exe File opened for modification C:\Windows\zxumicsvldhtwevysbnli.exe xhqucik.exe File opened for modification C:\Windows\qpngdyptkdivziaezjwvtm.exe xhqucik.exe File opened for modification C:\Windows\bdeaaysztpxnugbigtjlm.iga xhqucik.exe File opened for modification C:\Windows\xtoeyqeftjlvwcrskrb.exe xzsqxqazhjc.exe File opened for modification C:\Windows\khdupixzofitvcsunvgd.exe xzsqxqazhjc.exe File opened for modification C:\Windows\zxumicsvldhtwevysbnli.exe xzsqxqazhjc.exe File opened for modification C:\Windows\dxqewmyxjxxfeivuk.exe xhqucik.exe File opened for modification C:\Windows\wphulaljuhgnloay.exe xzsqxqazhjc.exe File opened for modification C:\Windows\khdupixzofitvcsunvgd.exe xhqucik.exe File opened for modification C:\Windows\qpngdyptkdivziaezjwvtm.exe xhqucik.exe File opened for modification C:\Windows\mhbqjannapqzzessjp.exe xhqucik.exe File opened for modification C:\Windows\mhbqjannapqzzessjp.exe xzsqxqazhjc.exe File opened for modification C:\Windows\qpngdyptkdivziaezjwvtm.exe xzsqxqazhjc.exe File opened for modification C:\Windows\dxqewmyxjxxfeivuk.exe xzsqxqazhjc.exe File opened for modification C:\Windows\wphulaljuhgnloay.exe xhqucik.exe File opened for modification C:\Windows\mhbqjannapqzzessjp.exe xhqucik.exe File opened for modification C:\Windows\xtoeyqeftjlvwcrskrb.exe xhqucik.exe File opened for modification C:\Windows\wjvcnwbtyfyzroumvtuhtaluzrwdwxpm.ktr xhqucik.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2268 xhqucik.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3796 wrote to memory of 3596 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 82 PID 3796 wrote to memory of 3596 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 82 PID 3796 wrote to memory of 3596 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 82 PID 3596 wrote to memory of 2268 3596 xzsqxqazhjc.exe 83 PID 3596 wrote to memory of 2268 3596 xzsqxqazhjc.exe 83 PID 3596 wrote to memory of 2268 3596 xzsqxqazhjc.exe 83 PID 3596 wrote to memory of 3376 3596 xzsqxqazhjc.exe 84 PID 3596 wrote to memory of 3376 3596 xzsqxqazhjc.exe 84 PID 3596 wrote to memory of 3376 3596 xzsqxqazhjc.exe 84 PID 3796 wrote to memory of 344 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 93 PID 3796 wrote to memory of 344 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 93 PID 3796 wrote to memory of 344 3796 a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe 93 -
System policy modification 1 TTPs 41 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xzsqxqazhjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" xhqucik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xzsqxqazhjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "1" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableInstallerDetection = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\FilterAdministratorToken = "0" xhqucik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer xhqucik.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "0" xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorUser = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableVirtualization = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" xhqucik.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" xzsqxqazhjc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" xzsqxqazhjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer xhqucik.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe"C:\Users\Admin\AppData\Local\Temp\a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\xzsqxqazhjc.exe"C:\Users\Admin\AppData\Local\Temp\xzsqxqazhjc.exe" "c:\users\admin\appdata\local\temp\a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe*"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\xhqucik.exe"C:\Users\Admin\AppData\Local\Temp\xhqucik.exe" "-C:\Users\Admin\AppData\Local\Temp\wphulaljuhgnloay.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\xhqucik.exe"C:\Users\Admin\AppData\Local\Temp\xhqucik.exe" "-C:\Users\Admin\AppData\Local\Temp\wphulaljuhgnloay.exe"3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:3376
-
-
-
C:\Users\Admin\AppData\Local\Temp\xzsqxqazhjc.exe"C:\Users\Admin\AppData\Local\Temp\xzsqxqazhjc.exe" "c:\users\admin\appdata\local\temp\a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2.exe"2⤵
- Modifies WinLogon for persistence
- UAC bypass
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Drops file in Windows directory
- System policy modification
PID:344
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
724KB
MD5c4ecc75b9d7829aaf75fa0c97e8d51e8
SHA1b13414bf65d9ae66eeb31828a8554a50e6944980
SHA256271e476ac05beb373ead25eb5b5181cb1cf73004f795f026675b416ea93cb0f4
SHA512888cc242baa739b3729b819f4ef6dac157c2f092f53ab7134334ec56047ed9f78e5b254c517d303db93ce0f3ff7cc80123262a0cf4a8d2f9adbdd1a534b56420
-
Filesize
724KB
MD5c4ecc75b9d7829aaf75fa0c97e8d51e8
SHA1b13414bf65d9ae66eeb31828a8554a50e6944980
SHA256271e476ac05beb373ead25eb5b5181cb1cf73004f795f026675b416ea93cb0f4
SHA512888cc242baa739b3729b819f4ef6dac157c2f092f53ab7134334ec56047ed9f78e5b254c517d303db93ce0f3ff7cc80123262a0cf4a8d2f9adbdd1a534b56420
-
Filesize
724KB
MD5c4ecc75b9d7829aaf75fa0c97e8d51e8
SHA1b13414bf65d9ae66eeb31828a8554a50e6944980
SHA256271e476ac05beb373ead25eb5b5181cb1cf73004f795f026675b416ea93cb0f4
SHA512888cc242baa739b3729b819f4ef6dac157c2f092f53ab7134334ec56047ed9f78e5b254c517d303db93ce0f3ff7cc80123262a0cf4a8d2f9adbdd1a534b56420
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
320KB
MD589ec3461ef4a893428c32f89de78b396
SHA18067cdc0901f0dc5bc1bb67a1c9037f502ea85f9
SHA2561849989ee704cda3b552b5021f3165012978d26d0daf7d22a09805deb6be2d0b
SHA5127804fa36e1f050115b00d21a9a94cf92436260a385da67106b0c73eb350abafca53f2dec42d377d4eccc095dd75ac92e841fb66e874e656e412cd71ed7909fe8
-
Filesize
320KB
MD589ec3461ef4a893428c32f89de78b396
SHA18067cdc0901f0dc5bc1bb67a1c9037f502ea85f9
SHA2561849989ee704cda3b552b5021f3165012978d26d0daf7d22a09805deb6be2d0b
SHA5127804fa36e1f050115b00d21a9a94cf92436260a385da67106b0c73eb350abafca53f2dec42d377d4eccc095dd75ac92e841fb66e874e656e412cd71ed7909fe8
-
Filesize
320KB
MD589ec3461ef4a893428c32f89de78b396
SHA18067cdc0901f0dc5bc1bb67a1c9037f502ea85f9
SHA2561849989ee704cda3b552b5021f3165012978d26d0daf7d22a09805deb6be2d0b
SHA5127804fa36e1f050115b00d21a9a94cf92436260a385da67106b0c73eb350abafca53f2dec42d377d4eccc095dd75ac92e841fb66e874e656e412cd71ed7909fe8
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb
-
Filesize
488KB
MD57ffd687e3046eba7d819628442e83fa3
SHA1819ab64fe969ee3d37ecf205875f4d686af9a34b
SHA256a5c959fb4abc3a06f9b9722f381dda6db90a4ce7c58a975a19333f85f45c46f2
SHA5125ed136a8b87d6758e87e179943f01b03a384ff24ae995d04d0226c7059586bf15cc3e35ba0f61a2345701fcd051d8407ba0ec65cec596971557ef0fa69d214eb