Analysis
-
max time kernel
78s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15-10-2023 19:37
Behavioral task
behavioral1
Sample
4d7a5bf7819da93e728bb26c4211d980_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4d7a5bf7819da93e728bb26c4211d980_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
4d7a5bf7819da93e728bb26c4211d980_exe32.exe
-
Size
1.9MB
-
MD5
4d7a5bf7819da93e728bb26c4211d980
-
SHA1
0a0a4278347cb1c65fb0a5df31c02dfec898fc72
-
SHA256
bb8775fefc81ae9c2a17bf952df1e2b871f684989c1881881425b60af18a272a
-
SHA512
807bd34e2ba42f55c1a733b0e240fca0f910f725a6e2b3c1afcc5a95233b82be9557ef41c48eccce50a150a9ef7ba6d23b599e330e4523f94b7bcafcfdeca02e
-
SSDEEP
12288:ONNEj+gNNEj+cNNEj+gNNEj+WNNEj+0NNEj+0NNEj+R:ONNGNNaNNGNNENNKNNKNNj
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" smss.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Kazekage.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" system32.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Gaara.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" system32.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Gaara.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Kazekage.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" system32.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Gaara.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Kazekage.exe -
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 24 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\system32.exe csrss.exe File created C:\Windows\SysWOW64\drivers\system32.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe smss.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe smss.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe Kazekage.exe File created C:\Windows\SysWOW64\drivers\system32.exe Gaara.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe smss.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe Gaara.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe csrss.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe system32.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe Gaara.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe csrss.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe csrss.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe system32.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe system32.exe File created C:\Windows\SysWOW64\drivers\system32.exe system32.exe File created C:\Windows\SysWOW64\drivers\system32.exe smss.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created C:\Windows\SysWOW64\drivers\system32.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe Gaara.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "drivers\\Kazekage.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "drivers\\Kazekage.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "drivers\\Kazekage.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "drivers\\Kazekage.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "drivers\\Kazekage.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe\Debugger = "cmd.exe /c del" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "drivers\\Kazekage.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com\Debugger = "cmd.exe /c del" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "drivers\\Kazekage.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "drivers\\Kazekage.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "drivers\\Kazekage.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "drivers\\Kazekage.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe\Debugger = "cmd.exe /c del" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe\Debugger = "cmd.exe /c del" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "drivers\\Kazekage.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe\Debugger = "cmd.exe /c del" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe Kazekage.exe -
Executes dropped EXE 30 IoCs
pid Process 2596 smss.exe 2520 smss.exe 2480 Gaara.exe 1412 smss.exe 852 Gaara.exe 1596 csrss.exe 2144 smss.exe 2724 Gaara.exe 2376 csrss.exe 952 Kazekage.exe 2432 smss.exe 2112 Gaara.exe 2352 csrss.exe 1540 Kazekage.exe 2256 system32.exe 1948 smss.exe 1296 Gaara.exe 1284 csrss.exe 1816 Kazekage.exe 2164 system32.exe 908 system32.exe 1292 Kazekage.exe 2088 system32.exe 1696 csrss.exe 2900 Gaara.exe 2908 Kazekage.exe 2368 csrss.exe 1756 system32.exe 2972 Kazekage.exe 1516 system32.exe -
Loads dropped DLL 60 IoCs
pid Process 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 2596 smss.exe 2520 smss.exe 2596 smss.exe 2596 smss.exe 2480 Gaara.exe 2480 Gaara.exe 1412 smss.exe 852 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 1596 csrss.exe 1596 csrss.exe 2144 smss.exe 1596 csrss.exe 2724 Gaara.exe 2376 csrss.exe 1596 csrss.exe 1596 csrss.exe 952 Kazekage.exe 2432 smss.exe 952 Kazekage.exe 2112 Gaara.exe 952 Kazekage.exe 2352 csrss.exe 952 Kazekage.exe 952 Kazekage.exe 952 Kazekage.exe 952 Kazekage.exe 2256 system32.exe 1948 smss.exe 2256 system32.exe 1296 Gaara.exe 2256 system32.exe 1284 csrss.exe 2256 system32.exe 2256 system32.exe 2256 system32.exe 2256 system32.exe 1596 csrss.exe 1596 csrss.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 2596 smss.exe 1696 csrss.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 2900 Gaara.exe 2596 smss.exe 2596 smss.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 2368 csrss.exe 2596 smss.exe 2596 smss.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe -
resource yara_rule behavioral1/memory/1900-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0007000000016c91-11.dat upx behavioral1/memory/1900-32-0x0000000000390000-0x00000000003CB000-memory.dmp upx behavioral1/files/0x0007000000016c1a-37.dat upx behavioral1/files/0x0007000000016c1a-36.dat upx behavioral1/files/0x0007000000016c1a-33.dat upx behavioral1/files/0x0007000000016c1a-30.dat upx behavioral1/files/0x0007000000016c1a-46.dat upx behavioral1/files/0x0007000000016c65-47.dat upx behavioral1/files/0x0007000000016c91-51.dat upx behavioral1/files/0x0008000000016ce1-55.dat upx behavioral1/files/0x0006000000016cf8-63.dat upx behavioral1/files/0x0008000000016cf4-59.dat upx behavioral1/files/0x0007000000016c1a-74.dat upx behavioral1/memory/2520-78-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2480-89-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0007000000016c65-87.dat upx behavioral1/files/0x0007000000016c65-85.dat upx behavioral1/files/0x0007000000016c65-82.dat upx behavioral1/memory/2596-81-0x00000000002A0000-0x00000000002DB000-memory.dmp upx behavioral1/files/0x0007000000016c65-79.dat upx behavioral1/files/0x0007000000016c65-95.dat upx behavioral1/files/0x0007000000016c91-96.dat upx behavioral1/files/0x0008000000016cf4-104.dat upx behavioral1/files/0x0006000000016cf8-108.dat upx behavioral1/files/0x0008000000016ce1-100.dat upx behavioral1/files/0x0007000000016c1a-120.dat upx behavioral1/memory/1900-126-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/1412-124-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0007000000016c1a-119.dat upx behavioral1/memory/1412-129-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0007000000016c65-127.dat upx behavioral1/memory/852-132-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0007000000016c91-133.dat upx behavioral1/files/0x0007000000016c91-141.dat upx behavioral1/memory/2596-140-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0007000000016c91-139.dat upx behavioral1/files/0x0007000000016c91-136.dat upx behavioral1/files/0x0007000000016c91-149.dat upx behavioral1/memory/2480-135-0x0000000000520000-0x000000000055B000-memory.dmp upx behavioral1/files/0x0006000000016cf8-158.dat upx behavioral1/files/0x0008000000016cf4-154.dat upx behavioral1/files/0x0008000000016ce1-150.dat upx behavioral1/files/0x0007000000016c1a-169.dat upx behavioral1/files/0x0007000000016c1a-170.dat upx behavioral1/files/0x0007000000016c65-177.dat upx behavioral1/memory/2144-179-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2480-176-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2724-184-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/memory/2376-185-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0007000000016c91-182.dat upx behavioral1/files/0x0007000000016c65-175.dat upx behavioral1/memory/2376-188-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0008000000016cf4-196.dat upx behavioral1/files/0x0008000000016cf4-195.dat upx behavioral1/memory/952-199-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0008000000016cf4-192.dat upx behavioral1/files/0x0008000000016cf4-204.dat upx behavioral1/files/0x0008000000016ce1-205.dat upx behavioral1/files/0x0006000000016cf8-209.dat upx behavioral1/memory/1596-223-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral1/files/0x0007000000016c1a-221.dat upx behavioral1/files/0x0007000000016c1a-220.dat upx behavioral1/memory/1596-191-0x00000000005E0000-0x000000000061B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 10 - 2023\\Gaara.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 10 - 2023\\smss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 10 - 2023\\smss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 10 - 2023\\Gaara.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-10-2023.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 10 - 2023\\smss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-10-2023.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-10-2023.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 10 - 2023\\smss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-10-2023.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-10-2023.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-10-2023.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 10 - 2023\\smss.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 10 - 2023\\Gaara.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 10 - 2023\\Gaara.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 10 - 2023\\Gaara.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 10 - 2023\\smss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 10 - 2023\\Gaara.exe" csrss.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification D:\Desktop.ini Kazekage.exe File opened for modification \??\U:\Desktop.ini Kazekage.exe File opened for modification \??\B:\Desktop.ini system32.exe File opened for modification \??\W:\Desktop.ini csrss.exe File opened for modification \??\K:\Desktop.ini system32.exe File opened for modification \??\R:\Desktop.ini Gaara.exe File opened for modification C:\Desktop.ini Gaara.exe File opened for modification \??\N:\Desktop.ini Gaara.exe File opened for modification \??\S:\Desktop.ini Kazekage.exe File opened for modification \??\Y:\Desktop.ini csrss.exe File opened for modification F:\Desktop.ini system32.exe File opened for modification \??\H:\Desktop.ini smss.exe File opened for modification \??\U:\Desktop.ini smss.exe File opened for modification \??\K:\Desktop.ini Kazekage.exe File opened for modification \??\Q:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\P:\Desktop.ini system32.exe File opened for modification \??\V:\Desktop.ini system32.exe File opened for modification \??\V:\Desktop.ini smss.exe File opened for modification \??\S:\Desktop.ini system32.exe File opened for modification \??\I:\Desktop.ini smss.exe File opened for modification \??\Q:\Desktop.ini smss.exe File opened for modification \??\M:\Desktop.ini Kazekage.exe File opened for modification \??\K:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification D:\Desktop.ini csrss.exe File opened for modification \??\J:\Desktop.ini csrss.exe File opened for modification \??\Q:\Desktop.ini system32.exe File opened for modification \??\H:\Desktop.ini Gaara.exe File opened for modification \??\Q:\Desktop.ini Kazekage.exe File opened for modification \??\G:\Desktop.ini system32.exe File opened for modification \??\L:\Desktop.ini system32.exe File opened for modification \??\R:\Desktop.ini system32.exe File opened for modification \??\Y:\Desktop.ini system32.exe File opened for modification \??\N:\Desktop.ini smss.exe File opened for modification \??\W:\Desktop.ini smss.exe File opened for modification \??\H:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\J:\Desktop.ini Gaara.exe File opened for modification \??\E:\Desktop.ini Kazekage.exe File opened for modification \??\T:\Desktop.ini Kazekage.exe File opened for modification C:\Desktop.ini csrss.exe File opened for modification \??\I:\Desktop.ini csrss.exe File opened for modification \??\T:\Desktop.ini smss.exe File opened for modification \??\I:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\H:\Desktop.ini system32.exe File opened for modification \??\T:\Desktop.ini Gaara.exe File opened for modification \??\U:\Desktop.ini Gaara.exe File opened for modification \??\X:\Desktop.ini Gaara.exe File opened for modification \??\A:\Desktop.ini Kazekage.exe File opened for modification \??\A:\Desktop.ini csrss.exe File opened for modification \??\N:\Desktop.ini csrss.exe File opened for modification \??\M:\Desktop.ini system32.exe File opened for modification \??\O:\Desktop.ini smss.exe File opened for modification F:\Desktop.ini Kazekage.exe File opened for modification \??\J:\Desktop.ini Kazekage.exe File opened for modification \??\V:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\E:\Desktop.ini csrss.exe File opened for modification \??\N:\Desktop.ini system32.exe File opened for modification \??\I:\Desktop.ini Gaara.exe File opened for modification D:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\N:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\R:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\A:\Desktop.ini system32.exe File opened for modification \??\T:\Desktop.ini system32.exe File opened for modification \??\U:\Desktop.ini csrss.exe File opened for modification \??\Z:\Desktop.ini Gaara.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: csrss.exe File opened (read-only) \??\L: system32.exe File opened (read-only) \??\P: system32.exe File opened (read-only) \??\B: smss.exe File opened (read-only) \??\O: smss.exe File opened (read-only) \??\Z: smss.exe File opened (read-only) \??\X: Gaara.exe File opened (read-only) \??\T: csrss.exe File opened (read-only) \??\K: smss.exe File opened (read-only) \??\I: Gaara.exe File opened (read-only) \??\J: csrss.exe File opened (read-only) \??\X: csrss.exe File opened (read-only) \??\Z: csrss.exe File opened (read-only) \??\J: system32.exe File opened (read-only) \??\P: Gaara.exe File opened (read-only) \??\U: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\V: smss.exe File opened (read-only) \??\S: csrss.exe File opened (read-only) \??\G: smss.exe File opened (read-only) \??\O: Gaara.exe File opened (read-only) \??\T: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\Z: system32.exe File opened (read-only) \??\U: smss.exe File opened (read-only) \??\R: Gaara.exe File opened (read-only) \??\U: Gaara.exe File opened (read-only) \??\V: Gaara.exe File opened (read-only) \??\H: system32.exe File opened (read-only) \??\K: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\E: Kazekage.exe File opened (read-only) \??\L: Kazekage.exe File opened (read-only) \??\O: Kazekage.exe File opened (read-only) \??\Q: Kazekage.exe File opened (read-only) \??\R: Kazekage.exe File opened (read-only) \??\V: Kazekage.exe File opened (read-only) \??\J: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\L: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\P: csrss.exe File opened (read-only) \??\Y: system32.exe File opened (read-only) \??\Q: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\N: Gaara.exe File opened (read-only) \??\Q: Gaara.exe File opened (read-only) \??\I: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\W: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\M: system32.exe File opened (read-only) \??\A: Kazekage.exe File opened (read-only) \??\U: Kazekage.exe File opened (read-only) \??\W: Kazekage.exe File opened (read-only) \??\O: csrss.exe File opened (read-only) \??\R: csrss.exe File opened (read-only) \??\Z: Gaara.exe File opened (read-only) \??\N: system32.exe File opened (read-only) \??\R: system32.exe File opened (read-only) \??\R: smss.exe File opened (read-only) \??\J: Gaara.exe File opened (read-only) \??\H: Kazekage.exe File opened (read-only) \??\X: Kazekage.exe File opened (read-only) \??\G: csrss.exe File opened (read-only) \??\O: system32.exe File opened (read-only) \??\Y: Gaara.exe File opened (read-only) \??\G: system32.exe File opened (read-only) \??\N: Kazekage.exe File opened (read-only) \??\A: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\B: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\H: csrss.exe -
Drops autorun.inf file 1 TTPs 64 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\N:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification F:\Autorun.inf Kazekage.exe File opened for modification \??\T:\Autorun.inf system32.exe File opened for modification \??\E:\Autorun.inf smss.exe File opened for modification \??\G:\Autorun.inf smss.exe File created \??\W:\Autorun.inf smss.exe File opened for modification \??\R:\Autorun.inf Gaara.exe File opened for modification \??\T:\Autorun.inf Gaara.exe File opened for modification \??\N:\Autorun.inf csrss.exe File created \??\R:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created \??\X:\Autorun.inf smss.exe File opened for modification \??\H:\Autorun.inf csrss.exe File opened for modification \??\I:\Autorun.inf Kazekage.exe File created \??\T:\Autorun.inf system32.exe File created \??\A:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created D:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\S:\Autorun.inf Kazekage.exe File created \??\H:\Autorun.inf system32.exe File opened for modification \??\R:\Autorun.inf smss.exe File created \??\K:\Autorun.inf Gaara.exe File opened for modification \??\I:\Autorun.inf csrss.exe File opened for modification \??\T:\Autorun.inf Kazekage.exe File opened for modification \??\M:\Autorun.inf system32.exe File opened for modification \??\E:\Autorun.inf Gaara.exe File opened for modification \??\I:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\J:\Autorun.inf smss.exe File created \??\P:\Autorun.inf smss.exe File opened for modification \??\W:\Autorun.inf smss.exe File opened for modification \??\A:\Autorun.inf Gaara.exe File opened for modification \??\P:\Autorun.inf Kazekage.exe File opened for modification \??\W:\Autorun.inf Kazekage.exe File created \??\X:\Autorun.inf Kazekage.exe File opened for modification \??\H:\Autorun.inf system32.exe File created \??\Y:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created \??\W:\Autorun.inf Gaara.exe File created \??\L:\Autorun.inf Kazekage.exe File created C:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created \??\I:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created \??\M:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification F:\Autorun.inf csrss.exe File opened for modification \??\A:\Autorun.inf Kazekage.exe File created \??\Y:\Autorun.inf Kazekage.exe File opened for modification C:\Autorun.inf csrss.exe File opened for modification \??\N:\Autorun.inf Kazekage.exe File created \??\O:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\Q:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created D:\Autorun.inf smss.exe File created \??\B:\Autorun.inf Gaara.exe File created \??\U:\Autorun.inf Gaara.exe File opened for modification \??\T:\Autorun.inf csrss.exe File opened for modification D:\Autorun.inf Kazekage.exe File opened for modification \??\E:\Autorun.inf Kazekage.exe File created \??\G:\Autorun.inf Kazekage.exe File opened for modification \??\T:\Autorun.inf smss.exe File opened for modification \??\O:\Autorun.inf Gaara.exe File opened for modification \??\E:\Autorun.inf csrss.exe File created \??\U:\Autorun.inf csrss.exe File opened for modification C:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created \??\J:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created \??\R:\Autorun.inf csrss.exe File created \??\V:\Autorun.inf csrss.exe File opened for modification \??\W:\Autorun.inf csrss.exe File opened for modification \??\O:\Autorun.inf Kazekage.exe File created \??\G:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\15-10-2023.exe Gaara.exe File created C:\Windows\SysWOW64\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini Gaara.exe File opened for modification C:\Windows\SysWOW64\ Gaara.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\SysWOW64\15-10-2023.exe csrss.exe File opened for modification C:\Windows\SysWOW64\15-10-2023.exe system32.exe File created C:\Windows\SysWOW64\msvbvm60.dll system32.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini Kazekage.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx system32.exe File created C:\Windows\SysWOW64\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\SysWOW64\ 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\ Kazekage.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll system32.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx smss.exe File opened for modification C:\Windows\SysWOW64\ csrss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll csrss.exe File created C:\Windows\SysWOW64\15-10-2023.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created C:\Windows\SysWOW64\msvbvm60.dll 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\15-10-2023.exe smss.exe File created C:\Windows\SysWOW64\msvbvm60.dll csrss.exe File opened for modification C:\Windows\SysWOW64\15-10-2023.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini smss.exe File opened for modification C:\Windows\SysWOW64\ smss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll smss.exe File created C:\Windows\SysWOW64\msvbvm60.dll smss.exe File created C:\Windows\SysWOW64\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini csrss.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx Kazekage.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini system32.exe File opened for modification C:\Windows\SysWOW64\15-10-2023.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx Gaara.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx csrss.exe File opened for modification C:\Windows\SysWOW64\ system32.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe -
Sets desktop wallpaper using registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" system32.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe system32.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\msvbvm60.dll 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe Gaara.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe csrss.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe csrss.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe system32.exe File opened for modification C:\Windows\mscomctl.ocx 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\mscomctl.ocx csrss.exe File opened for modification C:\Windows\mscomctl.ocx system32.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created C:\Windows\msvbvm60.dll 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe smss.exe File created C:\Windows\WBEM\msvbvm60.dll smss.exe File created C:\Windows\WBEM\msvbvm60.dll csrss.exe File opened for modification C:\Windows\system\mscoree.dll system32.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe system32.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe system32.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\system\mscoree.dll Gaara.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe csrss.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe csrss.exe File opened for modification C:\Windows\msvbvm60.dll csrss.exe File opened for modification C:\Windows\system\msvbvm60.dll Kazekage.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\msvbvm60.dll system32.exe File opened for modification C:\Windows\ csrss.exe File opened for modification C:\Windows\mscomctl.ocx Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe smss.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg csrss.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe Kazekage.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe system32.exe File created C:\Windows\mscomctl.ocx 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\ 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\system\mscoree.dll 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\system\mscoree.dll smss.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\msvbvm60.dll smss.exe File opened for modification C:\Windows\system\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\system\mscoree.dll csrss.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe Gaara.exe File created C:\Windows\WBEM\msvbvm60.dll Kazekage.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe system32.exe File opened for modification C:\Windows\mscomctl.ocx smss.exe File opened for modification C:\Windows\ smss.exe File opened for modification C:\Windows\ system32.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\msvbvm60.dll smss.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe Gaara.exe File created C:\Windows\WBEM\msvbvm60.dll Gaara.exe File created C:\Windows\WBEM\msvbvm60.dll system32.exe File opened for modification C:\Windows\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe csrss.exe File opened for modification C:\Windows\msvbvm60.dll system32.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe smss.exe File created C:\Windows\Fonts\The Kazekage.jpg 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\msvbvm60.dll csrss.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg Kazekage.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg smss.exe File opened for modification C:\Windows\system\mscoree.dll Kazekage.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe Kazekage.exe File opened for modification C:\Windows\system\msvbvm60.dll system32.exe File opened for modification C:\Windows\ Kazekage.exe File opened for modification C:\Windows\ Gaara.exe -
Modifies Control Panel 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" Gaara.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Speed = "4" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" system32.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Speed = "4" smss.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" Kazekage.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Size = "72" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" Gaara.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Size = "72" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\WallpaperStyle = "2" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Size = "72" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" csrss.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Speed = "4" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Size = "72" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" smss.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\WallpaperStyle = "2" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\WallpaperStyle = "2" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Desktop\WallpaperStyle = "2" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Size = "72" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Speed = "4" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" csrss.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" smss.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" Gaara.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main Kazekage.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" system32.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main csrss.exe -
Modifies registry class 48 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command Gaara.exe -
Runs ping.exe 1 TTPs 36 IoCs
pid Process 2564 ping.exe 1952 ping.exe 1304 ping.exe 1060 ping.exe 1444 ping.exe 1472 ping.exe 1176 ping.exe 1104 ping.exe 2816 ping.exe 944 ping.exe 948 ping.exe 572 ping.exe 2356 ping.exe 1496 ping.exe 576 ping.exe 1320 ping.exe 1436 ping.exe 636 ping.exe 1736 ping.exe 2600 ping.exe 3056 ping.exe 2768 ping.exe 2584 ping.exe 2528 ping.exe 2164 ping.exe 808 ping.exe 1904 ping.exe 2808 ping.exe 2488 ping.exe 528 ping.exe 2740 ping.exe 1052 ping.exe 1452 ping.exe 1956 ping.exe 2620 ping.exe 2156 ping.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 952 Kazekage.exe 952 Kazekage.exe 952 Kazekage.exe 952 Kazekage.exe 952 Kazekage.exe 952 Kazekage.exe 952 Kazekage.exe 952 Kazekage.exe 952 Kazekage.exe 952 Kazekage.exe 952 Kazekage.exe 952 Kazekage.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 1596 csrss.exe 1596 csrss.exe 1596 csrss.exe 1596 csrss.exe 1596 csrss.exe 1596 csrss.exe 1596 csrss.exe 1596 csrss.exe 1596 csrss.exe 1596 csrss.exe 1596 csrss.exe 1596 csrss.exe 2256 system32.exe 2256 system32.exe 2256 system32.exe 2256 system32.exe 2256 system32.exe 2256 system32.exe 2256 system32.exe 2256 system32.exe 2256 system32.exe 2256 system32.exe 2256 system32.exe 2256 system32.exe 2596 smss.exe 2596 smss.exe 2596 smss.exe 2596 smss.exe 2596 smss.exe 2596 smss.exe 2596 smss.exe 2596 smss.exe 2596 smss.exe 2596 smss.exe 2596 smss.exe 2596 smss.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe 2480 Gaara.exe -
Suspicious use of SetWindowsHookEx 30 IoCs
pid Process 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 2596 smss.exe 2520 smss.exe 2480 Gaara.exe 1412 smss.exe 852 Gaara.exe 1596 csrss.exe 2144 smss.exe 2724 Gaara.exe 2376 csrss.exe 952 Kazekage.exe 2432 smss.exe 2112 Gaara.exe 2352 csrss.exe 1540 Kazekage.exe 2256 system32.exe 1948 smss.exe 1296 Gaara.exe 1284 csrss.exe 1816 Kazekage.exe 2164 system32.exe 908 system32.exe 1292 Kazekage.exe 2088 system32.exe 1696 csrss.exe 2900 Gaara.exe 2908 Kazekage.exe 2368 csrss.exe 1756 system32.exe 1516 system32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2596 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 28 PID 1900 wrote to memory of 2596 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 28 PID 1900 wrote to memory of 2596 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 28 PID 1900 wrote to memory of 2596 1900 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 28 PID 2596 wrote to memory of 2520 2596 smss.exe 29 PID 2596 wrote to memory of 2520 2596 smss.exe 29 PID 2596 wrote to memory of 2520 2596 smss.exe 29 PID 2596 wrote to memory of 2520 2596 smss.exe 29 PID 2596 wrote to memory of 2480 2596 smss.exe 30 PID 2596 wrote to memory of 2480 2596 smss.exe 30 PID 2596 wrote to memory of 2480 2596 smss.exe 30 PID 2596 wrote to memory of 2480 2596 smss.exe 30 PID 2480 wrote to memory of 1412 2480 Gaara.exe 31 PID 2480 wrote to memory of 1412 2480 Gaara.exe 31 PID 2480 wrote to memory of 1412 2480 Gaara.exe 31 PID 2480 wrote to memory of 1412 2480 Gaara.exe 31 PID 2480 wrote to memory of 852 2480 Gaara.exe 32 PID 2480 wrote to memory of 852 2480 Gaara.exe 32 PID 2480 wrote to memory of 852 2480 Gaara.exe 32 PID 2480 wrote to memory of 852 2480 Gaara.exe 32 PID 2480 wrote to memory of 1596 2480 Gaara.exe 33 PID 2480 wrote to memory of 1596 2480 Gaara.exe 33 PID 2480 wrote to memory of 1596 2480 Gaara.exe 33 PID 2480 wrote to memory of 1596 2480 Gaara.exe 33 PID 1596 wrote to memory of 2144 1596 csrss.exe 34 PID 1596 wrote to memory of 2144 1596 csrss.exe 34 PID 1596 wrote to memory of 2144 1596 csrss.exe 34 PID 1596 wrote to memory of 2144 1596 csrss.exe 34 PID 1596 wrote to memory of 2724 1596 csrss.exe 36 PID 1596 wrote to memory of 2724 1596 csrss.exe 36 PID 1596 wrote to memory of 2724 1596 csrss.exe 36 PID 1596 wrote to memory of 2724 1596 csrss.exe 36 PID 1596 wrote to memory of 2376 1596 csrss.exe 35 PID 1596 wrote to memory of 2376 1596 csrss.exe 35 PID 1596 wrote to memory of 2376 1596 csrss.exe 35 PID 1596 wrote to memory of 2376 1596 csrss.exe 35 PID 1596 wrote to memory of 952 1596 csrss.exe 38 PID 1596 wrote to memory of 952 1596 csrss.exe 38 PID 1596 wrote to memory of 952 1596 csrss.exe 38 PID 1596 wrote to memory of 952 1596 csrss.exe 38 PID 952 wrote to memory of 2432 952 Kazekage.exe 37 PID 952 wrote to memory of 2432 952 Kazekage.exe 37 PID 952 wrote to memory of 2432 952 Kazekage.exe 37 PID 952 wrote to memory of 2432 952 Kazekage.exe 37 PID 952 wrote to memory of 2112 952 Kazekage.exe 40 PID 952 wrote to memory of 2112 952 Kazekage.exe 40 PID 952 wrote to memory of 2112 952 Kazekage.exe 40 PID 952 wrote to memory of 2112 952 Kazekage.exe 40 PID 952 wrote to memory of 2352 952 Kazekage.exe 39 PID 952 wrote to memory of 2352 952 Kazekage.exe 39 PID 952 wrote to memory of 2352 952 Kazekage.exe 39 PID 952 wrote to memory of 2352 952 Kazekage.exe 39 PID 952 wrote to memory of 1540 952 Kazekage.exe 41 PID 952 wrote to memory of 1540 952 Kazekage.exe 41 PID 952 wrote to memory of 1540 952 Kazekage.exe 41 PID 952 wrote to memory of 1540 952 Kazekage.exe 41 PID 952 wrote to memory of 2256 952 Kazekage.exe 42 PID 952 wrote to memory of 2256 952 Kazekage.exe 42 PID 952 wrote to memory of 2256 952 Kazekage.exe 42 PID 952 wrote to memory of 2256 952 Kazekage.exe 42 PID 2256 wrote to memory of 1948 2256 system32.exe 43 PID 2256 wrote to memory of 1948 2256 system32.exe 43 PID 2256 wrote to memory of 1948 2256 system32.exe 43 PID 2256 wrote to memory of 1948 2256 system32.exe 43 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Kazekage.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System system32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d7a5bf7819da93e728bb26c4211d980_exe32.exe"C:\Users\Admin\AppData\Local\Temp\4d7a5bf7819da93e728bb26c4211d980_exe32.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1900 -
C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2596 -
C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2520
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2480 -
C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1412
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:852
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1596 -
C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2144
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2376
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe5⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:952 -
C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2352
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2112
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe6⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2256 -
C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1948
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1296
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1816
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2164
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1284
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655007⤵
- Runs ping.exe
PID:2356
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655007⤵
- Runs ping.exe
PID:1956
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655007⤵
- Runs ping.exe
PID:1736
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655007⤵
- Runs ping.exe
PID:1060
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655007⤵
- Runs ping.exe
PID:1176
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655007⤵
- Runs ping.exe
PID:1304
-
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
PID:2164
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
PID:1452
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
PID:2620
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
PID:2156
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
PID:1472
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
PID:2488
-
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:908
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
PID:2564
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
PID:1104
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
PID:636
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
PID:2816
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
PID:2600
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
PID:528
-
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1292
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2088
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
PID:1052
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
PID:944
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
PID:808
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
PID:1904
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
PID:3056
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
PID:2768
-
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1696
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2908
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:572
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:2528
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:1320
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:1436
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:1444
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:1496
-
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2368
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe2⤵
- Executes dropped EXE
PID:2972
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1516
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:2584
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:2740
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:576
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:1952
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:948
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:2808
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2432
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
736B
MD5bb5d6abdf8d0948ac6895ce7fdfbc151
SHA19266b7a247a4685892197194d2b9b86c8f6dddbd
SHA2565db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8
SHA512878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c
-
Filesize
196B
MD51564dfe69ffed40950e5cb644e0894d1
SHA1201b6f7a01cc49bb698bea6d4945a082ed454ce4
SHA256be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184
SHA51272df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097
-
Filesize
1.9MB
MD5bca08c2276587e4d253293a89be8aecc
SHA1b0a4678a7911868f3aed6bda8249a1e004f9d049
SHA256d5a480276835aad3bff69164a2ca39f911e0aa7eec595822bbbf15678702764d
SHA512de85a3e6166e939b2421bec470a6c66a1400611ab90a6471c63c98dd134c6fb52ea288597fb6344c028f421dce7e48480afc0da13432add3e20accd8e8dabe3e
-
Filesize
1.9MB
MD5bca08c2276587e4d253293a89be8aecc
SHA1b0a4678a7911868f3aed6bda8249a1e004f9d049
SHA256d5a480276835aad3bff69164a2ca39f911e0aa7eec595822bbbf15678702764d
SHA512de85a3e6166e939b2421bec470a6c66a1400611ab90a6471c63c98dd134c6fb52ea288597fb6344c028f421dce7e48480afc0da13432add3e20accd8e8dabe3e
-
Filesize
1.9MB
MD55bae83b500a7d9b31e7cdc577d04dfc9
SHA1e745b1580a26e143bcc3d6cff9604f225f7f7e6c
SHA256420e4aae7b9967f701b435ceec60b4bc5853785c06ddd64fc9d5ff0f224b6352
SHA512ae67deb5867b1ef50d912bfc642e887d52b1a5bd615779183da707924314a891b15bbd50e2d85c1cfa3d54c8996c05afb0f7455746cde6ee6a0316051c532f8f
-
Filesize
1.9MB
MD5bca08c2276587e4d253293a89be8aecc
SHA1b0a4678a7911868f3aed6bda8249a1e004f9d049
SHA256d5a480276835aad3bff69164a2ca39f911e0aa7eec595822bbbf15678702764d
SHA512de85a3e6166e939b2421bec470a6c66a1400611ab90a6471c63c98dd134c6fb52ea288597fb6344c028f421dce7e48480afc0da13432add3e20accd8e8dabe3e
-
Filesize
1.9MB
MD5bca08c2276587e4d253293a89be8aecc
SHA1b0a4678a7911868f3aed6bda8249a1e004f9d049
SHA256d5a480276835aad3bff69164a2ca39f911e0aa7eec595822bbbf15678702764d
SHA512de85a3e6166e939b2421bec470a6c66a1400611ab90a6471c63c98dd134c6fb52ea288597fb6344c028f421dce7e48480afc0da13432add3e20accd8e8dabe3e
-
Filesize
1.9MB
MD5bca08c2276587e4d253293a89be8aecc
SHA1b0a4678a7911868f3aed6bda8249a1e004f9d049
SHA256d5a480276835aad3bff69164a2ca39f911e0aa7eec595822bbbf15678702764d
SHA512de85a3e6166e939b2421bec470a6c66a1400611ab90a6471c63c98dd134c6fb52ea288597fb6344c028f421dce7e48480afc0da13432add3e20accd8e8dabe3e
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.9MB
MD54d7a5bf7819da93e728bb26c4211d980
SHA10a0a4278347cb1c65fb0a5df31c02dfec898fc72
SHA256bb8775fefc81ae9c2a17bf952df1e2b871f684989c1881881425b60af18a272a
SHA512807bd34e2ba42f55c1a733b0e240fca0f910f725a6e2b3c1afcc5a95233b82be9557ef41c48eccce50a150a9ef7ba6d23b599e330e4523f94b7bcafcfdeca02e
-
Filesize
1.9MB
MD5da4c493effee4b12e58bb1c758875ffc
SHA1613a0cab2d909d3d14cc5435a92a1d48c28659fa
SHA2569fe523d639c2c2d34b2808f1770b1d90aa052f78902da404ca34ae604c97f7a3
SHA512b7089f5ef8b7dfd09aeb7281324296cae124616a0578cb5b7eed0abbf5601c3fb94f451a3da8a5e4b7f76466da3a36792a09f37e2342a7a25405439d45c26372
-
Filesize
1.9MB
MD5da4c493effee4b12e58bb1c758875ffc
SHA1613a0cab2d909d3d14cc5435a92a1d48c28659fa
SHA2569fe523d639c2c2d34b2808f1770b1d90aa052f78902da404ca34ae604c97f7a3
SHA512b7089f5ef8b7dfd09aeb7281324296cae124616a0578cb5b7eed0abbf5601c3fb94f451a3da8a5e4b7f76466da3a36792a09f37e2342a7a25405439d45c26372
-
Filesize
1.9MB
MD5da4c493effee4b12e58bb1c758875ffc
SHA1613a0cab2d909d3d14cc5435a92a1d48c28659fa
SHA2569fe523d639c2c2d34b2808f1770b1d90aa052f78902da404ca34ae604c97f7a3
SHA512b7089f5ef8b7dfd09aeb7281324296cae124616a0578cb5b7eed0abbf5601c3fb94f451a3da8a5e4b7f76466da3a36792a09f37e2342a7a25405439d45c26372
-
Filesize
1.9MB
MD5da4c493effee4b12e58bb1c758875ffc
SHA1613a0cab2d909d3d14cc5435a92a1d48c28659fa
SHA2569fe523d639c2c2d34b2808f1770b1d90aa052f78902da404ca34ae604c97f7a3
SHA512b7089f5ef8b7dfd09aeb7281324296cae124616a0578cb5b7eed0abbf5601c3fb94f451a3da8a5e4b7f76466da3a36792a09f37e2342a7a25405439d45c26372
-
Filesize
1.9MB
MD5f2d8047597f7682002bf917b6fc271e4
SHA1c47d718dae1de3ee03e4950d6f2df58c02fb04fc
SHA2568c69f8bd7f928da2796986d42d1b288c09c880910d3a0700ab0a26e63e806113
SHA51286e3349a0c497188be59651abab2423d33beb718499291fccb492bf08b7f6653239734e294c01e08ab1b930c817e9781b1f2b2462382a6097835b9b0ba43ee42
-
Filesize
1.9MB
MD5bca08c2276587e4d253293a89be8aecc
SHA1b0a4678a7911868f3aed6bda8249a1e004f9d049
SHA256d5a480276835aad3bff69164a2ca39f911e0aa7eec595822bbbf15678702764d
SHA512de85a3e6166e939b2421bec470a6c66a1400611ab90a6471c63c98dd134c6fb52ea288597fb6344c028f421dce7e48480afc0da13432add3e20accd8e8dabe3e
-
Filesize
1.9MB
MD55bae83b500a7d9b31e7cdc577d04dfc9
SHA1e745b1580a26e143bcc3d6cff9604f225f7f7e6c
SHA256420e4aae7b9967f701b435ceec60b4bc5853785c06ddd64fc9d5ff0f224b6352
SHA512ae67deb5867b1ef50d912bfc642e887d52b1a5bd615779183da707924314a891b15bbd50e2d85c1cfa3d54c8996c05afb0f7455746cde6ee6a0316051c532f8f
-
Filesize
1.9MB
MD55bae83b500a7d9b31e7cdc577d04dfc9
SHA1e745b1580a26e143bcc3d6cff9604f225f7f7e6c
SHA256420e4aae7b9967f701b435ceec60b4bc5853785c06ddd64fc9d5ff0f224b6352
SHA512ae67deb5867b1ef50d912bfc642e887d52b1a5bd615779183da707924314a891b15bbd50e2d85c1cfa3d54c8996c05afb0f7455746cde6ee6a0316051c532f8f
-
Filesize
1.9MB
MD55bae83b500a7d9b31e7cdc577d04dfc9
SHA1e745b1580a26e143bcc3d6cff9604f225f7f7e6c
SHA256420e4aae7b9967f701b435ceec60b4bc5853785c06ddd64fc9d5ff0f224b6352
SHA512ae67deb5867b1ef50d912bfc642e887d52b1a5bd615779183da707924314a891b15bbd50e2d85c1cfa3d54c8996c05afb0f7455746cde6ee6a0316051c532f8f
-
Filesize
1.9MB
MD55bae83b500a7d9b31e7cdc577d04dfc9
SHA1e745b1580a26e143bcc3d6cff9604f225f7f7e6c
SHA256420e4aae7b9967f701b435ceec60b4bc5853785c06ddd64fc9d5ff0f224b6352
SHA512ae67deb5867b1ef50d912bfc642e887d52b1a5bd615779183da707924314a891b15bbd50e2d85c1cfa3d54c8996c05afb0f7455746cde6ee6a0316051c532f8f
-
Filesize
1.9MB
MD55bae83b500a7d9b31e7cdc577d04dfc9
SHA1e745b1580a26e143bcc3d6cff9604f225f7f7e6c
SHA256420e4aae7b9967f701b435ceec60b4bc5853785c06ddd64fc9d5ff0f224b6352
SHA512ae67deb5867b1ef50d912bfc642e887d52b1a5bd615779183da707924314a891b15bbd50e2d85c1cfa3d54c8996c05afb0f7455746cde6ee6a0316051c532f8f
-
Filesize
1.9MB
MD55bae83b500a7d9b31e7cdc577d04dfc9
SHA1e745b1580a26e143bcc3d6cff9604f225f7f7e6c
SHA256420e4aae7b9967f701b435ceec60b4bc5853785c06ddd64fc9d5ff0f224b6352
SHA512ae67deb5867b1ef50d912bfc642e887d52b1a5bd615779183da707924314a891b15bbd50e2d85c1cfa3d54c8996c05afb0f7455746cde6ee6a0316051c532f8f
-
Filesize
1.9MB
MD55bae83b500a7d9b31e7cdc577d04dfc9
SHA1e745b1580a26e143bcc3d6cff9604f225f7f7e6c
SHA256420e4aae7b9967f701b435ceec60b4bc5853785c06ddd64fc9d5ff0f224b6352
SHA512ae67deb5867b1ef50d912bfc642e887d52b1a5bd615779183da707924314a891b15bbd50e2d85c1cfa3d54c8996c05afb0f7455746cde6ee6a0316051c532f8f
-
Filesize
1.4MB
MD5d6b05020d4a0ec2a3a8b687099e335df
SHA1df239d830ebcd1cde5c68c46a7b76dad49d415f4
SHA2569824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a
SHA51278fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff
-
Filesize
1.4MB
MD5d6b05020d4a0ec2a3a8b687099e335df
SHA1df239d830ebcd1cde5c68c46a7b76dad49d415f4
SHA2569824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a
SHA51278fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff
-
Filesize
1.4MB
MD5d6b05020d4a0ec2a3a8b687099e335df
SHA1df239d830ebcd1cde5c68c46a7b76dad49d415f4
SHA2569824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a
SHA51278fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff
-
Filesize
1.9MB
MD5bca08c2276587e4d253293a89be8aecc
SHA1b0a4678a7911868f3aed6bda8249a1e004f9d049
SHA256d5a480276835aad3bff69164a2ca39f911e0aa7eec595822bbbf15678702764d
SHA512de85a3e6166e939b2421bec470a6c66a1400611ab90a6471c63c98dd134c6fb52ea288597fb6344c028f421dce7e48480afc0da13432add3e20accd8e8dabe3e
-
Filesize
1.9MB
MD5e51d95c47db7e2d6a338821a6e1ecaf2
SHA1762764d86048e1ee40bd18e3a0c48d98831ecd5b
SHA2569e26f2d7061345a0268d73416cabc9191eefa1bbf806d3f5c274c458a84931c3
SHA512ce0cfc747c8a05d66039b6fbd8cfb2db46e7688d4d1fac2cd61484eadbb5789a2941f3c53aa05909f98f858212862b883f884d894498f23da5a372b89c5c3215
-
Filesize
1.9MB
MD58329cc614f9255539b9292fd106de37e
SHA19914a28f55c5c5507d010e59144d7a4052539b51
SHA2566015e74dfc779637bcf0a82c16e9d539118efa7b626d5a5b404fb338a81543d3
SHA512b4bf459ba484c5716e3890475c7980f160726975cd83df1db4594607f820cbe8128586573e74752b9f7b92952dff2fdea9fa7ef9e8af4ccec9cadf90935d1b27
-
Filesize
1.8MB
MD59d4346e6c9e7d3e42c66aa072b71e65b
SHA1247fd251fb12365f7851111d804ad491a9f1e01a
SHA256524eca44a1b3342564c363156b310cfbc1893b31f35d929901467f5fa3328701
SHA512cb0e93f299215f8929c3dd3d06f012469a272fda02bde121f73e5a6cd11e32cba50cbbea15e78b70473b9b2aec42c4d945109b5cc95fa777b4c68f16640dfe8b
-
Filesize
65B
MD564acfa7e03b01f48294cf30d201a0026
SHA110facd995b38a095f30b4a800fa454c0bcbf8438
SHA256ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62
SHA51265a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a
-
Filesize
1.9MB
MD58a2599934a241ab87a66289ed9a07851
SHA1558c2942c0dba2e930c374e7919d950b6fa682dc
SHA2568e84044c68bcc40053e1f59d4b8a3be285cf9d8ef58c1720bca2f4a909955214
SHA51280bf035c6b648bc521fa1cd3a0d08f1f99eab02298faf99847909be1f7e0d463bda554cdc8a581096efb93caa74945ca8e224debe50965e115601d2e31f6f7a3
-
Filesize
1.9MB
MD5bca08c2276587e4d253293a89be8aecc
SHA1b0a4678a7911868f3aed6bda8249a1e004f9d049
SHA256d5a480276835aad3bff69164a2ca39f911e0aa7eec595822bbbf15678702764d
SHA512de85a3e6166e939b2421bec470a6c66a1400611ab90a6471c63c98dd134c6fb52ea288597fb6344c028f421dce7e48480afc0da13432add3e20accd8e8dabe3e
-
Filesize
1.9MB
MD58329cc614f9255539b9292fd106de37e
SHA19914a28f55c5c5507d010e59144d7a4052539b51
SHA2566015e74dfc779637bcf0a82c16e9d539118efa7b626d5a5b404fb338a81543d3
SHA512b4bf459ba484c5716e3890475c7980f160726975cd83df1db4594607f820cbe8128586573e74752b9f7b92952dff2fdea9fa7ef9e8af4ccec9cadf90935d1b27
-
Filesize
1.9MB
MD58329cc614f9255539b9292fd106de37e
SHA19914a28f55c5c5507d010e59144d7a4052539b51
SHA2566015e74dfc779637bcf0a82c16e9d539118efa7b626d5a5b404fb338a81543d3
SHA512b4bf459ba484c5716e3890475c7980f160726975cd83df1db4594607f820cbe8128586573e74752b9f7b92952dff2fdea9fa7ef9e8af4ccec9cadf90935d1b27
-
Filesize
1.9MB
MD58329cc614f9255539b9292fd106de37e
SHA19914a28f55c5c5507d010e59144d7a4052539b51
SHA2566015e74dfc779637bcf0a82c16e9d539118efa7b626d5a5b404fb338a81543d3
SHA512b4bf459ba484c5716e3890475c7980f160726975cd83df1db4594607f820cbe8128586573e74752b9f7b92952dff2fdea9fa7ef9e8af4ccec9cadf90935d1b27
-
Filesize
1.9MB
MD58329cc614f9255539b9292fd106de37e
SHA19914a28f55c5c5507d010e59144d7a4052539b51
SHA2566015e74dfc779637bcf0a82c16e9d539118efa7b626d5a5b404fb338a81543d3
SHA512b4bf459ba484c5716e3890475c7980f160726975cd83df1db4594607f820cbe8128586573e74752b9f7b92952dff2fdea9fa7ef9e8af4ccec9cadf90935d1b27
-
Filesize
1.9MB
MD5ac560ab88c492c0658d3ef0c2c47a8be
SHA1d7df03fd1ee5bbb053c2fc210269df033da65cfa
SHA256d52b1d260611434e3ab291d177a6ddcad4ebbed65f046ddeb93ed700e82c9790
SHA512d1920e723f9a330431261ae5d978be2157494990a842d9159ee8507c27e0069ff5ad818efcfcf79b096b813f89d9564066c3bb6950bce8d1f3def13180ce918f
-
Filesize
1.9MB
MD5bca08c2276587e4d253293a89be8aecc
SHA1b0a4678a7911868f3aed6bda8249a1e004f9d049
SHA256d5a480276835aad3bff69164a2ca39f911e0aa7eec595822bbbf15678702764d
SHA512de85a3e6166e939b2421bec470a6c66a1400611ab90a6471c63c98dd134c6fb52ea288597fb6344c028f421dce7e48480afc0da13432add3e20accd8e8dabe3e
-
Filesize
1.9MB
MD590abc29e45815787c4fe5887d5ec70cb
SHA1e0a108be85f24ac5a5beebb96628ea99b70df1ae
SHA256c9dbd813cdab2849639ab1ae0d6b472b93a13a55be09068a766f1aba2b4d058f
SHA51220dee3e6393bca92fa67873a7e09a6739250ae8f5d58059488db74b8296e908c4bc516b4084ab596c6f3e05e723f706c7e0efeabb02e0c374b91bf000ca77b28
-
Filesize
1.9MB
MD58329cc614f9255539b9292fd106de37e
SHA19914a28f55c5c5507d010e59144d7a4052539b51
SHA2566015e74dfc779637bcf0a82c16e9d539118efa7b626d5a5b404fb338a81543d3
SHA512b4bf459ba484c5716e3890475c7980f160726975cd83df1db4594607f820cbe8128586573e74752b9f7b92952dff2fdea9fa7ef9e8af4ccec9cadf90935d1b27
-
Filesize
1.9MB
MD5cd8b5d327ac25e63c605e82b070ec843
SHA11d247de5e19ecdc4368a652ade521ac9b9cad958
SHA256f276d247e36562028fe51ae9d3085d696da573b46cd75bfe0b0d476808810826
SHA5128b57cca8507a4972bb07f6fe76a89fff24cef76f29b3e80f080fdac86e4ec2d0515945890b2a8e3305d9691ccc78b674327def7d5c8ca6f91098e00f33d9ec48
-
Filesize
1.9MB
MD560c88ab63d39c6ffa1651a4b5070e4a3
SHA13a5dd74ebff2d0b7b9b689968fd80e81aae209b5
SHA2567d59c48e600cdddc2df0ac50f1b2c8c3d100381d48eb2ab29da22c72a120dcb5
SHA512f065531ac8ef9d7e8c095fa063615cce33f6b12c81a7b88cb423473af3876e7bed44912aacaaa0d085530c464bf3e4eb44fe97db7ffb507e28f74643993dc774
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.9MB
MD5bca08c2276587e4d253293a89be8aecc
SHA1b0a4678a7911868f3aed6bda8249a1e004f9d049
SHA256d5a480276835aad3bff69164a2ca39f911e0aa7eec595822bbbf15678702764d
SHA512de85a3e6166e939b2421bec470a6c66a1400611ab90a6471c63c98dd134c6fb52ea288597fb6344c028f421dce7e48480afc0da13432add3e20accd8e8dabe3e
-
Filesize
1.9MB
MD5bca08c2276587e4d253293a89be8aecc
SHA1b0a4678a7911868f3aed6bda8249a1e004f9d049
SHA256d5a480276835aad3bff69164a2ca39f911e0aa7eec595822bbbf15678702764d
SHA512de85a3e6166e939b2421bec470a6c66a1400611ab90a6471c63c98dd134c6fb52ea288597fb6344c028f421dce7e48480afc0da13432add3e20accd8e8dabe3e
-
Filesize
1.9MB
MD5bca08c2276587e4d253293a89be8aecc
SHA1b0a4678a7911868f3aed6bda8249a1e004f9d049
SHA256d5a480276835aad3bff69164a2ca39f911e0aa7eec595822bbbf15678702764d
SHA512de85a3e6166e939b2421bec470a6c66a1400611ab90a6471c63c98dd134c6fb52ea288597fb6344c028f421dce7e48480afc0da13432add3e20accd8e8dabe3e
-
Filesize
1.9MB
MD5da4c493effee4b12e58bb1c758875ffc
SHA1613a0cab2d909d3d14cc5435a92a1d48c28659fa
SHA2569fe523d639c2c2d34b2808f1770b1d90aa052f78902da404ca34ae604c97f7a3
SHA512b7089f5ef8b7dfd09aeb7281324296cae124616a0578cb5b7eed0abbf5601c3fb94f451a3da8a5e4b7f76466da3a36792a09f37e2342a7a25405439d45c26372
-
Filesize
1.9MB
MD5da4c493effee4b12e58bb1c758875ffc
SHA1613a0cab2d909d3d14cc5435a92a1d48c28659fa
SHA2569fe523d639c2c2d34b2808f1770b1d90aa052f78902da404ca34ae604c97f7a3
SHA512b7089f5ef8b7dfd09aeb7281324296cae124616a0578cb5b7eed0abbf5601c3fb94f451a3da8a5e4b7f76466da3a36792a09f37e2342a7a25405439d45c26372
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.9MB
MD55bae83b500a7d9b31e7cdc577d04dfc9
SHA1e745b1580a26e143bcc3d6cff9604f225f7f7e6c
SHA256420e4aae7b9967f701b435ceec60b4bc5853785c06ddd64fc9d5ff0f224b6352
SHA512ae67deb5867b1ef50d912bfc642e887d52b1a5bd615779183da707924314a891b15bbd50e2d85c1cfa3d54c8996c05afb0f7455746cde6ee6a0316051c532f8f
-
Filesize
1.9MB
MD55bae83b500a7d9b31e7cdc577d04dfc9
SHA1e745b1580a26e143bcc3d6cff9604f225f7f7e6c
SHA256420e4aae7b9967f701b435ceec60b4bc5853785c06ddd64fc9d5ff0f224b6352
SHA512ae67deb5867b1ef50d912bfc642e887d52b1a5bd615779183da707924314a891b15bbd50e2d85c1cfa3d54c8996c05afb0f7455746cde6ee6a0316051c532f8f
-
Filesize
1.9MB
MD55bae83b500a7d9b31e7cdc577d04dfc9
SHA1e745b1580a26e143bcc3d6cff9604f225f7f7e6c
SHA256420e4aae7b9967f701b435ceec60b4bc5853785c06ddd64fc9d5ff0f224b6352
SHA512ae67deb5867b1ef50d912bfc642e887d52b1a5bd615779183da707924314a891b15bbd50e2d85c1cfa3d54c8996c05afb0f7455746cde6ee6a0316051c532f8f
-
Filesize
1.9MB
MD55bae83b500a7d9b31e7cdc577d04dfc9
SHA1e745b1580a26e143bcc3d6cff9604f225f7f7e6c
SHA256420e4aae7b9967f701b435ceec60b4bc5853785c06ddd64fc9d5ff0f224b6352
SHA512ae67deb5867b1ef50d912bfc642e887d52b1a5bd615779183da707924314a891b15bbd50e2d85c1cfa3d54c8996c05afb0f7455746cde6ee6a0316051c532f8f
-
Filesize
1.9MB
MD55bae83b500a7d9b31e7cdc577d04dfc9
SHA1e745b1580a26e143bcc3d6cff9604f225f7f7e6c
SHA256420e4aae7b9967f701b435ceec60b4bc5853785c06ddd64fc9d5ff0f224b6352
SHA512ae67deb5867b1ef50d912bfc642e887d52b1a5bd615779183da707924314a891b15bbd50e2d85c1cfa3d54c8996c05afb0f7455746cde6ee6a0316051c532f8f
-
Filesize
1.9MB
MD58329cc614f9255539b9292fd106de37e
SHA19914a28f55c5c5507d010e59144d7a4052539b51
SHA2566015e74dfc779637bcf0a82c16e9d539118efa7b626d5a5b404fb338a81543d3
SHA512b4bf459ba484c5716e3890475c7980f160726975cd83df1db4594607f820cbe8128586573e74752b9f7b92952dff2fdea9fa7ef9e8af4ccec9cadf90935d1b27
-
Filesize
1.9MB
MD58329cc614f9255539b9292fd106de37e
SHA19914a28f55c5c5507d010e59144d7a4052539b51
SHA2566015e74dfc779637bcf0a82c16e9d539118efa7b626d5a5b404fb338a81543d3
SHA512b4bf459ba484c5716e3890475c7980f160726975cd83df1db4594607f820cbe8128586573e74752b9f7b92952dff2fdea9fa7ef9e8af4ccec9cadf90935d1b27