Analysis
-
max time kernel
163s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2023 19:37
Behavioral task
behavioral1
Sample
4d7a5bf7819da93e728bb26c4211d980_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4d7a5bf7819da93e728bb26c4211d980_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
4d7a5bf7819da93e728bb26c4211d980_exe32.exe
-
Size
1.9MB
-
MD5
4d7a5bf7819da93e728bb26c4211d980
-
SHA1
0a0a4278347cb1c65fb0a5df31c02dfec898fc72
-
SHA256
bb8775fefc81ae9c2a17bf952df1e2b871f684989c1881881425b60af18a272a
-
SHA512
807bd34e2ba42f55c1a733b0e240fca0f910f725a6e2b3c1afcc5a95233b82be9557ef41c48eccce50a150a9ef7ba6d23b599e330e4523f94b7bcafcfdeca02e
-
SSDEEP
12288:ONNEj+gNNEj+cNNEj+gNNEj+WNNEj+0NNEj+0NNEj+R:ONNGNNaNNGNNENNKNNKNNj
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" Gaara.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Gaara.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Kazekage.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" system32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" system32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Gaara.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Kazekage.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" system32.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Gaara.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Kazekage.exe -
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 24 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\system32.exe Kazekage.exe File created C:\Windows\SysWOW64\drivers\system32.exe system32.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe csrss.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe csrss.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe system32.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe Gaara.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe csrss.exe File created C:\Windows\SysWOW64\drivers\system32.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe smss.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe smss.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe smss.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe system32.exe File created C:\Windows\SysWOW64\drivers\system32.exe Gaara.exe File created C:\Windows\SysWOW64\drivers\system32.exe smss.exe File created C:\Windows\SysWOW64\drivers\system32.exe csrss.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe Gaara.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe Gaara.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe system32.exe File created C:\Windows\SysWOW64\drivers\system32.exe Kazekage.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe\Debugger = "cmd.exe /c del" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe\Debugger = "cmd.exe /c del" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "drivers\\Kazekage.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe\Debugger = "cmd.exe /c del" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "drivers\\Kazekage.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "drivers\\Kazekage.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger = "drivers\\Kazekage.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe\Debugger = "cmd.exe /c del" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.exe\Debugger = "cmd.exe /c del" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "drivers\\Kazekage.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "drivers\\Kazekage.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "drivers\\Kazekage.exe" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe\Debugger = "cmd.exe /c del" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe\Debugger = "cmd.exe /c del" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe\Debugger = "cmd.exe /c del" Gaara.exe -
Executes dropped EXE 30 IoCs
pid Process 920 smss.exe 3452 smss.exe 3188 Gaara.exe 820 smss.exe 3560 Gaara.exe 2988 csrss.exe 1804 smss.exe 4824 Gaara.exe 1628 csrss.exe 1364 Kazekage.exe 4720 smss.exe 2396 Gaara.exe 2972 csrss.exe 4780 Kazekage.exe 3136 system32.exe 1308 smss.exe 1960 Gaara.exe 2096 Gaara.exe 2236 csrss.exe 3696 csrss.exe 3776 Kazekage.exe 460 csrss.exe 4736 Kazekage.exe 4648 system32.exe 1060 Kazekage.exe 4904 Kazekage.exe 4568 system32.exe 4392 system32.exe 1276 system32.exe 4640 system32.exe -
Loads dropped DLL 18 IoCs
pid Process 920 smss.exe 3452 smss.exe 3188 Gaara.exe 820 smss.exe 3560 Gaara.exe 2988 csrss.exe 1804 smss.exe 4824 Gaara.exe 1628 csrss.exe 4720 smss.exe 2396 Gaara.exe 2972 csrss.exe 1308 smss.exe 1960 Gaara.exe 2096 Gaara.exe 2236 csrss.exe 3696 csrss.exe 460 csrss.exe -
resource yara_rule behavioral2/memory/4516-0-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000700000002324b-11.dat upx behavioral2/files/0x0007000000023249-31.dat upx behavioral2/memory/920-32-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x0007000000023249-33.dat upx behavioral2/files/0x000700000002324a-41.dat upx behavioral2/files/0x000700000002324b-45.dat upx behavioral2/files/0x000700000002324c-49.dat upx behavioral2/files/0x000700000002324d-53.dat upx behavioral2/files/0x000700000002324e-58.dat upx behavioral2/files/0x000700000002324e-57.dat upx behavioral2/files/0x0007000000023249-68.dat upx behavioral2/files/0x000700000002324a-73.dat upx behavioral2/memory/3188-77-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000700000002324a-75.dat upx behavioral2/memory/3452-74-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000700000002324d-91.dat upx behavioral2/files/0x0007000000023249-106.dat upx behavioral2/memory/820-108-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000700000002324e-95.dat upx behavioral2/memory/820-111-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000700000002324a-112.dat upx behavioral2/files/0x000700000002324c-88.dat upx behavioral2/files/0x000700000002324c-87.dat upx behavioral2/files/0x000700000002324b-83.dat upx behavioral2/memory/3560-116-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/2988-119-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000700000002324b-118.dat upx behavioral2/files/0x000700000002324b-120.dat upx behavioral2/files/0x000700000002324c-127.dat upx behavioral2/files/0x000700000002324d-131.dat upx behavioral2/files/0x0007000000023249-146.dat upx behavioral2/files/0x000700000002324e-135.dat upx behavioral2/memory/4516-148-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000700000002324a-151.dat upx behavioral2/memory/4824-152-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000700000002324b-156.dat upx behavioral2/memory/4824-159-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1628-160-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/920-157-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1628-163-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000700000002324d-165.dat upx behavioral2/memory/1364-166-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000700000002324d-167.dat upx behavioral2/files/0x000700000002324c-173.dat upx behavioral2/files/0x0007000000023249-188.dat upx behavioral2/files/0x000700000002324e-178.dat upx behavioral2/files/0x000700000002324e-177.dat upx behavioral2/files/0x000700000002324a-192.dat upx behavioral2/memory/3188-193-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/4720-195-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/2396-200-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000700000002324b-198.dat upx behavioral2/files/0x000700000002324d-203.dat upx behavioral2/files/0x000700000002324e-207.dat upx behavioral2/memory/3136-209-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/4780-208-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/files/0x000700000002324e-210.dat upx behavioral2/files/0x000700000002324c-216.dat upx behavioral2/files/0x0007000000023249-227.dat upx behavioral2/memory/2988-228-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1364-233-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/2096-238-0x0000000000400000-0x000000000043B000-memory.dmp upx behavioral2/memory/1960-240-0x0000000000400000-0x000000000043B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 42 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 9 - 2023\\Gaara.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 9 - 2023\\Gaara.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 9 - 2023\\smss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 10 - 2023\\smss.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 10 - 2023\\smss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-10-2023.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-9-2023.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 9 - 2023\\smss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 9 - 2023\\smss.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 9 - 2023\\Gaara.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 10 - 2023\\smss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 10 - 2023\\Gaara.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-9-2023.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 9 - 2023\\Gaara.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-9-2023.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 10 - 2023\\smss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-10-2023.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 10 - 2023\\Gaara.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-9-2023.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-9-2023.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-10-2023.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 10 - 2023\\Gaara.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-10-2023.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 10 - 2023\\Gaara.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 9 - 2023\\smss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 9 - 2023\\Gaara.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-9-2023.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 9 - 2023\\Gaara.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 10 - 2023\\Gaara.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-10-2023.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 9 - 2023\\smss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "15-10-2023.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 10 - 2023\\smss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 10 - 2023\\smss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 15 - 9 - 2023\\smss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 15 - 10 - 2023\\Gaara.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" Kazekage.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification \??\A:\Desktop.ini system32.exe File opened for modification \??\Q:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\V:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\T:\Desktop.ini smss.exe File opened for modification \??\A:\Desktop.ini csrss.exe File opened for modification \??\Y:\Desktop.ini Kazekage.exe File opened for modification \??\I:\Desktop.ini system32.exe File opened for modification \??\N:\Desktop.ini system32.exe File opened for modification \??\M:\Desktop.ini Gaara.exe File opened for modification \??\P:\Desktop.ini Gaara.exe File opened for modification \??\Y:\Desktop.ini csrss.exe File opened for modification \??\P:\Desktop.ini csrss.exe File opened for modification \??\Q:\Desktop.ini csrss.exe File opened for modification \??\G:\Desktop.ini system32.exe File opened for modification D:\Desktop.ini Gaara.exe File opened for modification F:\Desktop.ini csrss.exe File opened for modification F:\Desktop.ini system32.exe File opened for modification \??\Y:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\Y:\Desktop.ini system32.exe File opened for modification \??\I:\Desktop.ini smss.exe File opened for modification \??\N:\Desktop.ini smss.exe File opened for modification \??\S:\Desktop.ini Gaara.exe File opened for modification \??\M:\Desktop.ini Kazekage.exe File opened for modification \??\S:\Desktop.ini Kazekage.exe File opened for modification C:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\K:\Desktop.ini system32.exe File opened for modification \??\Z:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\G:\Desktop.ini smss.exe File opened for modification \??\N:\Desktop.ini Gaara.exe File opened for modification \??\G:\Desktop.ini Kazekage.exe File opened for modification \??\A:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification D:\Desktop.ini system32.exe File opened for modification \??\W:\Desktop.ini Kazekage.exe File opened for modification \??\E:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\O:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\Z:\Desktop.ini system32.exe File opened for modification \??\J:\Desktop.ini smss.exe File opened for modification \??\L:\Desktop.ini smss.exe File opened for modification \??\I:\Desktop.ini Kazekage.exe File opened for modification \??\W:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\X:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\X:\Desktop.ini Kazekage.exe File opened for modification \??\N:\Desktop.ini Kazekage.exe File opened for modification \??\J:\Desktop.ini Gaara.exe File opened for modification \??\E:\Desktop.ini Kazekage.exe File opened for modification \??\J:\Desktop.ini Kazekage.exe File opened for modification \??\B:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\N:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\K:\Desktop.ini smss.exe File opened for modification \??\W:\Desktop.ini csrss.exe File opened for modification \??\P:\Desktop.ini Kazekage.exe File opened for modification D:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\H:\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification F:\Desktop.ini smss.exe File opened for modification \??\O:\Desktop.ini smss.exe File opened for modification \??\X:\Desktop.ini csrss.exe File opened for modification \??\O:\Desktop.ini csrss.exe File opened for modification \??\Z:\Desktop.ini csrss.exe File opened for modification \??\V:\Desktop.ini Kazekage.exe File opened for modification C:\Desktop.ini system32.exe File opened for modification \??\W:\Desktop.ini smss.exe File opened for modification \??\R:\Desktop.ini Gaara.exe File opened for modification \??\X:\Desktop.ini Gaara.exe File opened for modification \??\G:\Desktop.ini csrss.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: csrss.exe File opened (read-only) \??\I: smss.exe File opened (read-only) \??\U: csrss.exe File opened (read-only) \??\J: system32.exe File opened (read-only) \??\Q: system32.exe File opened (read-only) \??\P: Gaara.exe File opened (read-only) \??\T: csrss.exe File opened (read-only) \??\P: system32.exe File opened (read-only) \??\X: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\T: system32.exe File opened (read-only) \??\Z: smss.exe File opened (read-only) \??\J: csrss.exe File opened (read-only) \??\B: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\I: csrss.exe File opened (read-only) \??\V: csrss.exe File opened (read-only) \??\E: Kazekage.exe File opened (read-only) \??\Q: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\V: smss.exe File opened (read-only) \??\W: smss.exe File opened (read-only) \??\G: csrss.exe File opened (read-only) \??\K: csrss.exe File opened (read-only) \??\K: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\Y: system32.exe File opened (read-only) \??\O: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\H: smss.exe File opened (read-only) \??\S: smss.exe File opened (read-only) \??\I: Kazekage.exe File opened (read-only) \??\K: Kazekage.exe File opened (read-only) \??\Y: Kazekage.exe File opened (read-only) \??\J: smss.exe File opened (read-only) \??\E: Gaara.exe File opened (read-only) \??\J: Gaara.exe File opened (read-only) \??\P: Kazekage.exe File opened (read-only) \??\P: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\V: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\A: smss.exe File opened (read-only) \??\G: system32.exe File opened (read-only) \??\Z: system32.exe File opened (read-only) \??\O: smss.exe File opened (read-only) \??\L: csrss.exe File opened (read-only) \??\I: system32.exe File opened (read-only) \??\K: smss.exe File opened (read-only) \??\M: Gaara.exe File opened (read-only) \??\Q: smss.exe File opened (read-only) \??\A: Gaara.exe File opened (read-only) \??\P: csrss.exe File opened (read-only) \??\X: system32.exe File opened (read-only) \??\W: Gaara.exe File opened (read-only) \??\O: csrss.exe File opened (read-only) \??\M: Kazekage.exe File opened (read-only) \??\U: Kazekage.exe File opened (read-only) \??\V: Kazekage.exe File opened (read-only) \??\Q: Gaara.exe File opened (read-only) \??\Q: Kazekage.exe File opened (read-only) \??\S: Kazekage.exe File opened (read-only) \??\I: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened (read-only) \??\V: system32.exe File opened (read-only) \??\U: Gaara.exe File opened (read-only) \??\N: csrss.exe File opened (read-only) \??\N: system32.exe File opened (read-only) \??\Y: Gaara.exe File opened (read-only) \??\S: csrss.exe File opened (read-only) \??\A: system32.exe File opened (read-only) \??\H: 4d7a5bf7819da93e728bb26c4211d980_exe32.exe -
Drops autorun.inf file 1 TTPs 64 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\B:\Autorun.inf smss.exe File opened for modification D:\Autorun.inf smss.exe File created \??\H:\Autorun.inf smss.exe File opened for modification \??\Q:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\X:\Autorun.inf system32.exe File opened for modification \??\B:\Autorun.inf csrss.exe File opened for modification \??\L:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created \??\R:\Autorun.inf Gaara.exe File opened for modification \??\V:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\Z:\Autorun.inf Kazekage.exe File created \??\E:\Autorun.inf system32.exe File created \??\S:\Autorun.inf system32.exe File created \??\T:\Autorun.inf system32.exe File created \??\G:\Autorun.inf Gaara.exe File created \??\L:\Autorun.inf Gaara.exe File created \??\M:\Autorun.inf Gaara.exe File opened for modification \??\S:\Autorun.inf csrss.exe File created \??\T:\Autorun.inf smss.exe File created \??\A:\Autorun.inf system32.exe File opened for modification \??\Q:\Autorun.inf system32.exe File opened for modification \??\Z:\Autorun.inf system32.exe File opened for modification \??\A:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\I:\Autorun.inf Gaara.exe File created \??\L:\Autorun.inf smss.exe File opened for modification \??\Y:\Autorun.inf Kazekage.exe File created \??\Z:\Autorun.inf Kazekage.exe File opened for modification \??\T:\Autorun.inf system32.exe File opened for modification \??\E:\Autorun.inf Gaara.exe File created \??\I:\Autorun.inf csrss.exe File created \??\K:\Autorun.inf csrss.exe File opened for modification \??\J:\Autorun.inf Kazekage.exe File created \??\Z:\Autorun.inf csrss.exe File opened for modification \??\N:\Autorun.inf system32.exe File created \??\A:\Autorun.inf csrss.exe File opened for modification \??\W:\Autorun.inf csrss.exe File created \??\H:\Autorun.inf csrss.exe File opened for modification \??\N:\Autorun.inf csrss.exe File opened for modification \??\J:\Autorun.inf system32.exe File created \??\L:\Autorun.inf csrss.exe File opened for modification \??\N:\Autorun.inf smss.exe File created \??\W:\Autorun.inf Kazekage.exe File opened for modification \??\X:\Autorun.inf Kazekage.exe File created \??\O:\Autorun.inf Gaara.exe File opened for modification \??\O:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created \??\W:\Autorun.inf Gaara.exe File created \??\L:\Autorun.inf Kazekage.exe File opened for modification \??\R:\Autorun.inf Kazekage.exe File created D:\Autorun.inf Gaara.exe File created D:\Autorun.inf smss.exe File opened for modification \??\A:\Autorun.inf csrss.exe File opened for modification \??\O:\Autorun.inf smss.exe File created \??\U:\Autorun.inf smss.exe File opened for modification \??\X:\Autorun.inf smss.exe File created \??\T:\Autorun.inf 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification \??\V:\Autorun.inf system32.exe File created \??\Y:\Autorun.inf system32.exe File created \??\Z:\Autorun.inf system32.exe File opened for modification \??\M:\Autorun.inf smss.exe File created D:\Autorun.inf csrss.exe File created \??\U:\Autorun.inf system32.exe File opened for modification \??\U:\Autorun.inf Kazekage.exe File opened for modification \??\B:\Autorun.inf system32.exe File created \??\N:\Autorun.inf smss.exe File opened for modification C:\Autorun.inf smss.exe -
Drops file in System32 directory 51 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\15-9-2023.exe Kazekage.exe File created C:\Windows\SysWOW64\15-9-2023.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Gaara.exe File created C:\Windows\SysWOW64\mscomctl.ocx Gaara.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx Kazekage.exe File created C:\Windows\SysWOW64\15-10-2023.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini csrss.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx Gaara.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx system32.exe File opened for modification C:\Windows\SysWOW64\15-10-2023.exe smss.exe File opened for modification C:\Windows\SysWOW64\15-10-2023.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\15-9-2023.exe Gaara.exe File opened for modification C:\Windows\SysWOW64\ system32.exe File opened for modification C:\Windows\SysWOW64\15-10-2023.exe Gaara.exe File created C:\Windows\SysWOW64\15-9-2023.exe Gaara.exe File created C:\Windows\SysWOW64\15-9-2023.exe smss.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini smss.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx csrss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\15-10-2023.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created C:\Windows\SysWOW64\msvbvm60.dll csrss.exe File created C:\Windows\SysWOW64\msvbvm60.dll system32.exe File opened for modification C:\Windows\SysWOW64\ csrss.exe File opened for modification C:\Windows\SysWOW64\15-9-2023.exe smss.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx smss.exe File created C:\Windows\SysWOW64\msvbvm60.dll Gaara.exe File created C:\Windows\SysWOW64\Desktop.ini Gaara.exe File created C:\Windows\SysWOW64\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created C:\Windows\SysWOW64\msvbvm60.dll smss.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\15-9-2023.exe csrss.exe File created C:\Windows\SysWOW64\mscomctl.ocx smss.exe File opened for modification C:\Windows\SysWOW64\ Gaara.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll smss.exe File opened for modification C:\Windows\SysWOW64\ Kazekage.exe File created C:\Windows\SysWOW64\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini Gaara.exe File opened for modification C:\Windows\SysWOW64\ smss.exe File opened for modification C:\Windows\SysWOW64\15-10-2023.exe system32.exe File opened for modification C:\Windows\SysWOW64\15-9-2023.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini system32.exe File created C:\Windows\SysWOW64\msvbvm60.dll 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created C:\Windows\SysWOW64\mscomctl.ocx 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini Kazekage.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\SysWOW64\15-9-2023.exe system32.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll system32.exe File opened for modification C:\Windows\SysWOW64\15-10-2023.exe csrss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll csrss.exe -
Sets desktop wallpaper using registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Kazekage.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\Admin 15 - 9 - 2023\csrss.exe Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 15 - 9 - 2023\smss.exe csrss.exe File opened for modification C:\Windows\Fonts\Admin 15 - 9 - 2023\csrss.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\Fonts\Admin 15 - 9 - 2023\Gaara.exe Gaara.exe File opened for modification C:\Windows\Fonts\Admin 15 - 9 - 2023\csrss.exe csrss.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\system\msvbvm60.dll csrss.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe Kazekage.exe File opened for modification C:\Windows\system\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe csrss.exe File created C:\Windows\Fonts\Admin 15 - 9 - 2023\smss.exe csrss.exe File opened for modification C:\Windows\Fonts\Admin 15 - 9 - 2023\csrss.exe Gaara.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\system\msvbvm60.dll 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe Gaara.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe smss.exe File opened for modification C:\Windows\msvbvm60.dll smss.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe Kazekage.exe File created C:\Windows\WBEM\msvbvm60.dll system32.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg Gaara.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\msvbvm60.dll csrss.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe system32.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe Gaara.exe File opened for modification C:\Windows\Fonts\Admin 15 - 9 - 2023\csrss.exe system32.exe File opened for modification C:\Windows\mscomctl.ocx system32.exe File created C:\Windows\Fonts\Admin 15 - 9 - 2023\Gaara.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe Gaara.exe File opened for modification C:\Windows\msvbvm60.dll Gaara.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe csrss.exe File opened for modification C:\Windows\Fonts\Admin 15 - 9 - 2023\smss.exe Gaara.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg system32.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe system32.exe File created C:\Windows\Fonts\Admin 15 - 9 - 2023\smss.exe smss.exe File opened for modification C:\Windows\ Gaara.exe File opened for modification C:\Windows\Fonts\Admin 15 - 9 - 2023\Gaara.exe system32.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe system32.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\Fonts\Admin 15 - 9 - 2023\Gaara.exe smss.exe File opened for modification C:\Windows\mscomctl.ocx Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 15 - 9 - 2023\Gaara.exe 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\ csrss.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\msvbvm60.dll 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\msvbvm60.dll 4d7a5bf7819da93e728bb26c4211d980_exe32.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe Kazekage.exe File opened for modification C:\Windows\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\msvbvm60.dll system32.exe File created C:\Windows\Fonts\Admin 15 - 9 - 2023\csrss.exe csrss.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe Kazekage.exe File created C:\Windows\Fonts\Admin 15 - 9 - 2023\Gaara.exe smss.exe File opened for modification C:\Windows\ smss.exe File opened for modification C:\Windows\ Kazekage.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\msvbvm60.dll smss.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg Kazekage.exe File created C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe system32.exe File opened for modification C:\Windows\system\mscoree.dll Gaara.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe system32.exe File opened for modification C:\Windows\msvbvm60.dll csrss.exe File opened for modification C:\Windows\Fonts\Admin 15 - 9 - 2023\smss.exe Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 15 - 9 - 2023\Gaara.exe Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe smss.exe File opened for modification C:\Windows\system\mscoree.dll csrss.exe File opened for modification C:\Windows\system\mscoree.dll Kazekage.exe -
Modifies Control Panel 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Speed = "4" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" system32.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop csrss.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Speed = "4" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Size = "72" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\WallpaperStyle = "2" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" Kazekage.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee Kazekage.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\WallpaperStyle = "2" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\WallpaperStyle = "2" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Size = "72" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Speed = "4" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Size = "72" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\WallpaperStyle = "2" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop system32.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee csrss.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" smss.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Size = "72" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" smss.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\WallpaperStyle = "2" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Screen Saver.Marquee\Speed = "4" system32.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\Desktop smss.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" Kazekage.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Main 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" Gaara.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Main Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" csrss.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Main system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" system32.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Main smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" smss.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Main Gaara.exe Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Software\Microsoft\Internet Explorer\Main csrss.exe -
Modifies registry class 51 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe -
Runs ping.exe 1 TTPs 34 IoCs
pid Process 4608 ping.exe 2736 ping.exe 2740 ping.exe 4456 ping.exe 1200 ping.exe 1276 ping.exe 4556 ping.exe 5084 ping.exe 4244 ping.exe 2148 ping.exe 3984 ping.exe 2176 ping.exe 3360 ping.exe 3712 ping.exe 2696 ping.exe 4892 ping.exe 2876 ping.exe 1764 ping.exe 4608 ping.exe 4376 ping.exe 4340 ping.exe 3156 ping.exe 2860 ping.exe 4792 ping.exe 2784 ping.exe 520 ping.exe 3408 ping.exe 4164 ping.exe 2836 ping.exe 4820 ping.exe 3804 ping.exe 2536 ping.exe 416 ping.exe 4636 ping.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 2988 csrss.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 1364 Kazekage.exe 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
pid Process 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 920 smss.exe 3452 smss.exe 3188 Gaara.exe 820 smss.exe 3560 Gaara.exe 2988 csrss.exe 1804 smss.exe 4824 Gaara.exe 1628 csrss.exe 1364 Kazekage.exe 4720 smss.exe 2396 Gaara.exe 2972 csrss.exe 4780 Kazekage.exe 3136 system32.exe 1308 smss.exe 1960 Gaara.exe 2096 Gaara.exe 2236 csrss.exe 3696 csrss.exe 3776 Kazekage.exe 460 csrss.exe 4736 Kazekage.exe 4648 system32.exe 1060 Kazekage.exe 4568 system32.exe 4392 system32.exe 4904 Kazekage.exe 1276 system32.exe 4640 system32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4516 wrote to memory of 920 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 83 PID 4516 wrote to memory of 920 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 83 PID 4516 wrote to memory of 920 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 83 PID 920 wrote to memory of 3452 920 smss.exe 85 PID 920 wrote to memory of 3452 920 smss.exe 85 PID 920 wrote to memory of 3452 920 smss.exe 85 PID 920 wrote to memory of 3188 920 smss.exe 86 PID 920 wrote to memory of 3188 920 smss.exe 86 PID 920 wrote to memory of 3188 920 smss.exe 86 PID 3188 wrote to memory of 820 3188 Gaara.exe 87 PID 3188 wrote to memory of 820 3188 Gaara.exe 87 PID 3188 wrote to memory of 820 3188 Gaara.exe 87 PID 3188 wrote to memory of 3560 3188 Gaara.exe 88 PID 3188 wrote to memory of 3560 3188 Gaara.exe 88 PID 3188 wrote to memory of 3560 3188 Gaara.exe 88 PID 3188 wrote to memory of 2988 3188 Gaara.exe 89 PID 3188 wrote to memory of 2988 3188 Gaara.exe 89 PID 3188 wrote to memory of 2988 3188 Gaara.exe 89 PID 2988 wrote to memory of 1804 2988 csrss.exe 90 PID 2988 wrote to memory of 1804 2988 csrss.exe 90 PID 2988 wrote to memory of 1804 2988 csrss.exe 90 PID 2988 wrote to memory of 4824 2988 csrss.exe 91 PID 2988 wrote to memory of 4824 2988 csrss.exe 91 PID 2988 wrote to memory of 4824 2988 csrss.exe 91 PID 2988 wrote to memory of 1628 2988 csrss.exe 92 PID 2988 wrote to memory of 1628 2988 csrss.exe 92 PID 2988 wrote to memory of 1628 2988 csrss.exe 92 PID 2988 wrote to memory of 1364 2988 csrss.exe 93 PID 2988 wrote to memory of 1364 2988 csrss.exe 93 PID 2988 wrote to memory of 1364 2988 csrss.exe 93 PID 1364 wrote to memory of 4720 1364 Kazekage.exe 94 PID 1364 wrote to memory of 4720 1364 Kazekage.exe 94 PID 1364 wrote to memory of 4720 1364 Kazekage.exe 94 PID 1364 wrote to memory of 2396 1364 Kazekage.exe 95 PID 1364 wrote to memory of 2396 1364 Kazekage.exe 95 PID 1364 wrote to memory of 2396 1364 Kazekage.exe 95 PID 1364 wrote to memory of 2972 1364 Kazekage.exe 96 PID 1364 wrote to memory of 2972 1364 Kazekage.exe 96 PID 1364 wrote to memory of 2972 1364 Kazekage.exe 96 PID 1364 wrote to memory of 4780 1364 Kazekage.exe 97 PID 1364 wrote to memory of 4780 1364 Kazekage.exe 97 PID 1364 wrote to memory of 4780 1364 Kazekage.exe 97 PID 1364 wrote to memory of 3136 1364 Kazekage.exe 98 PID 1364 wrote to memory of 3136 1364 Kazekage.exe 98 PID 1364 wrote to memory of 3136 1364 Kazekage.exe 98 PID 3136 wrote to memory of 1308 3136 system32.exe 99 PID 3136 wrote to memory of 1308 3136 system32.exe 99 PID 3136 wrote to memory of 1308 3136 system32.exe 99 PID 3136 wrote to memory of 1960 3136 system32.exe 100 PID 3136 wrote to memory of 1960 3136 system32.exe 100 PID 3136 wrote to memory of 1960 3136 system32.exe 100 PID 4516 wrote to memory of 2096 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 101 PID 4516 wrote to memory of 2096 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 101 PID 4516 wrote to memory of 2096 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 101 PID 920 wrote to memory of 2236 920 smss.exe 102 PID 920 wrote to memory of 2236 920 smss.exe 102 PID 920 wrote to memory of 2236 920 smss.exe 102 PID 4516 wrote to memory of 3696 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 103 PID 4516 wrote to memory of 3696 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 103 PID 4516 wrote to memory of 3696 4516 4d7a5bf7819da93e728bb26c4211d980_exe32.exe 103 PID 920 wrote to memory of 3776 920 smss.exe 105 PID 920 wrote to memory of 3776 920 smss.exe 105 PID 920 wrote to memory of 3776 920 smss.exe 105 PID 3136 wrote to memory of 460 3136 system32.exe 104 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Gaara.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4d7a5bf7819da93e728bb26c4211d980_exe32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System system32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4d7a5bf7819da93e728bb26c4211d980_exe32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d7a5bf7819da93e728bb26c4211d980_exe32.exe"C:\Users\Admin\AppData\Local\Temp\4d7a5bf7819da93e728bb26c4211d980_exe32.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4516 -
C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:920 -
C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3452
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3188 -
C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:820
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3560
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2988 -
C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4824
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1628
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe5⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1364 -
C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:4720
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2396
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2972
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4780
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe6⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3136 -
C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\smss.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1308
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:460
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1060
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1276
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655007⤵
- Runs ping.exe
PID:3360
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655007⤵
- Runs ping.exe
PID:4340
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655007⤵
- Runs ping.exe
PID:5084
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655007⤵
- Runs ping.exe
PID:3156
-
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
PID:2176
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
PID:3804
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
PID:2696
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
PID:4164
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
PID:3408
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
PID:2536
-
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4648
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
PID:4244
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
PID:416
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
PID:4556
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
PID:3984
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
PID:2784
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
PID:520
-
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4736
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4392
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
PID:4376
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
PID:4820
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
PID:1200
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
PID:2148
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
PID:4892
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
PID:4792
-
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2236
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3776
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4568
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:1764
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:4608
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:4456
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:4636
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:2836
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:2860
-
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\Gaara.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2096
-
-
C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 15 - 10 - 2023\csrss.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3696
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4904
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4640
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:2736
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:2740
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:1276
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:3712
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:4608
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD57726cc57ada0747c4c3d9d218ce21f63
SHA1bd796c70501b89a9c6d2b0959713dfcc2103dd35
SHA2560c967d0353b381aadd78c7158ffc3ed71a6ea94f76679770bb3e683f56f8c893
SHA512d84f7f0073e3f6e4e1137bf76742e6ae31e8b1e8ad98ef6db4714f20c6c7ff78f3ba4657b99bdb5e06031e3abbaf0338f3526e819dacdbc8162fe31aa8defe58
-
Filesize
736B
MD5bb5d6abdf8d0948ac6895ce7fdfbc151
SHA19266b7a247a4685892197194d2b9b86c8f6dddbd
SHA2565db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8
SHA512878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c
-
Filesize
196B
MD51564dfe69ffed40950e5cb644e0894d1
SHA1201b6f7a01cc49bb698bea6d4945a082ed454ce4
SHA256be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184
SHA51272df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097
-
Filesize
1.9MB
MD536d219b3ab3b79c7c0a638be50683e7d
SHA1accf308de53366ba621c6ab8fc64e478e2bf359d
SHA2561bb72a2de8ec95be912b076f98a1ac89c52685d415c5dbe7326f498abbef5e23
SHA5126a1802434eba5d84a482743fc6b89a278e56c696d7466c8f7032df7b5b3891fe46f509d60165c7cbbfad82ffb70740832f4d41344b5779b63ae61760562551fd
-
Filesize
1.9MB
MD5b1370e9d5529d28db5bbbdb5084a8e94
SHA11fb10192b91526da76d2119c3c034483b6089f32
SHA256e60caf1bcdffdb37688f90fa878d08d02f7ab6cb3b33781c528c0ea7ffc58631
SHA512989f54943bc59d706b81ff4bd699e715c8577f8cbbf9a6ec22a55e19e8e69b7d98df67aa27b4952026b9678bed4f120aa6fc4680761ac4aff4e31c566fc1ef25
-
Filesize
1.9MB
MD5b1370e9d5529d28db5bbbdb5084a8e94
SHA11fb10192b91526da76d2119c3c034483b6089f32
SHA256e60caf1bcdffdb37688f90fa878d08d02f7ab6cb3b33781c528c0ea7ffc58631
SHA512989f54943bc59d706b81ff4bd699e715c8577f8cbbf9a6ec22a55e19e8e69b7d98df67aa27b4952026b9678bed4f120aa6fc4680761ac4aff4e31c566fc1ef25
-
Filesize
1.9MB
MD5b1370e9d5529d28db5bbbdb5084a8e94
SHA11fb10192b91526da76d2119c3c034483b6089f32
SHA256e60caf1bcdffdb37688f90fa878d08d02f7ab6cb3b33781c528c0ea7ffc58631
SHA512989f54943bc59d706b81ff4bd699e715c8577f8cbbf9a6ec22a55e19e8e69b7d98df67aa27b4952026b9678bed4f120aa6fc4680761ac4aff4e31c566fc1ef25
-
Filesize
1.9MB
MD5b1370e9d5529d28db5bbbdb5084a8e94
SHA11fb10192b91526da76d2119c3c034483b6089f32
SHA256e60caf1bcdffdb37688f90fa878d08d02f7ab6cb3b33781c528c0ea7ffc58631
SHA512989f54943bc59d706b81ff4bd699e715c8577f8cbbf9a6ec22a55e19e8e69b7d98df67aa27b4952026b9678bed4f120aa6fc4680761ac4aff4e31c566fc1ef25
-
Filesize
1.9MB
MD5b1370e9d5529d28db5bbbdb5084a8e94
SHA11fb10192b91526da76d2119c3c034483b6089f32
SHA256e60caf1bcdffdb37688f90fa878d08d02f7ab6cb3b33781c528c0ea7ffc58631
SHA512989f54943bc59d706b81ff4bd699e715c8577f8cbbf9a6ec22a55e19e8e69b7d98df67aa27b4952026b9678bed4f120aa6fc4680761ac4aff4e31c566fc1ef25
-
Filesize
1.9MB
MD5b1370e9d5529d28db5bbbdb5084a8e94
SHA11fb10192b91526da76d2119c3c034483b6089f32
SHA256e60caf1bcdffdb37688f90fa878d08d02f7ab6cb3b33781c528c0ea7ffc58631
SHA512989f54943bc59d706b81ff4bd699e715c8577f8cbbf9a6ec22a55e19e8e69b7d98df67aa27b4952026b9678bed4f120aa6fc4680761ac4aff4e31c566fc1ef25
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.9MB
MD54d7a5bf7819da93e728bb26c4211d980
SHA10a0a4278347cb1c65fb0a5df31c02dfec898fc72
SHA256bb8775fefc81ae9c2a17bf952df1e2b871f684989c1881881425b60af18a272a
SHA512807bd34e2ba42f55c1a733b0e240fca0f910f725a6e2b3c1afcc5a95233b82be9557ef41c48eccce50a150a9ef7ba6d23b599e330e4523f94b7bcafcfdeca02e
-
Filesize
1.9MB
MD536d219b3ab3b79c7c0a638be50683e7d
SHA1accf308de53366ba621c6ab8fc64e478e2bf359d
SHA2561bb72a2de8ec95be912b076f98a1ac89c52685d415c5dbe7326f498abbef5e23
SHA5126a1802434eba5d84a482743fc6b89a278e56c696d7466c8f7032df7b5b3891fe46f509d60165c7cbbfad82ffb70740832f4d41344b5779b63ae61760562551fd
-
Filesize
1.9MB
MD536d219b3ab3b79c7c0a638be50683e7d
SHA1accf308de53366ba621c6ab8fc64e478e2bf359d
SHA2561bb72a2de8ec95be912b076f98a1ac89c52685d415c5dbe7326f498abbef5e23
SHA5126a1802434eba5d84a482743fc6b89a278e56c696d7466c8f7032df7b5b3891fe46f509d60165c7cbbfad82ffb70740832f4d41344b5779b63ae61760562551fd
-
Filesize
1.9MB
MD536d219b3ab3b79c7c0a638be50683e7d
SHA1accf308de53366ba621c6ab8fc64e478e2bf359d
SHA2561bb72a2de8ec95be912b076f98a1ac89c52685d415c5dbe7326f498abbef5e23
SHA5126a1802434eba5d84a482743fc6b89a278e56c696d7466c8f7032df7b5b3891fe46f509d60165c7cbbfad82ffb70740832f4d41344b5779b63ae61760562551fd
-
Filesize
1.9MB
MD536d219b3ab3b79c7c0a638be50683e7d
SHA1accf308de53366ba621c6ab8fc64e478e2bf359d
SHA2561bb72a2de8ec95be912b076f98a1ac89c52685d415c5dbe7326f498abbef5e23
SHA5126a1802434eba5d84a482743fc6b89a278e56c696d7466c8f7032df7b5b3891fe46f509d60165c7cbbfad82ffb70740832f4d41344b5779b63ae61760562551fd
-
Filesize
1.9MB
MD5645dee7e4a006a48e46088b19a48a301
SHA11097c14d679b0e6384523f244c5ffc3f082a7369
SHA256a4f16f3963263f19afa33f2af581998f188cf61ac50b7116ad6d3629bc0090c0
SHA512ce7c3f5c5a3023d907c7733581beb463d53e8405410f915017ec5e207e8370cb1f8c685e962a4014755a69668b9f6c4f59e1a668bf13c91128e57562fce00845
-
Filesize
1.9MB
MD536d219b3ab3b79c7c0a638be50683e7d
SHA1accf308de53366ba621c6ab8fc64e478e2bf359d
SHA2561bb72a2de8ec95be912b076f98a1ac89c52685d415c5dbe7326f498abbef5e23
SHA5126a1802434eba5d84a482743fc6b89a278e56c696d7466c8f7032df7b5b3891fe46f509d60165c7cbbfad82ffb70740832f4d41344b5779b63ae61760562551fd
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.9MB
MD5f6aa38ff2d73bd1fe820a33d4f936b37
SHA17f32a92b620ca4e8bb5a9824525937a69dc84afb
SHA2563bd78ef70868d7cbe9ca5b20e1107f32bb5e71e283ed5073ef4debc5817ad1c6
SHA512c9779449a83d2215d609b4bd1ac0f316bc6a7e2adb37221bd7ffc7b88e94b7e5c632051773321ead133876b2a81e8797a033dd5c31833514818992f3c5c871ed
-
Filesize
1.9MB
MD5f6aa38ff2d73bd1fe820a33d4f936b37
SHA17f32a92b620ca4e8bb5a9824525937a69dc84afb
SHA2563bd78ef70868d7cbe9ca5b20e1107f32bb5e71e283ed5073ef4debc5817ad1c6
SHA512c9779449a83d2215d609b4bd1ac0f316bc6a7e2adb37221bd7ffc7b88e94b7e5c632051773321ead133876b2a81e8797a033dd5c31833514818992f3c5c871ed
-
Filesize
1.9MB
MD5f6aa38ff2d73bd1fe820a33d4f936b37
SHA17f32a92b620ca4e8bb5a9824525937a69dc84afb
SHA2563bd78ef70868d7cbe9ca5b20e1107f32bb5e71e283ed5073ef4debc5817ad1c6
SHA512c9779449a83d2215d609b4bd1ac0f316bc6a7e2adb37221bd7ffc7b88e94b7e5c632051773321ead133876b2a81e8797a033dd5c31833514818992f3c5c871ed
-
Filesize
1.9MB
MD5f6aa38ff2d73bd1fe820a33d4f936b37
SHA17f32a92b620ca4e8bb5a9824525937a69dc84afb
SHA2563bd78ef70868d7cbe9ca5b20e1107f32bb5e71e283ed5073ef4debc5817ad1c6
SHA512c9779449a83d2215d609b4bd1ac0f316bc6a7e2adb37221bd7ffc7b88e94b7e5c632051773321ead133876b2a81e8797a033dd5c31833514818992f3c5c871ed
-
Filesize
1.9MB
MD5f6aa38ff2d73bd1fe820a33d4f936b37
SHA17f32a92b620ca4e8bb5a9824525937a69dc84afb
SHA2563bd78ef70868d7cbe9ca5b20e1107f32bb5e71e283ed5073ef4debc5817ad1c6
SHA512c9779449a83d2215d609b4bd1ac0f316bc6a7e2adb37221bd7ffc7b88e94b7e5c632051773321ead133876b2a81e8797a033dd5c31833514818992f3c5c871ed
-
Filesize
1.9MB
MD5f6aa38ff2d73bd1fe820a33d4f936b37
SHA17f32a92b620ca4e8bb5a9824525937a69dc84afb
SHA2563bd78ef70868d7cbe9ca5b20e1107f32bb5e71e283ed5073ef4debc5817ad1c6
SHA512c9779449a83d2215d609b4bd1ac0f316bc6a7e2adb37221bd7ffc7b88e94b7e5c632051773321ead133876b2a81e8797a033dd5c31833514818992f3c5c871ed
-
Filesize
1.9MB
MD5f6aa38ff2d73bd1fe820a33d4f936b37
SHA17f32a92b620ca4e8bb5a9824525937a69dc84afb
SHA2563bd78ef70868d7cbe9ca5b20e1107f32bb5e71e283ed5073ef4debc5817ad1c6
SHA512c9779449a83d2215d609b4bd1ac0f316bc6a7e2adb37221bd7ffc7b88e94b7e5c632051773321ead133876b2a81e8797a033dd5c31833514818992f3c5c871ed
-
Filesize
1.9MB
MD51fef489086bb040ddc74588d56d678d0
SHA18ee979f0d9731e251ab6a37fe2b10a876988b0ce
SHA25645dc5c2f7c92292809c42c6b8ec3b53a5c238c66fe1f66d7cc53338c1e69c3bd
SHA512040302e8dcf57fe120fa908b040a428519e48a27cfd7639f8e0b277f0f5c1ef77b74c3d067727456f3e86d4ad330cd87fd4e105f0082bdeb316d17ad81456035
-
Filesize
1.9MB
MD5e1e301adf118812410b4898612a1bb55
SHA12b8d50e549151cb09db787e40c5840d0515e62ca
SHA25676b732bf0ec9d653fcaa8b58c02deff1886ac1ccea75292fe14e798027951392
SHA512902cd8eed5be3297bf437ca94285500d20240531c7d0b0bd4157ee35d6b47266ee2b818ffa1d3e4a786a0d43b08b88a91aecf81d2c93850a66df98f438c90bba
-
Filesize
64KB
MD539f79bb9bde0ce5a8e10f200d947be82
SHA1ca9c386f064ca1ed15b1dd68c51f0ecfd6342e6d
SHA2562f1e8342eb4b9a7a44c95bb730fafd4edafb36eeb8b81a2201ef509ab5d0ee2b
SHA512d69b3f8a4f11ad9c5ddcb5633195cccc5c9f303531e0ec97ca7c78b47bf2413e00b2f4e72f49b9265e828d4d5d3582573b169876148b5af72f6cfd6783e3e7f8
-
Filesize
1.4MB
MD5d6b05020d4a0ec2a3a8b687099e335df
SHA1df239d830ebcd1cde5c68c46a7b76dad49d415f4
SHA2569824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a
SHA51278fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff
-
Filesize
1.4MB
MD5d6b05020d4a0ec2a3a8b687099e335df
SHA1df239d830ebcd1cde5c68c46a7b76dad49d415f4
SHA2569824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a
SHA51278fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff
-
Filesize
1.4MB
MD5d6b05020d4a0ec2a3a8b687099e335df
SHA1df239d830ebcd1cde5c68c46a7b76dad49d415f4
SHA2569824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a
SHA51278fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff
-
Filesize
1.4MB
MD5d6b05020d4a0ec2a3a8b687099e335df
SHA1df239d830ebcd1cde5c68c46a7b76dad49d415f4
SHA2569824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a
SHA51278fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff
-
Filesize
1.9MB
MD536d219b3ab3b79c7c0a638be50683e7d
SHA1accf308de53366ba621c6ab8fc64e478e2bf359d
SHA2561bb72a2de8ec95be912b076f98a1ac89c52685d415c5dbe7326f498abbef5e23
SHA5126a1802434eba5d84a482743fc6b89a278e56c696d7466c8f7032df7b5b3891fe46f509d60165c7cbbfad82ffb70740832f4d41344b5779b63ae61760562551fd
-
Filesize
1.9MB
MD59b88a4b817dfe523376d48159b41ad22
SHA1b66cea4f1945d58bda88c7f0020668dc4c29ba96
SHA256f33d6ea2f3b661d140c9437f845eb80fa243808f05a944ccc97ac66daa90d082
SHA512fb8b732361fb75ae1ca048aa921a69b18318e31db619ee03816b0dfde98aa1e495cd2108c826d86e6b35e0760cf5ec8df8edc960b87b3f837480af80ac45a1be
-
Filesize
1.9MB
MD5451155fb7873c06cd27f359e0499a0db
SHA1a2021cfe0f32a015390f8e399e9d92f111efb2df
SHA256ea03012ebb319018c2675b3a25763b99cf9475fb06560fd0d89e18a957a32974
SHA512d4bef9dec770589b2a3391c41781fc0ac2a518aff059adf95271367ccffd47cfbf1e85023df9c2b734e89ad3734cf3c4b324cda31db5b88108e1c29d7a583d51
-
Filesize
1.9MB
MD5f6aa38ff2d73bd1fe820a33d4f936b37
SHA17f32a92b620ca4e8bb5a9824525937a69dc84afb
SHA2563bd78ef70868d7cbe9ca5b20e1107f32bb5e71e283ed5073ef4debc5817ad1c6
SHA512c9779449a83d2215d609b4bd1ac0f316bc6a7e2adb37221bd7ffc7b88e94b7e5c632051773321ead133876b2a81e8797a033dd5c31833514818992f3c5c871ed
-
Filesize
1.9MB
MD5503f9368b9949f043ad0f01198d6bbe1
SHA1b05ab8e999a272d5ff9238900e8f3bf69d20c6a6
SHA256ecf408e9dbf92cdae19ca8ac4c1f70ae52536e83d9ce35cda8d892536a7d0505
SHA51261691d134553c6c150960d4b2b82133c5cbde39b5e31350bced2a89444edf055683f5491290fcb149b3df3494115671cac2d4261d3f06ef3e19e769258ad5641
-
Filesize
1.9MB
MD5503f9368b9949f043ad0f01198d6bbe1
SHA1b05ab8e999a272d5ff9238900e8f3bf69d20c6a6
SHA256ecf408e9dbf92cdae19ca8ac4c1f70ae52536e83d9ce35cda8d892536a7d0505
SHA51261691d134553c6c150960d4b2b82133c5cbde39b5e31350bced2a89444edf055683f5491290fcb149b3df3494115671cac2d4261d3f06ef3e19e769258ad5641
-
Filesize
1.9MB
MD503313b1b78d7fd0aa9f21777313f7743
SHA1f9ba11728e17a153bf4546917afa8e8bc58e4d1a
SHA256b8db6dfe15191beeb409942e63cf39ab4407cf75bb5e53fdf234c4cb6efc209f
SHA512bf15125846fe08778d22e06026ab7b159caf92f283636af61d8931b242dce149b6021eed1e5505324a37aa014b87a98db2c97cbd5e92d6e3f4fc1d520eb02cd6
-
Filesize
65B
MD564acfa7e03b01f48294cf30d201a0026
SHA110facd995b38a095f30b4a800fa454c0bcbf8438
SHA256ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62
SHA51265a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a
-
Filesize
1.9MB
MD59b88a4b817dfe523376d48159b41ad22
SHA1b66cea4f1945d58bda88c7f0020668dc4c29ba96
SHA256f33d6ea2f3b661d140c9437f845eb80fa243808f05a944ccc97ac66daa90d082
SHA512fb8b732361fb75ae1ca048aa921a69b18318e31db619ee03816b0dfde98aa1e495cd2108c826d86e6b35e0760cf5ec8df8edc960b87b3f837480af80ac45a1be
-
Filesize
1.9MB
MD59b88a4b817dfe523376d48159b41ad22
SHA1b66cea4f1945d58bda88c7f0020668dc4c29ba96
SHA256f33d6ea2f3b661d140c9437f845eb80fa243808f05a944ccc97ac66daa90d082
SHA512fb8b732361fb75ae1ca048aa921a69b18318e31db619ee03816b0dfde98aa1e495cd2108c826d86e6b35e0760cf5ec8df8edc960b87b3f837480af80ac45a1be
-
Filesize
1.9MB
MD59b88a4b817dfe523376d48159b41ad22
SHA1b66cea4f1945d58bda88c7f0020668dc4c29ba96
SHA256f33d6ea2f3b661d140c9437f845eb80fa243808f05a944ccc97ac66daa90d082
SHA512fb8b732361fb75ae1ca048aa921a69b18318e31db619ee03816b0dfde98aa1e495cd2108c826d86e6b35e0760cf5ec8df8edc960b87b3f837480af80ac45a1be
-
Filesize
1.9MB
MD59b88a4b817dfe523376d48159b41ad22
SHA1b66cea4f1945d58bda88c7f0020668dc4c29ba96
SHA256f33d6ea2f3b661d140c9437f845eb80fa243808f05a944ccc97ac66daa90d082
SHA512fb8b732361fb75ae1ca048aa921a69b18318e31db619ee03816b0dfde98aa1e495cd2108c826d86e6b35e0760cf5ec8df8edc960b87b3f837480af80ac45a1be
-
Filesize
1.9MB
MD5b03221b63bdea0cc0e2face9757d4ee5
SHA12bcbf5b13f49075060cdffb8993bd7c5d20754bc
SHA256d9f687a99c6775abdfef7c957b5da7d13232d05f7464d02c744a2d79748c7792
SHA5122a6f183179569438862b5b9a968e31fd76ef9acad05c50564c101ff35d5d0cb7dea2ac5a339562fdf7ec0b1165aea13ed578ec5bc7ab1fd90c8c6b1ffdbb1fa7
-
Filesize
1.9MB
MD54669e999eda05040219ef49ad8f7d3f7
SHA14a31f67e3dc31ae28736ad9d97e77348f2fbc925
SHA256800ec1845d22bcd5d1c4c0dbf323307e29c24322f15e1857dd2dc71f6b57236f
SHA512587b04359d1ce2f7edaf56509d7b1dc3135090c7cb1e08aa277c92f505f615e51ecdfb249fcdaafecb83745f227fb5ad089e6a128b163820baf8b217cccd5333
-
Filesize
1.9MB
MD593b2e9d63f982268eaa98cd1ea4743aa
SHA1200a43717e2a161c47e6f0328c489eb91a31f906
SHA25636b7c06d62140e9aa14c9849e93580fed02f92c2c5ebe1787a8503cec51f920c
SHA51229d611b18353f6cbc32bdeadcab10628fad0576b0d24b76ef8ed7489753206de3a7fcf0ae94248e8cefacf8a0cef89a4a82422cfc3ba88530dadf214fb08150c
-
Filesize
1.9MB
MD5379f6f10bdd9ad323420a591b392afac
SHA12302a731e75e15bd51f3b206e79ee7b7521a151a
SHA256c101ca66fae30f190ba75e3a0b860491f2fc87fea8e5ab4e97c3ee58e1775544
SHA512f0c81eda7dd6ea50203e4253c898ef296f7ea9c563c074ac556f08a27d2f69e0ea717bf1ecbc2688e0a53acf37f3a6db49d7b75150f6e73f563e2b52e94fa755
-
Filesize
1.9MB
MD5379f6f10bdd9ad323420a591b392afac
SHA12302a731e75e15bd51f3b206e79ee7b7521a151a
SHA256c101ca66fae30f190ba75e3a0b860491f2fc87fea8e5ab4e97c3ee58e1775544
SHA512f0c81eda7dd6ea50203e4253c898ef296f7ea9c563c074ac556f08a27d2f69e0ea717bf1ecbc2688e0a53acf37f3a6db49d7b75150f6e73f563e2b52e94fa755
-
Filesize
1.9MB
MD5379f6f10bdd9ad323420a591b392afac
SHA12302a731e75e15bd51f3b206e79ee7b7521a151a
SHA256c101ca66fae30f190ba75e3a0b860491f2fc87fea8e5ab4e97c3ee58e1775544
SHA512f0c81eda7dd6ea50203e4253c898ef296f7ea9c563c074ac556f08a27d2f69e0ea717bf1ecbc2688e0a53acf37f3a6db49d7b75150f6e73f563e2b52e94fa755
-
Filesize
1.9MB
MD5379f6f10bdd9ad323420a591b392afac
SHA12302a731e75e15bd51f3b206e79ee7b7521a151a
SHA256c101ca66fae30f190ba75e3a0b860491f2fc87fea8e5ab4e97c3ee58e1775544
SHA512f0c81eda7dd6ea50203e4253c898ef296f7ea9c563c074ac556f08a27d2f69e0ea717bf1ecbc2688e0a53acf37f3a6db49d7b75150f6e73f563e2b52e94fa755
-
Filesize
1.9MB
MD5f6aa38ff2d73bd1fe820a33d4f936b37
SHA17f32a92b620ca4e8bb5a9824525937a69dc84afb
SHA2563bd78ef70868d7cbe9ca5b20e1107f32bb5e71e283ed5073ef4debc5817ad1c6
SHA512c9779449a83d2215d609b4bd1ac0f316bc6a7e2adb37221bd7ffc7b88e94b7e5c632051773321ead133876b2a81e8797a033dd5c31833514818992f3c5c871ed
-
Filesize
1.9MB
MD5f6aa38ff2d73bd1fe820a33d4f936b37
SHA17f32a92b620ca4e8bb5a9824525937a69dc84afb
SHA2563bd78ef70868d7cbe9ca5b20e1107f32bb5e71e283ed5073ef4debc5817ad1c6
SHA512c9779449a83d2215d609b4bd1ac0f316bc6a7e2adb37221bd7ffc7b88e94b7e5c632051773321ead133876b2a81e8797a033dd5c31833514818992f3c5c871ed
-
Filesize
1.9MB
MD5846fb995d26251ac1f84afc020e11bb6
SHA1bda143f2451e1268d3a02d8dccd2e634b7e1661f
SHA25681411f7544453e2b4cd4b9409d792bdfb2dcac781e77423fb9aef8aca2eebdd3
SHA5125ce0031d0d5aafb11ca0e4ed4e97949cdac11064fabb7d04da3afa5eab3a3c7842dbfd780a36ad351a66bb623802243499f5cb2962e1d5a2a8162cc45893c871
-
Filesize
1.9MB
MD5aaf910b81c97b224ee7843071ff54431
SHA13ad6312bcc7a8954b50990446f7621b53801b1b2
SHA2565be1bf82fe96c34b1318a06d9ec4d914da1fb45439cb8319e9ed397d5f84a22d
SHA5120b9351c0b33e69e8a13d69ed32a76c1a059a27324a1efe2ed9d393a05185cdab427342423e586e0289e873698cb4f5211d54fa7ae92b37add5fda7593e2360b1
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.9MB
MD5e0109d504d816ffe13d5b8408de47438
SHA13aee43af1b1fa336b85505987c18c6409f50de4a
SHA256c50191b15d219b52f6623a169df30cb759347811d8c8e371f9ccea79f3c10c24
SHA5122247cce21d63c58860560ec61cfa0eb80f2a7b9e58b73da09e283c23f6f678127bfb30904a989263ac47e9ec84cdc210c57903399eef95ab8de92b9b2ff92bb2
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.9MB
MD564100d832ec731778ecb5fb99a408d4f
SHA1c4152525fa09a246d060f31e2601933834ea19f2
SHA25648df25de8482dd53038ae34b413cc13473ec7e728dfc00840b464da4d3c22602
SHA512fe26164212310890fd52b7c84ff72f198f53d8ff9df32258ff6e3dff83e0915075c4ff2dad6079e9865a696d806b9646820e43b00185e1715d5964338fe06783
-
Filesize
1.9MB
MD5379f6f10bdd9ad323420a591b392afac
SHA12302a731e75e15bd51f3b206e79ee7b7521a151a
SHA256c101ca66fae30f190ba75e3a0b860491f2fc87fea8e5ab4e97c3ee58e1775544
SHA512f0c81eda7dd6ea50203e4253c898ef296f7ea9c563c074ac556f08a27d2f69e0ea717bf1ecbc2688e0a53acf37f3a6db49d7b75150f6e73f563e2b52e94fa755