Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 18:25
Behavioral task
behavioral1
Sample
NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe
-
Size
163KB
-
MD5
79408b32cda5e28b0dd875d1e8fe8280
-
SHA1
a66423e2b73c77da85781502adcff07995194dde
-
SHA256
5d16b984ad5fcb9482302d0a509b5f62bf00f538a5676476e5eaa8a62eb7b305
-
SHA512
e05d62fc568ea9eb502df9350a9efc166e8098cf762702242a02f72ae1076afaced9181df6d8bf4d8cdb28df19f9b4cbe0feb5c7083ff7b2700c5322b17e3f15
-
SSDEEP
3072:Wx6AHjYzaFXg+w17jsgS/jHagQg19Vlnhfxu:WxzYzaFXi17jklh
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, drivers\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,drivers\\system32.exe" system32.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Kazekage.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Gaara.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" system32.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Kazekage.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Gaara.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" system32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe -
Disables RegEdit via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" csrss.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" system32.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Kazekage.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Gaara.exe -
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 24 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\Kazekage.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File created C:\Windows\SysWOW64\drivers\system32.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File created C:\Windows\SysWOW64\drivers\system32.exe smss.exe File created C:\Windows\SysWOW64\drivers\system32.exe csrss.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe Gaara.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe csrss.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe csrss.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe Kazekage.exe File created C:\Windows\SysWOW64\drivers\system32.exe system32.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe csrss.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe smss.exe File created C:\Windows\SysWOW64\drivers\system32.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe smss.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe Gaara.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe system32.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe system32.exe File created C:\Windows\SysWOW64\drivers\Kazekage.exe Gaara.exe File created C:\Windows\SysWOW64\drivers\system32.exe Gaara.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe smss.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\drivers\system32.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\drivers\Kazekage.exe system32.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe\Debugger = "cmd.exe /c del" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe\Debugger = "cmd.exe /c del" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe\Debugger = "cmd.exe /c del" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe\Debugger = "drivers\\Kazekage.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe\Debugger = "cmd.exe /c del" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "drivers\\Kazekage.exe" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "drivers\\Kazekage.exe" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HokageFile.exe Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com\Debugger = "cmd.exe /c del" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe\Debugger = "cmd.exe /c del" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com\Debugger = "cmd.exe /c del" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "drivers\\Kazekage.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "drivers\\Kazekage.exe" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "drivers\\Kazekage.exe" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe\Debugger = "cmd.exe /c del" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.exe\Debugger = "cmd.exe /c del" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "drivers\\Kazekage.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmc.exe Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HOKAGE4.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "drivers\\Kazekage.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspool.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedt32.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Obito.exe\Debugger = "cmd.exe /c del" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KakashiHatake.exe system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kspoold.exe\Debugger = "cmd.exe /c del" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\procexp.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Thumbs.com\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "drivers\\Kazekage.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Funny UST Scandal.avi.exe\Debugger = "cmd.exe /c del" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rin.exe\Debugger = "cmd.exe /c del" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "drivers\\Kazekage.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rstrui.exe\Debugger = "drivers\\Kazekage.exe" Gaara.exe -
Executes dropped EXE 30 IoCs
pid Process 2128 smss.exe 2520 smss.exe 2608 Gaara.exe 2896 smss.exe 1584 Gaara.exe 804 csrss.exe 1188 smss.exe 1732 Gaara.exe 1116 csrss.exe 2916 Kazekage.exe 2092 smss.exe 1456 Gaara.exe 3024 csrss.exe 1056 Gaara.exe 1728 csrss.exe 1992 Kazekage.exe 1700 system32.exe 976 Kazekage.exe 1780 csrss.exe 1652 system32.exe 732 system32.exe 1072 Kazekage.exe 1084 Kazekage.exe 2364 system32.exe 2372 smss.exe 876 system32.exe 3064 Gaara.exe 1736 csrss.exe 1924 Kazekage.exe 2032 system32.exe -
Loads dropped DLL 63 IoCs
pid Process 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2128 smss.exe 2128 smss.exe 2520 smss.exe 2128 smss.exe 2128 smss.exe 2608 Gaara.exe 2608 Gaara.exe 2608 Gaara.exe 2896 smss.exe 2608 Gaara.exe 1584 Gaara.exe 2608 Gaara.exe 2608 Gaara.exe 804 csrss.exe 804 csrss.exe 1188 smss.exe 804 csrss.exe 1732 Gaara.exe 1116 csrss.exe 804 csrss.exe 804 csrss.exe 2916 Kazekage.exe 2092 smss.exe 2916 Kazekage.exe 1456 Gaara.exe 2916 Kazekage.exe 3024 csrss.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 1056 Gaara.exe 2128 smss.exe 2608 Gaara.exe 2608 Gaara.exe 804 csrss.exe 804 csrss.exe 1728 csrss.exe 2916 Kazekage.exe 2916 Kazekage.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 1780 csrss.exe 2608 Gaara.exe 2608 Gaara.exe 2916 Kazekage.exe 2916 Kazekage.exe 2128 smss.exe 2128 smss.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2128 smss.exe 2128 smss.exe 1700 system32.exe 2372 smss.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 1700 system32.exe 3064 Gaara.exe 1700 system32.exe 1736 csrss.exe 1700 system32.exe 1700 system32.exe 1700 system32.exe 1700 system32.exe -
resource yara_rule behavioral1/memory/2420-0-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x0007000000015c8a-11.dat upx behavioral1/files/0x0007000000015c71-30.dat upx behavioral1/memory/2420-32-0x0000000001CF0000-0x0000000001D1B000-memory.dmp upx behavioral1/files/0x0007000000015c71-33.dat upx behavioral1/files/0x0007000000015c71-36.dat upx behavioral1/files/0x0007000000015c71-37.dat upx behavioral1/files/0x0007000000015c7f-46.dat upx behavioral1/files/0x0007000000015c97-54.dat upx behavioral1/files/0x0007000000015eb0-62.dat upx behavioral1/files/0x0009000000015cae-58.dat upx behavioral1/files/0x0007000000015c8a-50.dat upx behavioral1/files/0x0007000000015c71-45.dat upx behavioral1/memory/2520-77-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x0007000000015c71-74.dat upx behavioral1/files/0x0007000000015c71-73.dat upx behavioral1/memory/2520-80-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x0007000000015c7f-81.dat upx behavioral1/memory/2608-88-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x0007000000015c7f-87.dat upx behavioral1/files/0x0007000000015c7f-84.dat upx behavioral1/files/0x0007000000015c7f-83.dat upx behavioral1/files/0x0007000000015c7f-95.dat upx behavioral1/files/0x0007000000015eb0-108.dat upx behavioral1/files/0x0009000000015cae-104.dat upx behavioral1/files/0x0007000000015c97-100.dat upx behavioral1/files/0x0007000000015c8a-96.dat upx behavioral1/files/0x0007000000015c71-122.dat upx behavioral1/memory/2420-124-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x0007000000015c71-120.dat upx behavioral1/files/0x0007000000015c71-119.dat upx behavioral1/files/0x0007000000015c7f-128.dat upx behavioral1/memory/2896-130-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1584-132-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x0007000000015c7f-129.dat upx behavioral1/files/0x0007000000015c8a-140.dat upx behavioral1/files/0x0007000000015c8a-141.dat upx behavioral1/memory/804-151-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x0007000000015c8a-145.dat upx behavioral1/memory/2128-139-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1584-138-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x0007000000015c8a-136.dat upx behavioral1/files/0x0007000000015c8a-155.dat upx behavioral1/files/0x0007000000015c97-156.dat upx behavioral1/files/0x0009000000015cae-160.dat upx behavioral1/files/0x0007000000015eb0-164.dat upx behavioral1/files/0x0007000000015c71-175.dat upx behavioral1/files/0x0007000000015c71-176.dat upx behavioral1/files/0x0007000000015c7f-180.dat upx behavioral1/files/0x0007000000015c7f-182.dat upx behavioral1/memory/1188-181-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2608-186-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2608-188-0x00000000002B0000-0x00000000002DB000-memory.dmp upx behavioral1/files/0x0007000000015c8a-189.dat upx behavioral1/memory/1732-191-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1116-192-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x0009000000015cae-201.dat upx behavioral1/files/0x0009000000015cae-202.dat upx behavioral1/memory/2916-205-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x0009000000015cae-198.dat upx behavioral1/memory/1116-197-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/files/0x0009000000015cae-195.dat upx behavioral1/files/0x0009000000015cae-210.dat upx behavioral1/files/0x0007000000015c97-211.dat upx -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 16 - 10 - 2023\\smss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 16 - 10 - 2023\\Gaara.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 16 - 10 - 2023\\smss.exe" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 16 - 10 - 2023\\Gaara.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "16-10-2023.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 16 - 10 - 2023\\Gaara.exe" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 16 - 10 - 2023\\smss.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "16-10-2023.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 16 - 10 - 2023\\Gaara.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SystemRun = "drivers\\csrss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 16 - 10 - 2023\\Gaara.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "16-10-2023.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "16-10-2023.exe" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 16 - 10 - 2023\\smss.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FreeAV = "Fonts\\Admin 16 - 10 - 2023\\Gaara.exe" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 16 - 10 - 2023\\smss.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "16-10-2023.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DesertSand = "Fonts\\Admin 16 - 10 - 2023\\smss.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\644r4 = "16-10-2023.exe" system32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification \??\I:\Desktop.ini csrss.exe File opened for modification \??\O:\Desktop.ini system32.exe File opened for modification \??\B:\Desktop.ini Gaara.exe File opened for modification \??\N:\Desktop.ini Gaara.exe File opened for modification \??\S:\Desktop.ini Gaara.exe File opened for modification \??\V:\Desktop.ini NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification \??\G:\Desktop.ini Gaara.exe File opened for modification \??\U:\Desktop.ini Gaara.exe File opened for modification \??\H:\Desktop.ini csrss.exe File opened for modification \??\N:\Desktop.ini system32.exe File opened for modification D:\Desktop.ini Kazekage.exe File opened for modification \??\Q:\Desktop.ini Kazekage.exe File opened for modification \??\L:\Desktop.ini NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification \??\B:\Desktop.ini system32.exe File opened for modification \??\J:\Desktop.ini system32.exe File opened for modification \??\M:\Desktop.ini system32.exe File opened for modification \??\X:\Desktop.ini Kazekage.exe File opened for modification D:\Desktop.ini NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification \??\O:\Desktop.ini NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification \??\P:\Desktop.ini csrss.exe File opened for modification \??\V:\Desktop.ini csrss.exe File opened for modification \??\V:\Desktop.ini system32.exe File opened for modification C:\Desktop.ini NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification \??\K:\Desktop.ini Gaara.exe File opened for modification \??\A:\Desktop.ini csrss.exe File opened for modification \??\U:\Desktop.ini NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification \??\N:\Desktop.ini smss.exe File opened for modification \??\G:\Desktop.ini system32.exe File opened for modification \??\I:\Desktop.ini Kazekage.exe File opened for modification \??\P:\Desktop.ini Kazekage.exe File opened for modification \??\I:\Desktop.ini NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification \??\X:\Desktop.ini Gaara.exe File opened for modification \??\L:\Desktop.ini Kazekage.exe File opened for modification \??\Z:\Desktop.ini NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Desktop.ini Gaara.exe File opened for modification \??\G:\Desktop.ini Kazekage.exe File opened for modification \??\R:\Desktop.ini Gaara.exe File opened for modification \??\B:\Desktop.ini Kazekage.exe File opened for modification \??\R:\Desktop.ini Kazekage.exe File opened for modification \??\P:\Desktop.ini system32.exe File opened for modification \??\Q:\Desktop.ini system32.exe File opened for modification \??\U:\Desktop.ini Kazekage.exe File opened for modification \??\H:\Desktop.ini NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Desktop.ini system32.exe File opened for modification C:\Desktop.ini smss.exe File opened for modification \??\M:\Desktop.ini smss.exe File opened for modification \??\Z:\Desktop.ini smss.exe File opened for modification \??\X:\Desktop.ini csrss.exe File opened for modification \??\Z:\Desktop.ini Kazekage.exe File opened for modification \??\P:\Desktop.ini NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification \??\B:\Desktop.ini smss.exe File opened for modification \??\E:\Desktop.ini smss.exe File opened for modification \??\H:\Desktop.ini smss.exe File opened for modification \??\V:\Desktop.ini Kazekage.exe File opened for modification \??\W:\Desktop.ini NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification \??\A:\Desktop.ini smss.exe File opened for modification \??\U:\Desktop.ini smss.exe File opened for modification \??\M:\Desktop.ini NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification \??\Q:\Desktop.ini NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification \??\J:\Desktop.ini smss.exe File opened for modification D:\Desktop.ini Gaara.exe File opened for modification \??\Z:\Desktop.ini Gaara.exe File opened for modification \??\W:\Desktop.ini csrss.exe File opened for modification \??\K:\Desktop.ini system32.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: smss.exe File opened (read-only) \??\X: smss.exe File opened (read-only) \??\K: smss.exe File opened (read-only) \??\B: Gaara.exe File opened (read-only) \??\K: Gaara.exe File opened (read-only) \??\A: system32.exe File opened (read-only) \??\K: system32.exe File opened (read-only) \??\N: system32.exe File opened (read-only) \??\O: Kazekage.exe File opened (read-only) \??\Z: Kazekage.exe File opened (read-only) \??\P: system32.exe File opened (read-only) \??\U: NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened (read-only) \??\K: csrss.exe File opened (read-only) \??\N: NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened (read-only) \??\T: NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened (read-only) \??\T: Gaara.exe File opened (read-only) \??\Q: csrss.exe File opened (read-only) \??\S: csrss.exe File opened (read-only) \??\V: csrss.exe File opened (read-only) \??\O: system32.exe File opened (read-only) \??\V: NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened (read-only) \??\H: smss.exe File opened (read-only) \??\K: Kazekage.exe File opened (read-only) \??\O: smss.exe File opened (read-only) \??\U: system32.exe File opened (read-only) \??\M: Kazekage.exe File opened (read-only) \??\I: smss.exe File opened (read-only) \??\M: Gaara.exe File opened (read-only) \??\N: Gaara.exe File opened (read-only) \??\B: csrss.exe File opened (read-only) \??\X: Kazekage.exe File opened (read-only) \??\G: NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened (read-only) \??\L: NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened (read-only) \??\B: smss.exe File opened (read-only) \??\E: smss.exe File opened (read-only) \??\S: smss.exe File opened (read-only) \??\Y: smss.exe File opened (read-only) \??\Y: Gaara.exe File opened (read-only) \??\H: Kazekage.exe File opened (read-only) \??\E: NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened (read-only) \??\Z: smss.exe File opened (read-only) \??\Q: Gaara.exe File opened (read-only) \??\X: csrss.exe File opened (read-only) \??\T: Kazekage.exe File opened (read-only) \??\U: Kazekage.exe File opened (read-only) \??\H: Gaara.exe File opened (read-only) \??\V: Gaara.exe File opened (read-only) \??\O: NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened (read-only) \??\J: smss.exe File opened (read-only) \??\W: Gaara.exe File opened (read-only) \??\R: Kazekage.exe File opened (read-only) \??\V: Kazekage.exe File opened (read-only) \??\Y: csrss.exe File opened (read-only) \??\H: NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened (read-only) \??\Q: NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened (read-only) \??\R: Gaara.exe File opened (read-only) \??\S: Gaara.exe File opened (read-only) \??\L: csrss.exe File opened (read-only) \??\M: system32.exe File opened (read-only) \??\S: system32.exe File opened (read-only) \??\B: Kazekage.exe File opened (read-only) \??\E: Kazekage.exe File opened (read-only) \??\P: smss.exe File opened (read-only) \??\J: Gaara.exe -
Drops autorun.inf file 1 TTPs 64 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification \??\A:\Autorun.inf smss.exe File opened for modification \??\Y:\Autorun.inf csrss.exe File opened for modification \??\G:\Autorun.inf system32.exe File opened for modification \??\L:\Autorun.inf Kazekage.exe File opened for modification \??\M:\Autorun.inf Kazekage.exe File opened for modification \??\A:\Autorun.inf system32.exe File opened for modification \??\P:\Autorun.inf system32.exe File opened for modification \??\U:\Autorun.inf NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File created \??\P:\Autorun.inf smss.exe File opened for modification \??\E:\Autorun.inf csrss.exe File opened for modification \??\Q:\Autorun.inf smss.exe File opened for modification \??\A:\Autorun.inf Kazekage.exe File opened for modification \??\O:\Autorun.inf smss.exe File created \??\E:\Autorun.inf Kazekage.exe File opened for modification \??\O:\Autorun.inf csrss.exe File created \??\E:\Autorun.inf system32.exe File opened for modification \??\O:\Autorun.inf NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification \??\P:\Autorun.inf NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Autorun.inf smss.exe File created \??\U:\Autorun.inf NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File created \??\I:\Autorun.inf smss.exe File opened for modification \??\B:\Autorun.inf csrss.exe File created \??\I:\Autorun.inf Gaara.exe File created \??\Y:\Autorun.inf Gaara.exe File opened for modification \??\T:\Autorun.inf system32.exe File created \??\H:\Autorun.inf smss.exe File created \??\W:\Autorun.inf smss.exe File opened for modification \??\S:\Autorun.inf csrss.exe File created \??\L:\Autorun.inf Gaara.exe File created \??\U:\Autorun.inf system32.exe File opened for modification \??\G:\Autorun.inf smss.exe File created \??\T:\Autorun.inf smss.exe File opened for modification \??\G:\Autorun.inf csrss.exe File opened for modification \??\H:\Autorun.inf system32.exe File created \??\N:\Autorun.inf system32.exe File opened for modification \??\V:\Autorun.inf NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File created \??\X:\Autorun.inf Kazekage.exe File created \??\H:\Autorun.inf Gaara.exe File opened for modification \??\T:\Autorun.inf csrss.exe File created \??\U:\Autorun.inf csrss.exe File opened for modification \??\K:\Autorun.inf Kazekage.exe File created \??\W:\Autorun.inf Kazekage.exe File opened for modification \??\I:\Autorun.inf Gaara.exe File opened for modification \??\K:\Autorun.inf smss.exe File opened for modification \??\J:\Autorun.inf csrss.exe File created \??\P:\Autorun.inf csrss.exe File opened for modification \??\O:\Autorun.inf Gaara.exe File opened for modification \??\E:\Autorun.inf Gaara.exe File opened for modification \??\H:\Autorun.inf NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification \??\M:\Autorun.inf smss.exe File opened for modification \??\X:\Autorun.inf Kazekage.exe File opened for modification \??\L:\Autorun.inf NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File created \??\S:\Autorun.inf Kazekage.exe File created \??\E:\Autorun.inf Gaara.exe File opened for modification \??\I:\Autorun.inf Kazekage.exe File created \??\J:\Autorun.inf Gaara.exe File opened for modification \??\J:\Autorun.inf Gaara.exe File created \??\Q:\Autorun.inf Gaara.exe File created \??\B:\Autorun.inf smss.exe File opened for modification \??\X:\Autorun.inf smss.exe File opened for modification \??\M:\Autorun.inf csrss.exe File created \??\I:\Autorun.inf Kazekage.exe File created \??\M:\Autorun.inf Gaara.exe File created \??\A:\Autorun.inf system32.exe -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mscomctl.ocx csrss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll csrss.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini Kazekage.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini Gaara.exe File created C:\Windows\SysWOW64\msvbvm60.dll system32.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\SysWOW64\ smss.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini csrss.exe File opened for modification C:\Windows\SysWOW64\ Gaara.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini system32.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll system32.exe File created C:\Windows\SysWOW64\msvbvm60.dll Gaara.exe File created C:\Windows\SysWOW64\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll smss.exe File opened for modification C:\Windows\SysWOW64\16-10-2023.exe Gaara.exe File opened for modification C:\Windows\SysWOW64\ NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx smss.exe File opened for modification C:\Windows\SysWOW64\ csrss.exe File opened for modification C:\Windows\SysWOW64\16-10-2023.exe smss.exe File created C:\Windows\SysWOW64\Desktop.ini NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx system32.exe File created C:\Windows\SysWOW64\msvbvm60.dll NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File created C:\Windows\SysWOW64\msvbvm60.dll smss.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini smss.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx Gaara.exe File created C:\Windows\SysWOW64\msvbvm60.dll csrss.exe File opened for modification C:\Windows\SysWOW64\16-10-2023.exe Kazekage.exe File opened for modification C:\Windows\SysWOW64\Desktop.ini NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\SysWOW64\mscomctl.ocx Kazekage.exe File opened for modification C:\Windows\SysWOW64\ system32.exe File opened for modification C:\Windows\SysWOW64\16-10-2023.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\SysWOW64\16-10-2023.exe csrss.exe File opened for modification C:\Windows\SysWOW64\16-10-2023.exe system32.exe File opened for modification C:\Windows\SysWOW64\ Kazekage.exe File created C:\Windows\SysWOW64\16-10-2023.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Gaara.exe -
Sets desktop wallpaper using registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\Wallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\system\msvbvm60.dll smss.exe File created C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe Kazekage.exe File created C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe Kazekage.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg system32.exe File opened for modification C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\system\mscoree.dll smss.exe File opened for modification C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe smss.exe File created C:\Windows\Fonts\Admin 16 - 10 - 2023\msvbvm60.dll csrss.exe File created C:\Windows\Fonts\Admin 16 - 10 - 2023\msvbvm60.dll system32.exe File created C:\Windows\WBEM\msvbvm60.dll system32.exe File created C:\Windows\Fonts\Admin 16 - 10 - 2023\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\system\mscoree.dll csrss.exe File created C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe Kazekage.exe File created C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe system32.exe File opened for modification C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe system32.exe File created C:\Windows\mscomctl.ocx NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\system\mscoree.dll NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe smss.exe File opened for modification C:\Windows\system\msvbvm60.dll Gaara.exe File opened for modification C:\Windows\msvbvm60.dll csrss.exe File opened for modification C:\Windows\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\system\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\ NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\mscomctl.ocx system32.exe File created C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File created C:\Windows\Fonts\Admin 16 - 10 - 2023\msvbvm60.dll smss.exe File opened for modification C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe Gaara.exe File opened for modification C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe csrss.exe File opened for modification C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe system32.exe File opened for modification C:\Windows\msvbvm60.dll system32.exe File opened for modification C:\Windows\mscomctl.ocx smss.exe File opened for modification C:\Windows\ Gaara.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File created C:\Windows\Fonts\The Kazekage.jpg NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg smss.exe File opened for modification C:\Windows\mscomctl.ocx NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\ csrss.exe File opened for modification C:\Windows\mscomctl.ocx Kazekage.exe File created C:\Windows\msvbvm60.dll NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\system\msvbvm60.dll NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe Gaara.exe File created C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe csrss.exe File opened for modification C:\Windows\mscomctl.ocx csrss.exe File opened for modification C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe csrss.exe File created C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe csrss.exe File created C:\Windows\Fonts\Admin 16 - 10 - 2023\msvbvm60.dll Kazekage.exe File opened for modification C:\Windows\Fonts\Admin 16 - 10 - 2023\msvbvm60.dll NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\Fonts\The Kazekage.jpg csrss.exe File opened for modification C:\Windows\system\mscoree.dll Kazekage.exe File created C:\Windows\WBEM\msvbvm60.dll Kazekage.exe File created C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe smss.exe File opened for modification C:\Windows\ system32.exe File opened for modification C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe File opened for modification C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe csrss.exe File opened for modification C:\Windows\ smss.exe File created C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe smss.exe File opened for modification C:\Windows\msvbvm60.dll smss.exe File created C:\Windows\WBEM\msvbvm60.dll csrss.exe File opened for modification C:\Windows\system\mscoree.dll system32.exe File opened for modification C:\Windows\mscomctl.ocx Gaara.exe File opened for modification C:\Windows\msvbvm60.dll NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe -
Modifies Control Panel 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Speed = "4" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Gaara.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Speed = "4" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Speed = "4" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Speed = "4" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" csrss.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Speed = "4" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" csrss.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Size = "72" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\WallpaperStyle = "2" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" Kazekage.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Size = "72" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\TextColor = "255 0 0" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\SCRNSAVE.EXE = "ssmarque.scr" system32.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Text = "Gaara The Kazekage ( Warning : don't save any porn stuffs files in this computer )" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Font = "Blackadder ITC" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\WallpaperStyle = "2" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ConvertedWallpaper = "C:\\Windows\\Fonts\\The Kazekage.jpg" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Size = "72" csrss.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\WallpaperStyle = "2" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" Kazekage.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Mode.EXE = "1" Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" Gaara.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\BackgroundColor = "0 0 0" Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ScreenSaveTimeOut = "400" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Desktop\ConvertedWallpaper = "Fonts\\The Kazekage.jpg" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\Screen Saver.Marquee\Size = "72" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" csrss.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" system32.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" Kazekage.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main smss.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main csrss.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main Kazekage.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" smss.exe Key created \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main Gaara.exe Set value (str) \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "!!! Hello HokageFile (AnbuTeam-Sampit), Is this my places, Wanna start a War !!!" Gaara.exe -
Modifies registry class 48 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" Gaara.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command\ = "calc.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command Gaara.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command system32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command Kazekage.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open2\Command\ = "calc.exe" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\inffile\shell\Install\command\ = "shutdown -r -f -t 0" csrss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Open\Command smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VBSFile\Shell\Edit\Command\ = "calc.exe" csrss.exe -
Runs ping.exe 1 TTPs 30 IoCs
pid Process 3064 ping.exe 2388 ping.exe 3044 ping.exe 2176 ping.exe 888 ping.exe 2340 ping.exe 1164 ping.exe 1476 ping.exe 2212 ping.exe 1528 ping.exe 1740 ping.exe 2564 ping.exe 436 ping.exe 2108 ping.exe 1088 ping.exe 1004 ping.exe 2948 ping.exe 2716 ping.exe 2800 ping.exe 824 ping.exe 2864 ping.exe 2612 ping.exe 1892 ping.exe 1808 ping.exe 2452 ping.exe 2612 ping.exe 2828 ping.exe 1452 ping.exe 1472 ping.exe 1300 ping.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2916 Kazekage.exe 2916 Kazekage.exe 2916 Kazekage.exe 2916 Kazekage.exe 2916 Kazekage.exe 2916 Kazekage.exe 2916 Kazekage.exe 2916 Kazekage.exe 2916 Kazekage.exe 2916 Kazekage.exe 2916 Kazekage.exe 2916 Kazekage.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2128 smss.exe 2128 smss.exe 2128 smss.exe 2128 smss.exe 2128 smss.exe 2128 smss.exe 2128 smss.exe 2128 smss.exe 2128 smss.exe 2128 smss.exe 2128 smss.exe 2128 smss.exe 2608 Gaara.exe 2608 Gaara.exe 2608 Gaara.exe 2608 Gaara.exe 2608 Gaara.exe 2608 Gaara.exe 2608 Gaara.exe 2608 Gaara.exe 2608 Gaara.exe 2608 Gaara.exe 2608 Gaara.exe 2608 Gaara.exe 804 csrss.exe 804 csrss.exe 804 csrss.exe 804 csrss.exe 804 csrss.exe 804 csrss.exe 804 csrss.exe 804 csrss.exe 804 csrss.exe 804 csrss.exe 804 csrss.exe 804 csrss.exe 2916 Kazekage.exe 2916 Kazekage.exe 2916 Kazekage.exe 2916 Kazekage.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
pid Process 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 2128 smss.exe 2520 smss.exe 2608 Gaara.exe 2896 smss.exe 1584 Gaara.exe 804 csrss.exe 1188 smss.exe 1732 Gaara.exe 1116 csrss.exe 2916 Kazekage.exe 2092 smss.exe 1456 Gaara.exe 3024 csrss.exe 1056 Gaara.exe 1992 Kazekage.exe 1700 system32.exe 1728 csrss.exe 976 Kazekage.exe 1780 csrss.exe 1652 system32.exe 732 system32.exe 1072 Kazekage.exe 1084 Kazekage.exe 2364 system32.exe 2372 smss.exe 876 system32.exe 3064 Gaara.exe 1736 csrss.exe 1924 Kazekage.exe 2032 system32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2128 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 28 PID 2420 wrote to memory of 2128 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 28 PID 2420 wrote to memory of 2128 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 28 PID 2420 wrote to memory of 2128 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 28 PID 2128 wrote to memory of 2520 2128 smss.exe 29 PID 2128 wrote to memory of 2520 2128 smss.exe 29 PID 2128 wrote to memory of 2520 2128 smss.exe 29 PID 2128 wrote to memory of 2520 2128 smss.exe 29 PID 2128 wrote to memory of 2608 2128 smss.exe 30 PID 2128 wrote to memory of 2608 2128 smss.exe 30 PID 2128 wrote to memory of 2608 2128 smss.exe 30 PID 2128 wrote to memory of 2608 2128 smss.exe 30 PID 2608 wrote to memory of 2896 2608 Gaara.exe 31 PID 2608 wrote to memory of 2896 2608 Gaara.exe 31 PID 2608 wrote to memory of 2896 2608 Gaara.exe 31 PID 2608 wrote to memory of 2896 2608 Gaara.exe 31 PID 2608 wrote to memory of 1584 2608 Gaara.exe 32 PID 2608 wrote to memory of 1584 2608 Gaara.exe 32 PID 2608 wrote to memory of 1584 2608 Gaara.exe 32 PID 2608 wrote to memory of 1584 2608 Gaara.exe 32 PID 2608 wrote to memory of 804 2608 Gaara.exe 33 PID 2608 wrote to memory of 804 2608 Gaara.exe 33 PID 2608 wrote to memory of 804 2608 Gaara.exe 33 PID 2608 wrote to memory of 804 2608 Gaara.exe 33 PID 804 wrote to memory of 1188 804 csrss.exe 34 PID 804 wrote to memory of 1188 804 csrss.exe 34 PID 804 wrote to memory of 1188 804 csrss.exe 34 PID 804 wrote to memory of 1188 804 csrss.exe 34 PID 804 wrote to memory of 1732 804 csrss.exe 35 PID 804 wrote to memory of 1732 804 csrss.exe 35 PID 804 wrote to memory of 1732 804 csrss.exe 35 PID 804 wrote to memory of 1732 804 csrss.exe 35 PID 804 wrote to memory of 1116 804 csrss.exe 36 PID 804 wrote to memory of 1116 804 csrss.exe 36 PID 804 wrote to memory of 1116 804 csrss.exe 36 PID 804 wrote to memory of 1116 804 csrss.exe 36 PID 804 wrote to memory of 2916 804 csrss.exe 37 PID 804 wrote to memory of 2916 804 csrss.exe 37 PID 804 wrote to memory of 2916 804 csrss.exe 37 PID 804 wrote to memory of 2916 804 csrss.exe 37 PID 2916 wrote to memory of 2092 2916 Kazekage.exe 38 PID 2916 wrote to memory of 2092 2916 Kazekage.exe 38 PID 2916 wrote to memory of 2092 2916 Kazekage.exe 38 PID 2916 wrote to memory of 2092 2916 Kazekage.exe 38 PID 2916 wrote to memory of 1456 2916 Kazekage.exe 39 PID 2916 wrote to memory of 1456 2916 Kazekage.exe 39 PID 2916 wrote to memory of 1456 2916 Kazekage.exe 39 PID 2916 wrote to memory of 1456 2916 Kazekage.exe 39 PID 2916 wrote to memory of 3024 2916 Kazekage.exe 40 PID 2916 wrote to memory of 3024 2916 Kazekage.exe 40 PID 2916 wrote to memory of 3024 2916 Kazekage.exe 40 PID 2916 wrote to memory of 3024 2916 Kazekage.exe 40 PID 2420 wrote to memory of 1056 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 41 PID 2420 wrote to memory of 1056 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 41 PID 2420 wrote to memory of 1056 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 41 PID 2420 wrote to memory of 1056 2420 NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe 41 PID 2128 wrote to memory of 1728 2128 smss.exe 42 PID 2128 wrote to memory of 1728 2128 smss.exe 42 PID 2128 wrote to memory of 1728 2128 smss.exe 42 PID 2128 wrote to memory of 1728 2128 smss.exe 42 PID 2608 wrote to memory of 1992 2608 Gaara.exe 43 PID 2608 wrote to memory of 1992 2608 Gaara.exe 43 PID 2608 wrote to memory of 1992 2608 Gaara.exe 43 PID 2608 wrote to memory of 1992 2608 Gaara.exe 43 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" csrss.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Kazekage.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Kazekage.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System system32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System smss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Gaara.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Gaara.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.79408b32cda5e28b0dd875d1e8fe8280.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2420 -
C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe"2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2128 -
C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2520
-
-
C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe"3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2608 -
C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2896
-
-
C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1584
-
-
C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:804 -
C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1188
-
-
C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1732
-
-
C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1116
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe5⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2916 -
C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2092
-
-
C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1456
-
-
C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:976
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:732
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
PID:2108
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
PID:1164
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
PID:1476
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
PID:2828
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
PID:2340
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
PID:2612
-
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe5⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1700 -
C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\smss.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2372
-
-
C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3064
-
-
C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1736
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1924
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655006⤵
- Runs ping.exe
PID:3064
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655006⤵
- Runs ping.exe
PID:1452
-
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
PID:436
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
PID:1892
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
PID:2948
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
PID:1528
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655005⤵
- Runs ping.exe
PID:1472
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655005⤵
- Runs ping.exe
PID:888
-
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1992
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1652
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
PID:1808
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
PID:1300
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
PID:1088
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
PID:1004
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655004⤵
- Runs ping.exe
PID:2212
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655004⤵
- Runs ping.exe
PID:2176
-
-
-
C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1728
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1072
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2364
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:2564
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:2800
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:824
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:2864
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655003⤵
- Runs ping.exe
PID:2388
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655003⤵
- Runs ping.exe
PID:2716
-
-
-
C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\Gaara.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1056
-
-
C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe"C:\Windows\Fonts\Admin 16 - 10 - 2023\csrss.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1780
-
-
C:\Windows\SysWOW64\drivers\Kazekage.exeC:\Windows\system32\drivers\Kazekage.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1084
-
-
C:\Windows\SysWOW64\drivers\system32.exeC:\Windows\system32\drivers\system32.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:1740
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:2612
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.rasasayang.com.my 655002⤵
- Runs ping.exe
PID:2452
-
-
C:\Windows\SysWOW64\ping.exeping -a -l www.duniasex.com 655002⤵
- Runs ping.exe
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify Tools
1Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD526ba50506926fa3d8841fb4761dd23fb
SHA1f86d86152d38899a4426b05ba2d507f26e18e852
SHA256a7c3df79ec99b1773b5dcf5df5bea829a4b436f404767985cdf679c671153072
SHA512338edd5a6b97d4ef1049e0f6b587f6f293a3b697a2faf0d1f4d0eba38cdf7b15486a0f261d0f1233d2c1bf966398797ef47d81b7499fed6b4a5c7b0ef1aab5e4
-
Filesize
736B
MD5bb5d6abdf8d0948ac6895ce7fdfbc151
SHA19266b7a247a4685892197194d2b9b86c8f6dddbd
SHA2565db2e0915b5464d32e83484f8ae5e3c73d2c78f238fde5f58f9b40dbb5322de8
SHA512878444760e8df878d65bb62b4798177e168eb099def58ad3634f4348e96705c83f74324f9fa358f0eff389991976698a233ca53e9b72034ae11c86d42322a76c
-
Filesize
196B
MD51564dfe69ffed40950e5cb644e0894d1
SHA1201b6f7a01cc49bb698bea6d4945a082ed454ce4
SHA256be114a2dbcc08540b314b01882aa836a772a883322a77b67aab31233e26dc184
SHA51272df187e39674b657974392cfa268e71ef86dc101ebd2303896381ca56d3c05aa9db3f0ab7d0e428d7436e0108c8f19e94c2013814d30b0b95a23a6b9e341097
-
Filesize
163KB
MD56b7f4f9df106855d38a6f44691b77114
SHA1dae156e009b6fd96d994d9d20ba86fcdadb68886
SHA2563c07be718001281ce9c7d604afdc702282da4e65c82abd66c6a4f50e20bd968c
SHA5120c35a78b49b94479517b9be3f615e083c416d3bb847d909d8b0fdf028cf34adaeb124e4024db8a91e6fdb1f28d4473605fe99143f2411e0e4b2388920fda4e6f
-
Filesize
163KB
MD56b7f4f9df106855d38a6f44691b77114
SHA1dae156e009b6fd96d994d9d20ba86fcdadb68886
SHA2563c07be718001281ce9c7d604afdc702282da4e65c82abd66c6a4f50e20bd968c
SHA5120c35a78b49b94479517b9be3f615e083c416d3bb847d909d8b0fdf028cf34adaeb124e4024db8a91e6fdb1f28d4473605fe99143f2411e0e4b2388920fda4e6f
-
Filesize
163KB
MD56b7f4f9df106855d38a6f44691b77114
SHA1dae156e009b6fd96d994d9d20ba86fcdadb68886
SHA2563c07be718001281ce9c7d604afdc702282da4e65c82abd66c6a4f50e20bd968c
SHA5120c35a78b49b94479517b9be3f615e083c416d3bb847d909d8b0fdf028cf34adaeb124e4024db8a91e6fdb1f28d4473605fe99143f2411e0e4b2388920fda4e6f
-
Filesize
163KB
MD56b7f4f9df106855d38a6f44691b77114
SHA1dae156e009b6fd96d994d9d20ba86fcdadb68886
SHA2563c07be718001281ce9c7d604afdc702282da4e65c82abd66c6a4f50e20bd968c
SHA5120c35a78b49b94479517b9be3f615e083c416d3bb847d909d8b0fdf028cf34adaeb124e4024db8a91e6fdb1f28d4473605fe99143f2411e0e4b2388920fda4e6f
-
Filesize
163KB
MD56b7f4f9df106855d38a6f44691b77114
SHA1dae156e009b6fd96d994d9d20ba86fcdadb68886
SHA2563c07be718001281ce9c7d604afdc702282da4e65c82abd66c6a4f50e20bd968c
SHA5120c35a78b49b94479517b9be3f615e083c416d3bb847d909d8b0fdf028cf34adaeb124e4024db8a91e6fdb1f28d4473605fe99143f2411e0e4b2388920fda4e6f
-
Filesize
163KB
MD56b7f4f9df106855d38a6f44691b77114
SHA1dae156e009b6fd96d994d9d20ba86fcdadb68886
SHA2563c07be718001281ce9c7d604afdc702282da4e65c82abd66c6a4f50e20bd968c
SHA5120c35a78b49b94479517b9be3f615e083c416d3bb847d909d8b0fdf028cf34adaeb124e4024db8a91e6fdb1f28d4473605fe99143f2411e0e4b2388920fda4e6f
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
163KB
MD579408b32cda5e28b0dd875d1e8fe8280
SHA1a66423e2b73c77da85781502adcff07995194dde
SHA2565d16b984ad5fcb9482302d0a509b5f62bf00f538a5676476e5eaa8a62eb7b305
SHA512e05d62fc568ea9eb502df9350a9efc166e8098cf762702242a02f72ae1076afaced9181df6d8bf4d8cdb28df19f9b4cbe0feb5c7083ff7b2700c5322b17e3f15
-
Filesize
163KB
MD57d9fe2939f9903a5933097cb710b56fd
SHA1dce04662e10cd65624f4c43f3c51096ba9e86a69
SHA25680233a4c2e5015b1857ba54678b2930f887d64d2a8c434fb07238de643c9ace6
SHA5127ab50500ff3e031b409e1e4cf12c0811108cae8a04c523f861d2595327cc25dc0dea31234baf86ee58e875dab0461361e63295210c176ed70e05143879e85d91
-
Filesize
163KB
MD57d9fe2939f9903a5933097cb710b56fd
SHA1dce04662e10cd65624f4c43f3c51096ba9e86a69
SHA25680233a4c2e5015b1857ba54678b2930f887d64d2a8c434fb07238de643c9ace6
SHA5127ab50500ff3e031b409e1e4cf12c0811108cae8a04c523f861d2595327cc25dc0dea31234baf86ee58e875dab0461361e63295210c176ed70e05143879e85d91
-
Filesize
163KB
MD57d9fe2939f9903a5933097cb710b56fd
SHA1dce04662e10cd65624f4c43f3c51096ba9e86a69
SHA25680233a4c2e5015b1857ba54678b2930f887d64d2a8c434fb07238de643c9ace6
SHA5127ab50500ff3e031b409e1e4cf12c0811108cae8a04c523f861d2595327cc25dc0dea31234baf86ee58e875dab0461361e63295210c176ed70e05143879e85d91
-
Filesize
163KB
MD57d9fe2939f9903a5933097cb710b56fd
SHA1dce04662e10cd65624f4c43f3c51096ba9e86a69
SHA25680233a4c2e5015b1857ba54678b2930f887d64d2a8c434fb07238de643c9ace6
SHA5127ab50500ff3e031b409e1e4cf12c0811108cae8a04c523f861d2595327cc25dc0dea31234baf86ee58e875dab0461361e63295210c176ed70e05143879e85d91
-
Filesize
163KB
MD52c12ddf84f1f29b51d3b69c2e391c7f8
SHA124ade9ed6fccdd579948b9d5d708a1d56129e344
SHA256526ee752c989178bc32602b933eea59cdc26e2bd887bfc982de2ea6e196ca024
SHA5129d2f5bedd5323d29d41b5bf9857c35e07258218e967b47d6819163e30b5293ffcad383c87656a00486e5a083d93d1585135671932a404cc710a4e60a21bdc7b3
-
Filesize
163KB
MD57d9fe2939f9903a5933097cb710b56fd
SHA1dce04662e10cd65624f4c43f3c51096ba9e86a69
SHA25680233a4c2e5015b1857ba54678b2930f887d64d2a8c434fb07238de643c9ace6
SHA5127ab50500ff3e031b409e1e4cf12c0811108cae8a04c523f861d2595327cc25dc0dea31234baf86ee58e875dab0461361e63295210c176ed70e05143879e85d91
-
Filesize
163KB
MD5fc5062bc7ef867fbb8a3a6261659a785
SHA145372c4e986a78a8e73e52244fd2c492f5e69aed
SHA25604d0a0003002a38e8c44cb95f425070ccffa845c931ba06d40ad2a2087806f17
SHA5120363f961ea791bb3e6d119695a0d7ee505927b9e7a4462ba727e7bd1db8ce1658c3540f1af18c9df9c9fcde5a8b103b6cd4f78a3cb5e8a85387d58a90d543d83
-
Filesize
163KB
MD5fc5062bc7ef867fbb8a3a6261659a785
SHA145372c4e986a78a8e73e52244fd2c492f5e69aed
SHA25604d0a0003002a38e8c44cb95f425070ccffa845c931ba06d40ad2a2087806f17
SHA5120363f961ea791bb3e6d119695a0d7ee505927b9e7a4462ba727e7bd1db8ce1658c3540f1af18c9df9c9fcde5a8b103b6cd4f78a3cb5e8a85387d58a90d543d83
-
Filesize
163KB
MD5fc5062bc7ef867fbb8a3a6261659a785
SHA145372c4e986a78a8e73e52244fd2c492f5e69aed
SHA25604d0a0003002a38e8c44cb95f425070ccffa845c931ba06d40ad2a2087806f17
SHA5120363f961ea791bb3e6d119695a0d7ee505927b9e7a4462ba727e7bd1db8ce1658c3540f1af18c9df9c9fcde5a8b103b6cd4f78a3cb5e8a85387d58a90d543d83
-
Filesize
163KB
MD5fc5062bc7ef867fbb8a3a6261659a785
SHA145372c4e986a78a8e73e52244fd2c492f5e69aed
SHA25604d0a0003002a38e8c44cb95f425070ccffa845c931ba06d40ad2a2087806f17
SHA5120363f961ea791bb3e6d119695a0d7ee505927b9e7a4462ba727e7bd1db8ce1658c3540f1af18c9df9c9fcde5a8b103b6cd4f78a3cb5e8a85387d58a90d543d83
-
Filesize
163KB
MD5fc5062bc7ef867fbb8a3a6261659a785
SHA145372c4e986a78a8e73e52244fd2c492f5e69aed
SHA25604d0a0003002a38e8c44cb95f425070ccffa845c931ba06d40ad2a2087806f17
SHA5120363f961ea791bb3e6d119695a0d7ee505927b9e7a4462ba727e7bd1db8ce1658c3540f1af18c9df9c9fcde5a8b103b6cd4f78a3cb5e8a85387d58a90d543d83
-
Filesize
163KB
MD5fc5062bc7ef867fbb8a3a6261659a785
SHA145372c4e986a78a8e73e52244fd2c492f5e69aed
SHA25604d0a0003002a38e8c44cb95f425070ccffa845c931ba06d40ad2a2087806f17
SHA5120363f961ea791bb3e6d119695a0d7ee505927b9e7a4462ba727e7bd1db8ce1658c3540f1af18c9df9c9fcde5a8b103b6cd4f78a3cb5e8a85387d58a90d543d83
-
Filesize
128KB
MD502770ec1a321e19ddd06cdb29d69ffe3
SHA1d51b0b4d5de7a3c64dd320cfddd06614a2ab7af2
SHA25672424cc8831eccd132639f5a2b6541c9bb2d638baf4397186a984bc353b7b579
SHA512d816faa1abdee5c0879a4240b30abd156962a5dabb6d072bfcb84aae1d69d8c50ad8f8519db1db9a6fbdeee8a10c643f110800aed1c84957573501bcae178d4f
-
Filesize
1.4MB
MD5d6b05020d4a0ec2a3a8b687099e335df
SHA1df239d830ebcd1cde5c68c46a7b76dad49d415f4
SHA2569824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a
SHA51278fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff
-
Filesize
1.4MB
MD5d6b05020d4a0ec2a3a8b687099e335df
SHA1df239d830ebcd1cde5c68c46a7b76dad49d415f4
SHA2569824b98dab6af65a9e84c2ea40e9df948f9766ce2096e81feecad7db8dd6080a
SHA51278fd360faa4d34f5732056d6e9ad7b9930964441c69cf24535845d397de92179553b9377a25649c01eb5ac7d547c29cc964e69ede7f2af9fc677508a99251fff
-
Filesize
163KB
MD515f781d9227b97526e51e26774a5baa3
SHA1097895f17b95e8f019d420813b1bcbb9f28aaa79
SHA256e35135df33f980846f8e56062d8e4b84180b8fcaead1ec22af2749747fb993c3
SHA512d1f94a08f61c8d7007cb1537258299ff6e2c2f94c0fc1ad2816d6bc5b5f91cf3e5f7ecaa2f16cfc556e00c3849674abc5a39c0c2346891534adb4b948ec5f527
-
Filesize
163KB
MD57d9fe2939f9903a5933097cb710b56fd
SHA1dce04662e10cd65624f4c43f3c51096ba9e86a69
SHA25680233a4c2e5015b1857ba54678b2930f887d64d2a8c434fb07238de643c9ace6
SHA5127ab50500ff3e031b409e1e4cf12c0811108cae8a04c523f861d2595327cc25dc0dea31234baf86ee58e875dab0461361e63295210c176ed70e05143879e85d91
-
Filesize
163KB
MD5bf843cdbe55184af374ddde3e4c2f585
SHA1126a9a4fcfe7ffa38a4b427ef157821a58205298
SHA256011ff6472327e28f08535d5268084dea4797419e0d9518363c199d47e2a396c4
SHA5120cb37619ebda8aa2e2c870ab44455c8e9f7d68373ba7d2f1fef9b2379f41fa895b31fdf721e749867e56c1af0cc8fb7eaa95eb1b80638a17827860557a316ee5
-
Filesize
163KB
MD55553a6abb82835b486d6a3a6ef0354bc
SHA1d648e45ffb02cd07a8f6971f339bdc32f47bcf9d
SHA256de1cbfe359763c73594919c1d705523c829558aff08377f8962ca152ec77b2e2
SHA512d43f4756d18a93dd69ab1f83dd213c953508b2fb916273a5df4a5a12df8dafe55ce71cd19a4c9665bc0256a9f81012732a8817612b2c77efac824502abb79f96
-
Filesize
163KB
MD5e80190575c28aa3e4257b8f26671ab7c
SHA1a2965988160b5f5bea8f777906576fa87332c28e
SHA2560c7a7db3dfae4796768862843804b25219227df4b6418e78b20c2a0ec646302e
SHA512d04e504110510816dcdc6639f4db68aba1f56770c457a551ac6bd2a12539f8379b6ce1f030b3d19aa1bdc2e4058940ab5b00e6fc86c6bd1c5e00efedf3343521
-
Filesize
65B
MD564acfa7e03b01f48294cf30d201a0026
SHA110facd995b38a095f30b4a800fa454c0bcbf8438
SHA256ba8159d865d106e7b4d0043007a63d1541e1de455dc8d7ff0edd3013bd425c62
SHA51265a9b2e639de74a2a7faa83463a03f5f5b526495e3c793ec1e144c422ed0b842dd304cd5ff4f8aec3d76d826507030c5916f70a231429cea636ec2d8ab43931a
-
Filesize
163KB
MD59a7ac134bffe049516293c67d8c966e0
SHA1a4ee5f5b1cfbd83b482f71956f0d455ef84d4d33
SHA256075d5aa9bb02925428c4a80e3d28c9d121b1169752744455f8f199bb20cf2fd5
SHA512a2ff94c7e5182cdd639ce7b423ede5a8f5667e8921f792d146948fa4ef1a70442857fa30225f626cb1fc57824e522fe2a2e9b823ee8a815347d40585ae875fcf
-
Filesize
163KB
MD5d2f9d2f93f24c60aa8109e65cad5a1e6
SHA171f26dbb443d25ce723bc633b0f6cd497d31c694
SHA256a8a10e2f1865fe4b7a2cac3078f3e260344ca4c3f78adfaa9cff9f39daacf7e3
SHA512730aa3a345e7e77d9f0d5b940215c6b4007a1ed8f1d63fcc87e7c66ecf62ee688e9000a3eba91d109e9abf12ba8e6ca941cab7d2eec815eda572b87b85b334a0
-
Filesize
163KB
MD57d9fe2939f9903a5933097cb710b56fd
SHA1dce04662e10cd65624f4c43f3c51096ba9e86a69
SHA25680233a4c2e5015b1857ba54678b2930f887d64d2a8c434fb07238de643c9ace6
SHA5127ab50500ff3e031b409e1e4cf12c0811108cae8a04c523f861d2595327cc25dc0dea31234baf86ee58e875dab0461361e63295210c176ed70e05143879e85d91
-
Filesize
163KB
MD5bf843cdbe55184af374ddde3e4c2f585
SHA1126a9a4fcfe7ffa38a4b427ef157821a58205298
SHA256011ff6472327e28f08535d5268084dea4797419e0d9518363c199d47e2a396c4
SHA5120cb37619ebda8aa2e2c870ab44455c8e9f7d68373ba7d2f1fef9b2379f41fa895b31fdf721e749867e56c1af0cc8fb7eaa95eb1b80638a17827860557a316ee5
-
Filesize
163KB
MD5bf843cdbe55184af374ddde3e4c2f585
SHA1126a9a4fcfe7ffa38a4b427ef157821a58205298
SHA256011ff6472327e28f08535d5268084dea4797419e0d9518363c199d47e2a396c4
SHA5120cb37619ebda8aa2e2c870ab44455c8e9f7d68373ba7d2f1fef9b2379f41fa895b31fdf721e749867e56c1af0cc8fb7eaa95eb1b80638a17827860557a316ee5
-
Filesize
163KB
MD5bf843cdbe55184af374ddde3e4c2f585
SHA1126a9a4fcfe7ffa38a4b427ef157821a58205298
SHA256011ff6472327e28f08535d5268084dea4797419e0d9518363c199d47e2a396c4
SHA5120cb37619ebda8aa2e2c870ab44455c8e9f7d68373ba7d2f1fef9b2379f41fa895b31fdf721e749867e56c1af0cc8fb7eaa95eb1b80638a17827860557a316ee5
-
Filesize
163KB
MD555c78b2ff4ff109e7d3f8a9136b47386
SHA14a241ee320035afe0e22b6cc6cda160e3a6f9d2e
SHA2560d904bdfc4e7f46bee11e3a08d9ea8715300e741d3be463eaeb43262c09eeac0
SHA5121f7c2b823ffa5ef523484033daea70a478b5a959799f2b353a2707768beba85760925ce87fc9a20877ca4834087db9db6917ab9e06650c29c3b2b6c0386c369f
-
Filesize
163KB
MD5a0ff62adfa3b5a3816dcc4d402acd91b
SHA103cdfb75136649c48b571c0aec541273297e9364
SHA256d251b5b4effccd990a1d39cdb1cc9fe3c1c9469df3490d17ce20dda83a614b9c
SHA5121ce63ddaa9127994940e5321900ff95159ec47cb6ee76b53ac0e5d63ca317f6975ab4e65cd31c64d6ef329fcec779b8f36cf3880ffa67bbea9796be35dbe9a7c
-
Filesize
163KB
MD57d9fe2939f9903a5933097cb710b56fd
SHA1dce04662e10cd65624f4c43f3c51096ba9e86a69
SHA25680233a4c2e5015b1857ba54678b2930f887d64d2a8c434fb07238de643c9ace6
SHA5127ab50500ff3e031b409e1e4cf12c0811108cae8a04c523f861d2595327cc25dc0dea31234baf86ee58e875dab0461361e63295210c176ed70e05143879e85d91
-
Filesize
163KB
MD5bf843cdbe55184af374ddde3e4c2f585
SHA1126a9a4fcfe7ffa38a4b427ef157821a58205298
SHA256011ff6472327e28f08535d5268084dea4797419e0d9518363c199d47e2a396c4
SHA5120cb37619ebda8aa2e2c870ab44455c8e9f7d68373ba7d2f1fef9b2379f41fa895b31fdf721e749867e56c1af0cc8fb7eaa95eb1b80638a17827860557a316ee5
-
Filesize
163KB
MD5f883a5f4c22d2d837f8d3c2c817a9cd9
SHA1a173b4e902bae90551255daa6aaf6a40ec8a8507
SHA256d07910bb3d4414d4083bdd5e45c43db80b76a9ca9e5c5545718d0f0eb1f04b51
SHA512f6ebe2cef0c2cefac6128885eda5692db567ea0599384522e5045b3cabff4793b277b7c5e728d15a7681fb196c5040adcb18882b1809338fdf27cd2ad02791ef
-
Filesize
163KB
MD5472d66d76f673aa1c41db0b673e65dc5
SHA174ef411c2e0e69448807159330184c44c203f898
SHA2560908936e5d8556757d541ad8125889241fe3ee62386a16310be706c523be0810
SHA512ebdb4c3ed842a1060deb108f2f04cb7df85a2c62c4de94521c18dbe3b384de1b85f476630816b69136bf1f190a1f3caf93462fdba3868c9825c807eb8eb0cf83
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
163KB
MD5ad7c29ce73b8e2077ef958c8422e0cb9
SHA15e3808ca4cf8596345db27d79d77424f57b5540e
SHA25622f1380011a6be9eb28b489e596df4e2dbe3461518a3efe88d1a39e18c744156
SHA5127574611f9f097e6a55e4499d73005a6ecfb719e868f010aef8c2aaf2adf23917b4af7ad1d9bccd34f55e93fd23de81fc8a9dfe809baf3d586e1293d926f4d918
-
Filesize
163KB
MD56b7f4f9df106855d38a6f44691b77114
SHA1dae156e009b6fd96d994d9d20ba86fcdadb68886
SHA2563c07be718001281ce9c7d604afdc702282da4e65c82abd66c6a4f50e20bd968c
SHA5120c35a78b49b94479517b9be3f615e083c416d3bb847d909d8b0fdf028cf34adaeb124e4024db8a91e6fdb1f28d4473605fe99143f2411e0e4b2388920fda4e6f
-
Filesize
163KB
MD56b7f4f9df106855d38a6f44691b77114
SHA1dae156e009b6fd96d994d9d20ba86fcdadb68886
SHA2563c07be718001281ce9c7d604afdc702282da4e65c82abd66c6a4f50e20bd968c
SHA5120c35a78b49b94479517b9be3f615e083c416d3bb847d909d8b0fdf028cf34adaeb124e4024db8a91e6fdb1f28d4473605fe99143f2411e0e4b2388920fda4e6f
-
Filesize
163KB
MD56b7f4f9df106855d38a6f44691b77114
SHA1dae156e009b6fd96d994d9d20ba86fcdadb68886
SHA2563c07be718001281ce9c7d604afdc702282da4e65c82abd66c6a4f50e20bd968c
SHA5120c35a78b49b94479517b9be3f615e083c416d3bb847d909d8b0fdf028cf34adaeb124e4024db8a91e6fdb1f28d4473605fe99143f2411e0e4b2388920fda4e6f
-
Filesize
163KB
MD56b7f4f9df106855d38a6f44691b77114
SHA1dae156e009b6fd96d994d9d20ba86fcdadb68886
SHA2563c07be718001281ce9c7d604afdc702282da4e65c82abd66c6a4f50e20bd968c
SHA5120c35a78b49b94479517b9be3f615e083c416d3bb847d909d8b0fdf028cf34adaeb124e4024db8a91e6fdb1f28d4473605fe99143f2411e0e4b2388920fda4e6f
-
Filesize
163KB
MD57d9fe2939f9903a5933097cb710b56fd
SHA1dce04662e10cd65624f4c43f3c51096ba9e86a69
SHA25680233a4c2e5015b1857ba54678b2930f887d64d2a8c434fb07238de643c9ace6
SHA5127ab50500ff3e031b409e1e4cf12c0811108cae8a04c523f861d2595327cc25dc0dea31234baf86ee58e875dab0461361e63295210c176ed70e05143879e85d91
-
Filesize
163KB
MD57d9fe2939f9903a5933097cb710b56fd
SHA1dce04662e10cd65624f4c43f3c51096ba9e86a69
SHA25680233a4c2e5015b1857ba54678b2930f887d64d2a8c434fb07238de643c9ace6
SHA5127ab50500ff3e031b409e1e4cf12c0811108cae8a04c523f861d2595327cc25dc0dea31234baf86ee58e875dab0461361e63295210c176ed70e05143879e85d91
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
163KB
MD5fc5062bc7ef867fbb8a3a6261659a785
SHA145372c4e986a78a8e73e52244fd2c492f5e69aed
SHA25604d0a0003002a38e8c44cb95f425070ccffa845c931ba06d40ad2a2087806f17
SHA5120363f961ea791bb3e6d119695a0d7ee505927b9e7a4462ba727e7bd1db8ce1658c3540f1af18c9df9c9fcde5a8b103b6cd4f78a3cb5e8a85387d58a90d543d83
-
Filesize
163KB
MD5fc5062bc7ef867fbb8a3a6261659a785
SHA145372c4e986a78a8e73e52244fd2c492f5e69aed
SHA25604d0a0003002a38e8c44cb95f425070ccffa845c931ba06d40ad2a2087806f17
SHA5120363f961ea791bb3e6d119695a0d7ee505927b9e7a4462ba727e7bd1db8ce1658c3540f1af18c9df9c9fcde5a8b103b6cd4f78a3cb5e8a85387d58a90d543d83
-
Filesize
163KB
MD5fc5062bc7ef867fbb8a3a6261659a785
SHA145372c4e986a78a8e73e52244fd2c492f5e69aed
SHA25604d0a0003002a38e8c44cb95f425070ccffa845c931ba06d40ad2a2087806f17
SHA5120363f961ea791bb3e6d119695a0d7ee505927b9e7a4462ba727e7bd1db8ce1658c3540f1af18c9df9c9fcde5a8b103b6cd4f78a3cb5e8a85387d58a90d543d83
-
Filesize
163KB
MD5fc5062bc7ef867fbb8a3a6261659a785
SHA145372c4e986a78a8e73e52244fd2c492f5e69aed
SHA25604d0a0003002a38e8c44cb95f425070ccffa845c931ba06d40ad2a2087806f17
SHA5120363f961ea791bb3e6d119695a0d7ee505927b9e7a4462ba727e7bd1db8ce1658c3540f1af18c9df9c9fcde5a8b103b6cd4f78a3cb5e8a85387d58a90d543d83
-
Filesize
163KB
MD5fc5062bc7ef867fbb8a3a6261659a785
SHA145372c4e986a78a8e73e52244fd2c492f5e69aed
SHA25604d0a0003002a38e8c44cb95f425070ccffa845c931ba06d40ad2a2087806f17
SHA5120363f961ea791bb3e6d119695a0d7ee505927b9e7a4462ba727e7bd1db8ce1658c3540f1af18c9df9c9fcde5a8b103b6cd4f78a3cb5e8a85387d58a90d543d83
-
Filesize
163KB
MD5fc5062bc7ef867fbb8a3a6261659a785
SHA145372c4e986a78a8e73e52244fd2c492f5e69aed
SHA25604d0a0003002a38e8c44cb95f425070ccffa845c931ba06d40ad2a2087806f17
SHA5120363f961ea791bb3e6d119695a0d7ee505927b9e7a4462ba727e7bd1db8ce1658c3540f1af18c9df9c9fcde5a8b103b6cd4f78a3cb5e8a85387d58a90d543d83
-
Filesize
163KB
MD5bf843cdbe55184af374ddde3e4c2f585
SHA1126a9a4fcfe7ffa38a4b427ef157821a58205298
SHA256011ff6472327e28f08535d5268084dea4797419e0d9518363c199d47e2a396c4
SHA5120cb37619ebda8aa2e2c870ab44455c8e9f7d68373ba7d2f1fef9b2379f41fa895b31fdf721e749867e56c1af0cc8fb7eaa95eb1b80638a17827860557a316ee5
-
Filesize
163KB
MD5bf843cdbe55184af374ddde3e4c2f585
SHA1126a9a4fcfe7ffa38a4b427ef157821a58205298
SHA256011ff6472327e28f08535d5268084dea4797419e0d9518363c199d47e2a396c4
SHA5120cb37619ebda8aa2e2c870ab44455c8e9f7d68373ba7d2f1fef9b2379f41fa895b31fdf721e749867e56c1af0cc8fb7eaa95eb1b80638a17827860557a316ee5