Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:11

General

  • Target

    dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe

  • Size

    10.4MB

  • MD5

    46ac7a29d572cb9b4ebc44a71b5b2ba6

  • SHA1

    fc779839ebe405098dc5f986386323bd6444eb4a

  • SHA256

    dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568

  • SHA512

    c02abd7eae2767d54ce872f0d3fcd483a978b9754e208cf93048337ca34a9e401cb1ba4552a08d9e39b237c77e6860ab39d0eb7cae12ad5f472f219faff2d3a2

  • SSDEEP

    196608:XZGmuwsR2/LGPLCXOKODxH5qFlXS47dV2MANpvrjVbEKGWIoS:XZGnwsREJLODBWlX3d+NpvdHIo

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 18 IoCs
  • Loads dropped DLL 18 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of SetWindowsHookEx 40 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe
    "C:\Users\Admin\AppData\Local\Temp\dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe
      C:\Users\Admin\AppData\Local\Temp\dd388f43ca205426bb89c6f0f241ccd5bdd9e14bb032b7680fdf80984a41d568.exe update ymtvadgkbn.exe
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2200
    • C:\Users\Admin\AppData\Local\Temp\ymtvadgkbn.exe
      C:\Users\Admin\AppData\Local\Temp\ymtvadgkbn.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\ymtvadgkbn.exe
        C:\Users\Admin\AppData\Local\Temp\ymtvadgkbn.exe update gtclfmatcb.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2916
      • C:\Users\Admin\AppData\Local\Temp\gtclfmatcb.exe
        C:\Users\Admin\AppData\Local\Temp\gtclfmatcb.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3032
        • C:\Users\Admin\AppData\Local\Temp\gtclfmatcb.exe
          C:\Users\Admin\AppData\Local\Temp\gtclfmatcb.exe update nxlgcniflu.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:2852
        • C:\Users\Admin\AppData\Local\Temp\nxlgcniflu.exe
          C:\Users\Admin\AppData\Local\Temp\nxlgcniflu.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2656
          • C:\Users\Admin\AppData\Local\Temp\nxlgcniflu.exe
            C:\Users\Admin\AppData\Local\Temp\nxlgcniflu.exe update vpuoiypsbd.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:2664
          • C:\Users\Admin\AppData\Local\Temp\vpuoiypsbd.exe
            C:\Users\Admin\AppData\Local\Temp\vpuoiypsbd.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2424
            • C:\Users\Admin\AppData\Local\Temp\vpuoiypsbd.exe
              C:\Users\Admin\AppData\Local\Temp\vpuoiypsbd.exe update shbkjivcxp.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              PID:1496
            • C:\Users\Admin\AppData\Local\Temp\shbkjivcxp.exe
              C:\Users\Admin\AppData\Local\Temp\shbkjivcxp.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2112
              • C:\Users\Admin\AppData\Local\Temp\shbkjivcxp.exe
                C:\Users\Admin\AppData\Local\Temp\shbkjivcxp.exe update tmzkwfbgvv.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:1680
              • C:\Users\Admin\AppData\Local\Temp\tmzkwfbgvv.exe
                C:\Users\Admin\AppData\Local\Temp\tmzkwfbgvv.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2840
                • C:\Users\Admin\AppData\Local\Temp\tmzkwfbgvv.exe
                  C:\Users\Admin\AppData\Local\Temp\tmzkwfbgvv.exe update eygtidilym.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of SetWindowsHookEx
                  PID:1788
                • C:\Users\Admin\AppData\Local\Temp\eygtidilym.exe
                  C:\Users\Admin\AppData\Local\Temp\eygtidilym.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:492
                  • C:\Users\Admin\AppData\Local\Temp\eygtidilym.exe
                    C:\Users\Admin\AppData\Local\Temp\eygtidilym.exe update hjjzfaoqkk.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of SetWindowsHookEx
                    PID:2016
                  • C:\Users\Admin\AppData\Local\Temp\hjjzfaoqkk.exe
                    C:\Users\Admin\AppData\Local\Temp\hjjzfaoqkk.exe
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of SetWindowsHookEx
                    PID:584
                    • C:\Users\Admin\AppData\Local\Temp\hjjzfaoqkk.exe
                      C:\Users\Admin\AppData\Local\Temp\hjjzfaoqkk.exe update towndamhvb.exe
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of SetWindowsHookEx
                      PID:2472
                    • C:\Users\Admin\AppData\Local\Temp\towndamhvb.exe
                      C:\Users\Admin\AppData\Local\Temp\towndamhvb.exe
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of SetWindowsHookEx
                      PID:2148
                      • C:\Users\Admin\AppData\Local\Temp\towndamhvb.exe
                        C:\Users\Admin\AppData\Local\Temp\towndamhvb.exe update snfdimnvzw.exe
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of SetWindowsHookEx
                        PID:1088
                      • C:\Users\Admin\AppData\Local\Temp\snfdimnvzw.exe
                        C:\Users\Admin\AppData\Local\Temp\snfdimnvzw.exe
                        11⤵
                          PID:2044
                          • C:\Users\Admin\AppData\Local\Temp\snfdimnvzw.exe
                            C:\Users\Admin\AppData\Local\Temp\snfdimnvzw.exe update gmteaihsqn.exe
                            12⤵
                              PID:1928
                            • C:\Users\Admin\AppData\Local\Temp\gmteaihsqn.exe
                              C:\Users\Admin\AppData\Local\Temp\gmteaihsqn.exe
                              12⤵
                                PID:1352
                                • C:\Users\Admin\AppData\Local\Temp\gmteaihsqn.exe
                                  C:\Users\Admin\AppData\Local\Temp\gmteaihsqn.exe update ctnumeldnq.exe
                                  13⤵
                                    PID:1616
                                  • C:\Users\Admin\AppData\Local\Temp\ctnumeldnq.exe
                                    C:\Users\Admin\AppData\Local\Temp\ctnumeldnq.exe
                                    13⤵
                                      PID:588
                                      • C:\Users\Admin\AppData\Local\Temp\ctnumeldnq.exe
                                        C:\Users\Admin\AppData\Local\Temp\ctnumeldnq.exe update ylqijylvxy.exe
                                        14⤵
                                          PID:1712
                                        • C:\Users\Admin\AppData\Local\Temp\ylqijylvxy.exe
                                          C:\Users\Admin\AppData\Local\Temp\ylqijylvxy.exe
                                          14⤵
                                            PID:2216
                                            • C:\Users\Admin\AppData\Local\Temp\ylqijylvxy.exe
                                              C:\Users\Admin\AppData\Local\Temp\ylqijylvxy.exe update vasoshnxoi.exe
                                              15⤵
                                                PID:2116
                                              • C:\Users\Admin\AppData\Local\Temp\vasoshnxoi.exe
                                                C:\Users\Admin\AppData\Local\Temp\vasoshnxoi.exe
                                                15⤵
                                                  PID:888
                                                  • C:\Users\Admin\AppData\Local\Temp\vasoshnxoi.exe
                                                    C:\Users\Admin\AppData\Local\Temp\vasoshnxoi.exe update urneldetka.exe
                                                    16⤵
                                                      PID:2548
                                                    • C:\Users\Admin\AppData\Local\Temp\urneldetka.exe
                                                      C:\Users\Admin\AppData\Local\Temp\urneldetka.exe
                                                      16⤵
                                                        PID:1596
                                                        • C:\Users\Admin\AppData\Local\Temp\urneldetka.exe
                                                          C:\Users\Admin\AppData\Local\Temp\urneldetka.exe update tfkcbljvhk.exe
                                                          17⤵
                                                            PID:2496
                                                          • C:\Users\Admin\AppData\Local\Temp\tfkcbljvhk.exe
                                                            C:\Users\Admin\AppData\Local\Temp\tfkcbljvhk.exe
                                                            17⤵
                                                              PID:2784
                                                              • C:\Users\Admin\AppData\Local\Temp\tfkcbljvhk.exe
                                                                C:\Users\Admin\AppData\Local\Temp\tfkcbljvhk.exe update hamprdwxmn.exe
                                                                18⤵
                                                                  PID:2756
                                                                • C:\Users\Admin\AppData\Local\Temp\hamprdwxmn.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\hamprdwxmn.exe
                                                                  18⤵
                                                                    PID:2824
                                                                    • C:\Users\Admin\AppData\Local\Temp\hamprdwxmn.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\hamprdwxmn.exe update nseyycpcwu.exe
                                                                      19⤵
                                                                        PID:2768
                                                                      • C:\Users\Admin\AppData\Local\Temp\nseyycpcwu.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\nseyycpcwu.exe
                                                                        19⤵
                                                                          PID:2596
                                                                          • C:\Users\Admin\AppData\Local\Temp\nseyycpcwu.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\nseyycpcwu.exe update mjwzwazpoi.exe
                                                                            20⤵
                                                                              PID:2652
                                                                            • C:\Users\Admin\AppData\Local\Temp\mjwzwazpoi.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\mjwzwazpoi.exe
                                                                              20⤵
                                                                                PID:1992
                                                                                • C:\Users\Admin\AppData\Local\Temp\mjwzwazpoi.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\mjwzwazpoi.exe update fzisjvfslp.exe
                                                                                  21⤵
                                                                                    PID:2108
                                                                                  • C:\Users\Admin\AppData\Local\Temp\fzisjvfslp.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\fzisjvfslp.exe
                                                                                    21⤵
                                                                                      PID:3012
                                                                                      • C:\Users\Admin\AppData\Local\Temp\fzisjvfslp.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\fzisjvfslp.exe update cncxbdamch.exe
                                                                                        22⤵
                                                                                          PID:2856
                                                                                        • C:\Users\Admin\AppData\Local\Temp\cncxbdamch.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\cncxbdamch.exe
                                                                                          22⤵
                                                                                            PID:2328
                                                                                            • C:\Users\Admin\AppData\Local\Temp\cncxbdamch.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\cncxbdamch.exe update vsbrinpzgy.exe
                                                                                              23⤵
                                                                                                PID:2972
                                                                                              • C:\Users\Admin\AppData\Local\Temp\vsbrinpzgy.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\vsbrinpzgy.exe
                                                                                                23⤵
                                                                                                  PID:680
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\vsbrinpzgy.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\vsbrinpzgy.exe update cktrpuimye.exe
                                                                                                    24⤵
                                                                                                      PID:396
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\cktrpuimye.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\cktrpuimye.exe
                                                                                                      24⤵
                                                                                                        PID:1940
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\cktrpuimye.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\cktrpuimye.exe update prusuxmbpf.exe
                                                                                                          25⤵
                                                                                                            PID:372
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\prusuxmbpf.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\prusuxmbpf.exe
                                                                                                            25⤵
                                                                                                              PID:2424
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\prusuxmbpf.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\prusuxmbpf.exe update ywqbuoldzj.exe
                                                                                                                26⤵
                                                                                                                  PID:2476
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ywqbuoldzj.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\ywqbuoldzj.exe
                                                                                                                  26⤵
                                                                                                                    PID:1916
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ywqbuoldzj.exe
                                                                                                                      C:\Users\Admin\AppData\Local\Temp\ywqbuoldzj.exe update touhkeomkw.exe
                                                                                                                      27⤵
                                                                                                                        PID:1204
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\touhkeomkw.exe
                                                                                                                        C:\Users\Admin\AppData\Local\Temp\touhkeomkw.exe
                                                                                                                        27⤵
                                                                                                                          PID:1004
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\touhkeomkw.exe
                                                                                                                            C:\Users\Admin\AppData\Local\Temp\touhkeomkw.exe update pofpebgjwn.exe
                                                                                                                            28⤵
                                                                                                                              PID:1740
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\pofpebgjwn.exe
                                                                                                                              C:\Users\Admin\AppData\Local\Temp\pofpebgjwn.exe
                                                                                                                              28⤵
                                                                                                                                PID:1828
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\pofpebgjwn.exe
                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\pofpebgjwn.exe update zlpbxrdauz.exe
                                                                                                                                  29⤵
                                                                                                                                    PID:2428
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\zlpbxrdauz.exe
                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\zlpbxrdauz.exe
                                                                                                                                    29⤵
                                                                                                                                      PID:880
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\zlpbxrdauz.exe
                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\zlpbxrdauz.exe update ryzmfkvcmf.exe
                                                                                                                                        30⤵
                                                                                                                                          PID:2840
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ryzmfkvcmf.exe
                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\ryzmfkvcmf.exe
                                                                                                                                          30⤵
                                                                                                                                            PID:316
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\ryzmfkvcmf.exe
                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\ryzmfkvcmf.exe update ucdkwzelbz.exe
                                                                                                                                              31⤵
                                                                                                                                                PID:1720
                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\ucdkwzelbz.exe
                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\ucdkwzelbz.exe
                                                                                                                                                31⤵
                                                                                                                                                  PID:1952
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ucdkwzelbz.exe
                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\ucdkwzelbz.exe update fvmyfpfuhn.exe
                                                                                                                                                    32⤵
                                                                                                                                                      PID:1660
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\fvmyfpfuhn.exe
                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\fvmyfpfuhn.exe
                                                                                                                                                      32⤵
                                                                                                                                                        PID:2400
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\fvmyfpfuhn.exe
                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\fvmyfpfuhn.exe update rdyjuwvgsn.exe
                                                                                                                                                          33⤵
                                                                                                                                                            PID:2072
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\rdyjuwvgsn.exe
                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\rdyjuwvgsn.exe
                                                                                                                                                            33⤵
                                                                                                                                                              PID:1592
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\rdyjuwvgsn.exe
                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\rdyjuwvgsn.exe update ugdrfqogwt.exe
                                                                                                                                                                34⤵
                                                                                                                                                                  PID:2732
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ugdrfqogwt.exe
                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\ugdrfqogwt.exe
                                                                                                                                                                  34⤵
                                                                                                                                                                    PID:588
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\ugdrfqogwt.exe
                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\ugdrfqogwt.exe update xdxsrtvkgu.exe
                                                                                                                                                                      35⤵
                                                                                                                                                                        PID:2796
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\xdxsrtvkgu.exe
                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\xdxsrtvkgu.exe
                                                                                                                                                                        35⤵
                                                                                                                                                                          PID:2228
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\xdxsrtvkgu.exe
                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\xdxsrtvkgu.exe update nbswutacgq.exe
                                                                                                                                                                            36⤵
                                                                                                                                                                              PID:2780
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\nbswutacgq.exe
                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\nbswutacgq.exe
                                                                                                                                                                              36⤵
                                                                                                                                                                                PID:2912
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\nbswutacgq.exe
                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\nbswutacgq.exe update aekpjtztfs.exe
                                                                                                                                                                                  37⤵
                                                                                                                                                                                    PID:2652
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\aekpjtztfs.exe
                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\aekpjtztfs.exe
                                                                                                                                                                                    37⤵
                                                                                                                                                                                      PID:2676
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\aekpjtztfs.exe
                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\aekpjtztfs.exe update iclxamoldq.exe
                                                                                                                                                                                        38⤵
                                                                                                                                                                                          PID:2404
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\iclxamoldq.exe
                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\iclxamoldq.exe
                                                                                                                                                                                          38⤵
                                                                                                                                                                                            PID:2876
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\iclxamoldq.exe
                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\iclxamoldq.exe update revwqhhobf.exe
                                                                                                                                                                                              39⤵
                                                                                                                                                                                                PID:2068
                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\revwqhhobf.exe
                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\revwqhhobf.exe
                                                                                                                                                                                                39⤵
                                                                                                                                                                                                  PID:1596
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\revwqhhobf.exe
                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\revwqhhobf.exe update mpirniyfai.exe
                                                                                                                                                                                                    40⤵
                                                                                                                                                                                                      PID:2960
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mpirniyfai.exe
                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\mpirniyfai.exe
                                                                                                                                                                                                      40⤵
                                                                                                                                                                                                        PID:984
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\mpirniyfai.exe
                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\mpirniyfai.exe update tzucblvncf.exe
                                                                                                                                                                                                          41⤵
                                                                                                                                                                                                            PID:2300
                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\tzucblvncf.exe
                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\tzucblvncf.exe
                                                                                                                                                                                                            41⤵
                                                                                                                                                                                                              PID:1792
                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tzucblvncf.exe
                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\tzucblvncf.exe update snbyqzdczw.exe
                                                                                                                                                                                                                42⤵
                                                                                                                                                                                                                  PID:2940
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\snbyqzdczw.exe
                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\snbyqzdczw.exe
                                                                                                                                                                                                                  42⤵
                                                                                                                                                                                                                    PID:2976
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\snbyqzdczw.exe
                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\snbyqzdczw.exe update drlwccutyk.exe
                                                                                                                                                                                                                      43⤵
                                                                                                                                                                                                                        PID:2504

                                                                                                                                  Network

                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                  Replay Monitor

                                                                                                                                  Loading Replay Monitor...

                                                                                                                                  Downloads

                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\ctnumeldnq.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    94a68ec25d35f1aa6fadc61a04cb44ce

                                                                                                                                    SHA1

                                                                                                                                    2157d61c3b525dbe8aa371fe31e9e9394c352a73

                                                                                                                                    SHA256

                                                                                                                                    8298a722c5ec742df46dc7ebc3bbae66ae3b476dad5c5fff3a31b17fef58bc60

                                                                                                                                    SHA512

                                                                                                                                    516ebb7705de51aa0f9a21d727732a945597119a2fa792268365bbc162868cde6790a9a4581ba55f74fd61a6c6b433844c6a1dbe36beeaf5ea902c3700821604

                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\hjjzfaoqkk.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    aa64d5a2f59e4d6657c676797e7f601d

                                                                                                                                    SHA1

                                                                                                                                    f130584b8a507c5b2471a1b2ae90feb6317efeef

                                                                                                                                    SHA256

                                                                                                                                    a8fa52e175fc88560fb91eec1c64d8568271e91ca3ef1efeb31e786d1e0c3c3d

                                                                                                                                    SHA512

                                                                                                                                    f01700a732142e2a0b90ba3dd5dd72497d6c47c8795a13e957136871907817e9b30aad00a118a16ae7a9234828836fc989eec4f41ff355daac20797680e490a0

                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\nxlgcniflu.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    1d706541a6f596a0f0bdb4c3ad30c994

                                                                                                                                    SHA1

                                                                                                                                    ed9a34e5b51c5259d136f709d29481a693df994c

                                                                                                                                    SHA256

                                                                                                                                    2fc87bf6331a8a0b2604f94619dcb83e3cb2c16a83752ccfe8cf5a8f2a5d4db0

                                                                                                                                    SHA512

                                                                                                                                    354e9cbf1313c291fdb58de05e9c2b7cb859e56cf9f90caf93a1ab303f069d6c56299517db683724bc65727efefa3c1e664af3a6fdf48cc5fc5f4f902c112432

                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\snfdimnvzw.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    e956de4cca2e370b63d0c1134136f868

                                                                                                                                    SHA1

                                                                                                                                    9945ef5bf427489593a1f470fe1cbbb554d90580

                                                                                                                                    SHA256

                                                                                                                                    b66bd637f1d3dff917f8d88a23f11d86c21e892b0006f7daf2b9dc67341a58fd

                                                                                                                                    SHA512

                                                                                                                                    04d6fc07c8d027f33cd0f7e3d22a16ff83c633ada54f185b54d2c358877e3e9388261dfdd4d3a17b3fc80882a19b230d6c02d47e3261323a91f9bb4f7aa86480

                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\towndamhvb.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    6bf5a612f4be6504e36e6a29cafb98e6

                                                                                                                                    SHA1

                                                                                                                                    5fc737536925bbf025650458d1fb0a1f85a73065

                                                                                                                                    SHA256

                                                                                                                                    3eb88e55d932d59e7609fa9a6598c7684dfda8b17a286b1ec4304a3a2fd6ea8f

                                                                                                                                    SHA512

                                                                                                                                    50be485c834eada8fbd0b5e77b62da09e3413229069f2b2461f2e417cb2799fb0e3b5fba2c3c4db3418e4d060ac7e6dec75271d28d26736786a89af50c113905

                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\update.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    572b7cd01fcebd4eae78850a4881895a

                                                                                                                                    SHA1

                                                                                                                                    309a4a8d98007289bf12bec59ff7dcb046899b7a

                                                                                                                                    SHA256

                                                                                                                                    c7c533436d0cd0d86dba1f8cbe7ae9e1cea1e07da75630741375f2d76831ce22

                                                                                                                                    SHA512

                                                                                                                                    a4506684bc2d704ba5bde87825a2495da6450c520d47dac8f03a811d4460fe7e5a9949bd20ddcd310ba334635c55e6ca4cf640148a8d2b998fdf699868e1f111

                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\update.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    9c4cc4a04afeb8a5df4e8cbac2cddfad

                                                                                                                                    SHA1

                                                                                                                                    cacc0eaf001f28e35b9241a88553a9456a522820

                                                                                                                                    SHA256

                                                                                                                                    1920fad5cfcf93488d4d8ab4355f9abe1afe7e50d7dc44da302480d7f30c0cf8

                                                                                                                                    SHA512

                                                                                                                                    5eacba9d2141ea6ecd7a2d34309ff1a0d36f986acae84934291abc100aff8ca22f7acd2f6152d0168aac4bfe13b818373f13a77258103cf979b7d11258d35a85

                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\update.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    985e1b6dcbe02dc400d813b7dcd467c1

                                                                                                                                    SHA1

                                                                                                                                    bcdecc00d415b88dade1162db48caf036173aa40

                                                                                                                                    SHA256

                                                                                                                                    ca57dc300f18463bcf139ee6f9c9d147be823299546bf6711eec55422d28e56b

                                                                                                                                    SHA512

                                                                                                                                    d2c1f0de046d90f14171da7ef4c04b1676f92f41d7c2a13fcd52725cb5240e1a2c98ee4b31ec6482f1ecf6e11dc14ed678094231c315cd977a7ddd30eb4caf29

                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\update.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    7f6d181fa9a8346b804035649c070291

                                                                                                                                    SHA1

                                                                                                                                    6f67921856fc3df898ed6e2bfba15de4926f0575

                                                                                                                                    SHA256

                                                                                                                                    1c66fb747fcffc4401a45add9e2824869059c1823c53b125f289ef860d013896

                                                                                                                                    SHA512

                                                                                                                                    fe397768d434b165382dc80c14aee0e8b244150c16f0ca330baa8393e50d73d3aa1f022483a851ae38e72a52c1769021ad347f18b8031e1a1fd9852a63938150

                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\update.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    52b5ecb7be08b004bcf211cdbded52a2

                                                                                                                                    SHA1

                                                                                                                                    dedbd86cd8219bebc1625b67889b01c762db711f

                                                                                                                                    SHA256

                                                                                                                                    7984176117af8e0b8ac7260f1bcc82d3bd5ccc93b1d9cb08985a26946f30c4e4

                                                                                                                                    SHA512

                                                                                                                                    eee875b91ce605ce64c78647f1431513216471ac162af89a46342439b48ba3dcfca98416a6a3cd4fffae0ccfd3184eae9644bfc654549549d3b524933c4f1540

                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\update.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    c414b8614b0ad9b81d51ea2c8378a72a

                                                                                                                                    SHA1

                                                                                                                                    c354f8808a24594a9818cbd47594be42dba8d0e4

                                                                                                                                    SHA256

                                                                                                                                    a7bbe07eb04c65b815555e7ee4528cf8e1c532300eb8fa8d79daceaada323b59

                                                                                                                                    SHA512

                                                                                                                                    4fc036288c0ff58a76ab0a4e6a6f99306962593f6ba124d6fb533ce24ed264a7905edddaa55ba70cd7b001066e12616156d71faed5e5a41d112add1171ff27b8

                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\update.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    02b12931ed4c695d899abe51da678e24

                                                                                                                                    SHA1

                                                                                                                                    83bcd29598f7aeb6e52dd924b2839c8f120f45d3

                                                                                                                                    SHA256

                                                                                                                                    d9d5b71afcf4159db85fec03066e31db782895be3bb6a0b41b9b4feb2ff9077c

                                                                                                                                    SHA512

                                                                                                                                    6d7181b2454d244dc79db1b4425bc7d755542ca87b93055e2899e6ee39344431f21ebbbee07de9cfdc1fc36e81ff8568265df6fe2fa24b5b2382bb2e6acdab06

                                                                                                                                  • \Users\Admin\AppData\Local\Temp\eygtidilym.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    b29a5b51c0d039ecb1bf5c7f7cc56f74

                                                                                                                                    SHA1

                                                                                                                                    549a76267e5ad4681b9efa040ebe37437584714e

                                                                                                                                    SHA256

                                                                                                                                    9837037b76c39f74b0323115774bc843ac2da8cf32132820502c9ee0d37eee4f

                                                                                                                                    SHA512

                                                                                                                                    8665892dfcde6224c5fd974034620d403aa476598c070b52b88389460758c720d67e19c33eed0a61da206e948ce8c16260b0deb2a02c20b1bd88e7e5452bb5e5

                                                                                                                                  • \Users\Admin\AppData\Local\Temp\gmteaihsqn.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    19d04c894a78638c9dfacec3e8fb9983

                                                                                                                                    SHA1

                                                                                                                                    a360d53012943b6f10083c2a23494f08e8442aec

                                                                                                                                    SHA256

                                                                                                                                    862b720c708d8e6a76427f22edbadb4b24d25417d1e274b8e59637ca36820dc6

                                                                                                                                    SHA512

                                                                                                                                    a0dca6bf5afe1d486fc317baaa67565b389f53d6832f1fb48a02bf299b59bd87e6697bc6291cbb0fc6f0dc0c1069ddd1e58885bcd5e9522f771565f6447955fa

                                                                                                                                  • \Users\Admin\AppData\Local\Temp\gtclfmatcb.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    2722e184a70052591eb4ef5c2a69bde5

                                                                                                                                    SHA1

                                                                                                                                    d2de64e16701966b3bfdc30b82ac1b34f1eb8311

                                                                                                                                    SHA256

                                                                                                                                    ac56639fbbddf4cf1b8ad161751137aa54fbe33b4ca9440da4cbc4bd06b83dc3

                                                                                                                                    SHA512

                                                                                                                                    bdef45ed80c9266fdbe2db27519d258ba2ccabc5a99adba878a61d99f6b011d12f4473ea182ca0453ee573f8485a88b87349315411ee13318b8d64b27240a1ae

                                                                                                                                  • \Users\Admin\AppData\Local\Temp\shbkjivcxp.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    cbeba64eef9227b95dd47cd7eb8ab273

                                                                                                                                    SHA1

                                                                                                                                    6ca1d5d06a8c64fa23985fc474a172545c02175e

                                                                                                                                    SHA256

                                                                                                                                    040fb051d058d6d141d8fc9135aef55f4a4ac6bbe9b9d396b4d33b60b8c58864

                                                                                                                                    SHA512

                                                                                                                                    317804db2d5e63c3f0a4921d0ea2202526fd7a7d7e39417145ddf1d61867ab197a80ba2d3758a14cde9689db5a13b6807322730ff64c5b457271ab1141b3f725

                                                                                                                                  • \Users\Admin\AppData\Local\Temp\tmzkwfbgvv.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    c4b0f6c6f99f23c46dea3c8868ce36bd

                                                                                                                                    SHA1

                                                                                                                                    78e20ae065ba8b2bf40dee3d43df046b498fcd5d

                                                                                                                                    SHA256

                                                                                                                                    c4f7346a1ac3a82dd8b7eec2e0bb3ed460155a47d62d1d26aa3becacc25e4e3d

                                                                                                                                    SHA512

                                                                                                                                    590bb37e6ad57910d9b3878299aafb26c2001544c0bcd5de6e5e1beaf89d38d6f273bf3faf91f73bc2a2a7431701a677c0b7b698a0b4e36b341aa522de9fdeec

                                                                                                                                  • \Users\Admin\AppData\Local\Temp\vpuoiypsbd.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    005ebc30627fe68cc0e8b50c7d1dc860

                                                                                                                                    SHA1

                                                                                                                                    ab18767fabdc52cf30f0f764eaf24e613cb17800

                                                                                                                                    SHA256

                                                                                                                                    76ec2e1a6ae3b57d7bf92fe42eda52625d9c23af61733d64b6380c2c3da020c7

                                                                                                                                    SHA512

                                                                                                                                    41424216a0b1f610aa626f2d12fc0fc944cfdfb024f3bd3788e1448d1b7ae658406447a8ae16255d1c90083cd12b830452f33da900717f4028bdcab53406db77

                                                                                                                                  • \Users\Admin\AppData\Local\Temp\ymtvadgkbn.exe

                                                                                                                                    Filesize

                                                                                                                                    10.4MB

                                                                                                                                    MD5

                                                                                                                                    c894b3d82bccd8d85774cd606bc81831

                                                                                                                                    SHA1

                                                                                                                                    68672fe7424cc23b63b8a10c36995183ec9f5293

                                                                                                                                    SHA256

                                                                                                                                    4f9ec60c3507c95f8e2efa27fbbcbe7afa4048bb470835bdc25b5b724e72527e

                                                                                                                                    SHA512

                                                                                                                                    23fad52ea7f940cf3972e1fc6798d115bf6526e409f31dd5ccee8cacf40530c0016da1d9e746436aebbcd216b7aed161ce43abf01f7d608b0564cf3fb34686b3

                                                                                                                                  • memory/1496-88-0x0000000000400000-0x0000000000E90000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    10.6MB

                                                                                                                                  • memory/1992-0-0x00000000005D7000-0x0000000000C65000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    6.6MB

                                                                                                                                  • memory/1992-5-0x00000000003B0000-0x00000000003B1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/1992-3-0x00000000003B0000-0x00000000003B1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/1992-1-0x00000000003B0000-0x00000000003B1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/1992-6-0x0000000000400000-0x0000000000E90000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    10.6MB

                                                                                                                                  • memory/1992-81-0x00000000005D7000-0x0000000000C65000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    6.6MB

                                                                                                                                  • memory/2200-11-0x0000000000230000-0x0000000000231000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/2200-15-0x0000000000400000-0x0000000000E90000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    10.6MB

                                                                                                                                  • memory/2200-9-0x0000000000230000-0x0000000000231000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/2200-13-0x0000000000400000-0x0000000000E90000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    10.6MB

                                                                                                                                  • memory/2200-12-0x0000000000400000-0x0000000000E90000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    10.6MB

                                                                                                                                  • memory/2424-78-0x0000000000400000-0x0000000000E90000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    10.6MB

                                                                                                                                  • memory/2656-60-0x0000000000400000-0x0000000000E90000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    10.6MB

                                                                                                                                  • memory/2664-68-0x0000000000400000-0x0000000000E90000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    10.6MB

                                                                                                                                  • memory/2804-23-0x00000000001C0000-0x00000000001C1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/2804-21-0x00000000001C0000-0x00000000001C1000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    4KB

                                                                                                                                  • memory/2804-24-0x0000000000400000-0x0000000000E90000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    10.6MB

                                                                                                                                  • memory/2852-50-0x0000000000400000-0x0000000000E90000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    10.6MB

                                                                                                                                  • memory/2916-32-0x0000000000400000-0x0000000000E90000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    10.6MB

                                                                                                                                  • memory/3032-42-0x0000000000400000-0x0000000000E90000-memory.dmp

                                                                                                                                    Filesize

                                                                                                                                    10.6MB