Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2024 08:55

General

  • Target

    2024-11-16_34f1848ac807a090bac1b287772889ce_hacktools_icedid_mimikatz.exe

  • Size

    9.9MB

  • MD5

    34f1848ac807a090bac1b287772889ce

  • SHA1

    c7d77d8b7c1dbff55d8ad27bb212491d4719732a

  • SHA256

    6599d925ddc758babd4f4afdbc8cf18ed2dceaeeca697b69b93b00b0731a87f4

  • SHA512

    9eff955ad62c0e0a8206d6edca33b902a840583cae26b30533381ef5bf74e72afba74c2283f9404d685985a7c9fabe7a1b03cffa0a43b12f77675e45e00203f7

  • SSDEEP

    196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (19141) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 10 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 27 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • UPX packed file 34 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:2120
      • C:\Windows\TEMP\dvfzrticv\lfbpkn.exe
        "C:\Windows\TEMP\dvfzrticv\lfbpkn.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4136
    • C:\Users\Admin\AppData\Local\Temp\2024-11-16_34f1848ac807a090bac1b287772889ce_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-11-16_34f1848ac807a090bac1b287772889ce_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3576
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\cbdnbivt\tmyfwky.exe
        2⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:4620
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2836
        • C:\Windows\cbdnbivt\tmyfwky.exe
          C:\Windows\cbdnbivt\tmyfwky.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3524
    • C:\Windows\cbdnbivt\tmyfwky.exe
      C:\Windows\cbdnbivt\tmyfwky.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4412
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4236
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1892
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1824
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:640
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3556
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4904
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3300
      • C:\Windows\SysWOW64\netsh.exe
        netsh ipsec static del all
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:1920
      • C:\Windows\SysWOW64\netsh.exe
        netsh ipsec static add policy name=Bastards description=FuckingBastards
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:4480
      • C:\Windows\SysWOW64\netsh.exe
        netsh ipsec static add filteraction name=BastardsList action=block
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:940
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Windows\itcctjlje\unptrtjvi\wpcap.exe /S
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\Windows\itcctjlje\unptrtjvi\wpcap.exe
          C:\Windows\itcctjlje\unptrtjvi\wpcap.exe /S
          3⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2544
          • C:\Windows\SysWOW64\net.exe
            net stop "Boundary Meter"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4136
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "Boundary Meter"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2556
          • C:\Windows\SysWOW64\net.exe
            net stop "TrueSight Meter"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:712
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "TrueSight Meter"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:208
          • C:\Windows\SysWOW64\net.exe
            net stop npf
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3604
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop npf
              5⤵
              • System Location Discovery: System Language Discovery
              PID:1092
          • C:\Windows\SysWOW64\net.exe
            net start npf
            4⤵
              PID:3504
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 start npf
                5⤵
                • System Location Discovery: System Language Discovery
                PID:388
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net start npf
          2⤵
          • System Location Discovery: System Language Discovery
          PID:4292
          • C:\Windows\SysWOW64\net.exe
            net start npf
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4188
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start npf
              4⤵
              • System Location Discovery: System Language Discovery
              PID:3632
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net start npf
          2⤵
            PID:4388
            • C:\Windows\SysWOW64\net.exe
              net start npf
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4484
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 start npf
                4⤵
                • System Location Discovery: System Language Discovery
                PID:4556
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\itcctjlje\unptrtjvi\Scant.txt
            2⤵
            • System Location Discovery: System Language Discovery
            PID:1200
            • C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe
              C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\itcctjlje\unptrtjvi\Scant.txt
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:928
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Windows\itcctjlje\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\itcctjlje\Corporate\log.txt
            2⤵
            • Drops file in Windows directory
            PID:1084
            • C:\Windows\itcctjlje\Corporate\vfshost.exe
              C:\Windows\itcctjlje\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
              3⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:1164
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "abdndmbcd" /ru system /tr "cmd /c C:\Windows\ime\tmyfwky.exe"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:2532
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
              • System Location Discovery: System Language Discovery
              PID:1944
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /sc minute /mo 1 /tn "abdndmbcd" /ru system /tr "cmd /c C:\Windows\ime\tmyfwky.exe"
              3⤵
              • System Location Discovery: System Language Discovery
              • Scheduled Task/Job: Scheduled Task
              PID:752
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "biicucyni" /ru system /tr "cmd /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:4872
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
                PID:4536
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /sc minute /mo 1 /tn "biicucyni" /ru system /tr "cmd /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F"
                3⤵
                • Scheduled Task/Job: Scheduled Task
                PID:4820
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tknlleieq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F"
              2⤵
                PID:1736
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                    PID:3200
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "tknlleieq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:3252
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:3064
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:1976
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:1884
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4000
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:3120
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2836
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:648
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4184
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2384
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:1640
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4236
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:3456
                • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                  C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 804 C:\Windows\TEMP\itcctjlje\804.dmp
                  2⤵
                  • Executes dropped EXE
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4220
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net stop SharedAccess
                  2⤵
                    PID:2964
                    • C:\Windows\SysWOW64\net.exe
                      net stop SharedAccess
                      3⤵
                        PID:1796
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop SharedAccess
                          4⤵
                            PID:4280
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c netsh firewall set opmode mode=disable
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:4388
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh firewall set opmode mode=disable
                          3⤵
                          • Modifies Windows Firewall
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:636
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c netsh Advfirewall set allprofiles state off
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:1440
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh Advfirewall set allprofiles state off
                          3⤵
                          • Modifies Windows Firewall
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:1504
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop MpsSvc
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:5052
                        • C:\Windows\SysWOW64\net.exe
                          net stop MpsSvc
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:1648
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop MpsSvc
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:4100
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop WinDefend
                        2⤵
                          PID:1836
                          • C:\Windows\SysWOW64\net.exe
                            net stop WinDefend
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:4148
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop WinDefend
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:2468
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c net stop wuauserv
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:3212
                          • C:\Windows\SysWOW64\net.exe
                            net stop wuauserv
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:2656
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop wuauserv
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:4804
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c sc config MpsSvc start= disabled
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:4520
                          • C:\Windows\SysWOW64\sc.exe
                            sc config MpsSvc start= disabled
                            3⤵
                            • Launches sc.exe
                            • System Location Discovery: System Language Discovery
                            PID:1728
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c sc config SharedAccess start= disabled
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:3920
                          • C:\Windows\SysWOW64\sc.exe
                            sc config SharedAccess start= disabled
                            3⤵
                            • Launches sc.exe
                            • System Location Discovery: System Language Discovery
                            PID:2628
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c sc config WinDefend start= disabled
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:5076
                          • C:\Windows\SysWOW64\sc.exe
                            sc config WinDefend start= disabled
                            3⤵
                            • Launches sc.exe
                            PID:4772
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c sc config wuauserv start= disabled
                          2⤵
                            PID:3624
                            • C:\Windows\SysWOW64\sc.exe
                              sc config wuauserv start= disabled
                              3⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:2380
                          • C:\Windows\TEMP\xohudmc.exe
                            C:\Windows\TEMP\xohudmc.exe
                            2⤵
                            • Executes dropped EXE
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            PID:1164
                          • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                            C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 372 C:\Windows\TEMP\itcctjlje\372.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1896
                          • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                            C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2120 C:\Windows\TEMP\itcctjlje\2120.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1556
                          • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                            C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2700 C:\Windows\TEMP\itcctjlje\2700.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4968
                          • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                            C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2992 C:\Windows\TEMP\itcctjlje\2992.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3904
                          • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                            C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3000 C:\Windows\TEMP\itcctjlje\3000.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3632
                          • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                            C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 624 C:\Windows\TEMP\itcctjlje\624.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3456
                          • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                            C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3828 C:\Windows\TEMP\itcctjlje\3828.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:652
                          • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                            C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3924 C:\Windows\TEMP\itcctjlje\3924.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1632
                          • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                            C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3984 C:\Windows\TEMP\itcctjlje\3984.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3656
                          • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                            C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 428 C:\Windows\TEMP\itcctjlje\428.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4520
                          • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                            C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3680 C:\Windows\TEMP\itcctjlje\3680.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3024
                          • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                            C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 4800 C:\Windows\TEMP\itcctjlje\4800.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3436
                          • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                            C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2244 C:\Windows\TEMP\itcctjlje\2244.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2744
                          • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                            C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 4576 C:\Windows\TEMP\itcctjlje\4576.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4252
                          • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                            C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2876 C:\Windows\TEMP\itcctjlje\2876.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2768
                          • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                            C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3932 C:\Windows\TEMP\itcctjlje\3932.dmp
                            2⤵
                            • Executes dropped EXE
                            • Modifies data under HKEY_USERS
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4756
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd.exe /c C:\Windows\itcctjlje\unptrtjvi\scan.bat
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:3476
                            • C:\Windows\itcctjlje\unptrtjvi\midctcinn.exe
                              midctcinn.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save
                              3⤵
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:744
                        • C:\Windows\SysWOW64\nspfoo.exe
                          C:\Windows\SysWOW64\nspfoo.exe
                          1⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of SetWindowsHookEx
                          PID:3228
                        • C:\Windows\system32\cmd.EXE
                          C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F
                          1⤵
                            PID:4620
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                              2⤵
                                PID:1696
                              • C:\Windows\system32\cacls.exe
                                cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F
                                2⤵
                                  PID:3912
                              • C:\Windows\system32\cmd.EXE
                                C:\Windows\system32\cmd.EXE /c C:\Windows\ime\tmyfwky.exe
                                1⤵
                                  PID:2088
                                  • C:\Windows\ime\tmyfwky.exe
                                    C:\Windows\ime\tmyfwky.exe
                                    2⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:4332
                                • C:\Windows\system32\cmd.EXE
                                  C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F
                                  1⤵
                                    PID:2956
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                      2⤵
                                        PID:4956
                                      • C:\Windows\system32\cacls.exe
                                        cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F
                                        2⤵
                                          PID:1336

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Windows\SysWOW64\Packet.dll

                                        Filesize

                                        95KB

                                        MD5

                                        86316be34481c1ed5b792169312673fd

                                        SHA1

                                        6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                        SHA256

                                        49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                        SHA512

                                        3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                      • C:\Windows\SysWOW64\wpcap.dll

                                        Filesize

                                        275KB

                                        MD5

                                        4633b298d57014627831ccac89a2c50b

                                        SHA1

                                        e5f449766722c5c25fa02b065d22a854b6a32a5b

                                        SHA256

                                        b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                        SHA512

                                        29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                      • C:\Windows\TEMP\dvfzrticv\config.json

                                        Filesize

                                        693B

                                        MD5

                                        f2d396833af4aea7b9afde89593ca56e

                                        SHA1

                                        08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                        SHA256

                                        d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                        SHA512

                                        2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                      • C:\Windows\TEMP\itcctjlje\2120.dmp

                                        Filesize

                                        4.2MB

                                        MD5

                                        e8aec1dac2d04c4bdaba4ac8b47fd882

                                        SHA1

                                        70c5dabafe51325b8fcdddebc7cac0ca6644f7b8

                                        SHA256

                                        3d53533e4c9dc44a6ddba669fb6af47d9c2ad6a24de46158631a7d5f4b75c27e

                                        SHA512

                                        f349344e760410ee7407e83134dc1005352c5b45a4f2e60113aeab16c3cd19243ccc216c22354408e0549e8889b84622ae146dcd83a6388e9d84868c3d17d85e

                                      • C:\Windows\TEMP\itcctjlje\2244.dmp

                                        Filesize

                                        8.6MB

                                        MD5

                                        d7b4d7dc9b05d27a90a517b756b1b66c

                                        SHA1

                                        dd28af7edeba6ae1b6f84d0a7861f947784c9a93

                                        SHA256

                                        6c81ca339947c23102a3e2b133837ef40ef671ffecd6b3ccb57b0f567b108105

                                        SHA512

                                        a49a5e8351abf86043ea903a7b5a7dee380daed70c45df4d358b445ae7dfa6d12422fcf795135b8a29b4dde3d1905e2e4029f15cd22dfdd97f3fc4ea133c6473

                                      • C:\Windows\TEMP\itcctjlje\2700.dmp

                                        Filesize

                                        7.5MB

                                        MD5

                                        a8012b468b51625efd8cb030adcb707d

                                        SHA1

                                        460b09e793d58ef375b9f2f7b83a5d4c3bfae853

                                        SHA256

                                        7f5d1516d7c38d058e28bc08d86ced8a1c61517916dc68b4f287b20a83d9223c

                                        SHA512

                                        b0d3f0adfa3220a8c55c9f2ac2c4d8e6b77b3aae8b767ffba6af170ce46d0b09562c060dff6457a1c819c38eba9313828186738fd7b75d624dc54e841b4ccd9e

                                      • C:\Windows\TEMP\itcctjlje\2992.dmp

                                        Filesize

                                        3.8MB

                                        MD5

                                        e3ff64b65624ac7dfeb7c2c2a12aa35e

                                        SHA1

                                        93563fdafe4b9bf8c81bb2055ce26cef7a53c068

                                        SHA256

                                        e0a4fb061619e6bb87072ddd9232dd5717286de142829097863889f89da69dc5

                                        SHA512

                                        4694dbeaf04b807bcd1dcbd3f9e0907d4c2ea59e605482f06ffc9d6335a7d07ed2729f5f45aca8c8d21495dd7c06367eaf5fd5d4ed935a8ef87c151dd54a2abf

                                      • C:\Windows\TEMP\itcctjlje\3000.dmp

                                        Filesize

                                        793KB

                                        MD5

                                        08bfc3067cf38a8ae384c160ba670856

                                        SHA1

                                        928493636b609e9976d5d78ce9d3877584319e16

                                        SHA256

                                        f90d2b1b7522cecae417d3c0f741f0b395094f9705f1e4c4e1357f86a4609998

                                        SHA512

                                        c71ccc1f3d738b6baeea54da0f83d42b60cc29f2300ea0c867420de338110f236e4813f1a33419136bb8e5ce13265bcb4247a02597e8fbe67af6f50b943ad641

                                      • C:\Windows\TEMP\itcctjlje\3680.dmp

                                        Filesize

                                        1.2MB

                                        MD5

                                        36a7b13cc780c74350355034610c5bdf

                                        SHA1

                                        e1cf7dbe1638b621300918016bf0b14dbe708b50

                                        SHA256

                                        91cb92f77aae6f2a8f97af9e6b67cd8edd259e5652102c4c15d45e600dac3e1f

                                        SHA512

                                        2d7c52166069a191ce6cbc5be1f20ffb382e71b12a4f98703bb50a6dffdb98c707dee8b24bfc7954bd2de29414bee3d72d3532ca011a281b8a2f13cb32c1e5f7

                                      • C:\Windows\TEMP\itcctjlje\372.dmp

                                        Filesize

                                        33.7MB

                                        MD5

                                        11153be953f878a2d951453017c289e6

                                        SHA1

                                        39c7a16bceb9bfd227eee9e4b33bae09cbf02d20

                                        SHA256

                                        852891f7e72df4e0dd518508d4fef45b55de435608d3d08db35b4986da9e0035

                                        SHA512

                                        3d9fd165cb4b6620120441b82518ea14e571def6d98fea0fea15b8f595e18e811f79bc792d956de5f3e5af8621486fc8aee80b5f44be09d782f969117cca5274

                                      • C:\Windows\TEMP\itcctjlje\3828.dmp

                                        Filesize

                                        2.5MB

                                        MD5

                                        65fd78b4f77e4f0aeacc930adc6de6f6

                                        SHA1

                                        659cbc2aa579a4971dbb5d5d1889cb05c8bd9a03

                                        SHA256

                                        ca75ad70f24cb70c92de9f90e1e442d68a81bfa2427886805a7dd823485190ca

                                        SHA512

                                        8f7d59c3ca02f599073d356a880c684bdddb845ab992502634ea6cacf078859309667b5d0da07d7d23accffa4a58739bb253e4db37a305362429dc970b967b37

                                      • C:\Windows\TEMP\itcctjlje\3924.dmp

                                        Filesize

                                        20.8MB

                                        MD5

                                        f79ac34fa47c9c2fb82459a34ca2439f

                                        SHA1

                                        9e75a5efb3ea2af2ca3090fa4a8fdba5346c6e87

                                        SHA256

                                        bfe2b6526bb3effbb331127191521c62f697ea437871da708b3970c91ac4cf86

                                        SHA512

                                        a09274a04df359aef58df1d6afea34e46f08b2f03c4b816ce7d89c34395290f7f2656599a7697989420758d0381d6997bf8b6a7d318cf617e2e37dfe93aaa2b3

                                      • C:\Windows\TEMP\itcctjlje\3984.dmp

                                        Filesize

                                        4.1MB

                                        MD5

                                        5f8b0bbb4a818dff1fada597d2ed4276

                                        SHA1

                                        90e99a2cd5770a9cbcdfb9a6a24c4d0a99b61f8a

                                        SHA256

                                        8b9136bf22d7ff8b634e1648fd1104f6cbb806cd6037960e04b44a94ba0d2789

                                        SHA512

                                        d7cd7566b6ecfc782a06b1dd056719739ebce4be370250b2a7078e1c121cbba2963c81ef4469251f6e2e9cb709a11fc730c455dbd113d6da4e19afe370500e14

                                      • C:\Windows\TEMP\itcctjlje\428.dmp

                                        Filesize

                                        44.1MB

                                        MD5

                                        cf419a166c11e5e07624c0420e43dc73

                                        SHA1

                                        13d56049cb4e14be65593cf7a1c046c8f1922261

                                        SHA256

                                        6dd0b6df248410bd90239198eb810b28dbc545e56bd981ec08378f0d397fad4e

                                        SHA512

                                        e2ba5075f2f5bedd5551e9f0961a1daef04d3e1afd574640bd887b15feb97967e5fc494318ba1344efb1ff3fe90d4355e9a5b244d8840579d48bcf730b04edf3

                                      • C:\Windows\TEMP\itcctjlje\4576.dmp

                                        Filesize

                                        1.3MB

                                        MD5

                                        db73c071b76a5c3ad57f7d37737e21dd

                                        SHA1

                                        4f4a54db1ab03edc4ba3b45cb20a383c8a766fac

                                        SHA256

                                        4e041b62cdb3fe04ec20e779f78204c9cdab767feebd89ac886df18750082585

                                        SHA512

                                        2f527c5e48102faf906bdf77743d344dc8ed90616f871980363953acbab429a6161977b292a286187ef6a1d2d4c444b8fb35ec302e7c40743747863857c104d7

                                      • C:\Windows\TEMP\itcctjlje\4800.dmp

                                        Filesize

                                        26.1MB

                                        MD5

                                        0526d58a296ed1dd5dc9c50af4365d24

                                        SHA1

                                        385eb8b0d6849c9e9ca64f400049a47121a79903

                                        SHA256

                                        aa9f9c80672973eae469458afddf57d49066af7ff6145d259943491a704018d6

                                        SHA512

                                        28d1cce506d77e4e28e7e9c2fd7b393f2edf028f6a4c61919bfe202e3f228ef8ee56fe416854b4f26b843a36285bcd562a871a70f2ef26bed6d9c9ff40a6c39f

                                      • C:\Windows\TEMP\itcctjlje\624.dmp

                                        Filesize

                                        2.9MB

                                        MD5

                                        f053858873b272a6a13f0b7e2c9ed23b

                                        SHA1

                                        faebe5e0d52997615be2d1ea58ac337da241043c

                                        SHA256

                                        dcd5caa07cc356084aeadf6cec4a4e6de00f33b8e521fcfd66991175eed94b31

                                        SHA512

                                        22306f3b22e25d13be8ffa2c70741c0908bdca20e6356fe361c33e95d3b1c42d873aceb8317fddc36e00ba73d573ac0b3c282407dbe890d28e6bbe93becea0f6

                                      • C:\Windows\TEMP\itcctjlje\804.dmp

                                        Filesize

                                        3.3MB

                                        MD5

                                        3d8e153794be42142cf2249bb0fc6cac

                                        SHA1

                                        bd7819c67d4fce0d5a7d0e43cd195cc9eebdfd00

                                        SHA256

                                        e1d9634d3cd1d516bb1c93f58c1d37d61293c58e0cf0b8e08da197fceaf23016

                                        SHA512

                                        e570e070e564979200c22ec7860997a7684d266c4a3495885abc4e7b769a4d7babd5451ce3a0acd347ea1869b78b6936c720ccce910ba40ab1861874a27f3231

                                      • C:\Windows\Temp\dvfzrticv\lfbpkn.exe

                                        Filesize

                                        343KB

                                        MD5

                                        2b4ac7b362261cb3f6f9583751708064

                                        SHA1

                                        b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                        SHA256

                                        a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                        SHA512

                                        c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                      • C:\Windows\Temp\itcctjlje\cmzbnyytn.exe

                                        Filesize

                                        126KB

                                        MD5

                                        e8d45731654929413d79b3818d6a5011

                                        SHA1

                                        23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                        SHA256

                                        a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                        SHA512

                                        df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                      • C:\Windows\Temp\nsw3C0C.tmp\System.dll

                                        Filesize

                                        11KB

                                        MD5

                                        2ae993a2ffec0c137eb51c8832691bcb

                                        SHA1

                                        98e0b37b7c14890f8a599f35678af5e9435906e1

                                        SHA256

                                        681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                        SHA512

                                        2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                      • C:\Windows\Temp\nsw3C0C.tmp\nsExec.dll

                                        Filesize

                                        6KB

                                        MD5

                                        b648c78981c02c434d6a04d4422a6198

                                        SHA1

                                        74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                        SHA256

                                        3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                        SHA512

                                        219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                      • C:\Windows\Temp\xohudmc.exe

                                        Filesize

                                        72KB

                                        MD5

                                        cbefa7108d0cf4186cdf3a82d6db80cd

                                        SHA1

                                        73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                        SHA256

                                        7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                        SHA512

                                        b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                      • C:\Windows\cbdnbivt\tmyfwky.exe

                                        Filesize

                                        10.0MB

                                        MD5

                                        823b504186ec2ea298af151bcc68ce5c

                                        SHA1

                                        afd1f8caa7a616b5b9cbe2e017df7649b04e3f4e

                                        SHA256

                                        ba55f668aabb4a2a22813edc386a24f79f7d56f1b52fcb0b8bdda0338295bd5c

                                        SHA512

                                        165ff844dc39c0c024131aaa6e17b59926bf8d9559672f22b891a27013135616b26ce2b6bd1da76e811b9a65bc50302b8765a8360044dbe2ea0991153a920ea4

                                      • C:\Windows\itcctjlje\Corporate\vfshost.exe

                                        Filesize

                                        381KB

                                        MD5

                                        fd5efccde59e94eec8bb2735aa577b2b

                                        SHA1

                                        51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                        SHA256

                                        441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                        SHA512

                                        74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                      • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                        Filesize

                                        1KB

                                        MD5

                                        66ffc72ee0eb2f160019ba8099e39299

                                        SHA1

                                        26d3f58c6af2950e57c732da2cdf17ec7e781d5f

                                        SHA256

                                        fad3679e04b624642a9f9fd37726d2154012e98d88f2c9cdb23f17e06168945e

                                        SHA512

                                        10c91cfcd4a468358e51667b27912cc2c8f8d87924f58b55d50123ad25762dfc305da128442771a3c056242caa57965ca1b88bbd004db11f0d4d692a26edbc82

                                      • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                        Filesize

                                        1KB

                                        MD5

                                        eb663ecb6195b05cbbfbe9ff4b14067d

                                        SHA1

                                        fb2e64290b79f597d4e92a27cc1358bd263a6fac

                                        SHA256

                                        8ba00d49f57a82c836c6d2cd89c6ea43576a97c68fb6323a641812ec3b888568

                                        SHA512

                                        79d97ede98dfb90803bdea820ddd8d46c2bb512f4e9c24aea8854f4e68d3e03ccfa8aa568010228c623a235a3804b14eeae888758f30b8bc525a6b93690fdd0b

                                      • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                        Filesize

                                        1KB

                                        MD5

                                        d629493f219e98bdcb0aa6b81e72cc75

                                        SHA1

                                        62c85f676f7c4192402b71fa7069412ea781191a

                                        SHA256

                                        a563ff33f74417015238a04c9150a77b4f31e2629b07bc870e8b2249e0823080

                                        SHA512

                                        118057911142caee5c922091d719b5330b265202c8ec27b23cf662f7c078828f6bbeb394f6c8f8943aec61cb672831a054148ff1e1b0e582535733728b14f228

                                      • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                        Filesize

                                        2KB

                                        MD5

                                        aea2bc51761e62f2d3fb3eac8fc56eaa

                                        SHA1

                                        29c182c4e959aae3c9e8be8f9d89a9c6eb8b794f

                                        SHA256

                                        3f4422017890d9e97dbc573a1a7253d6d855bd5b9d79b1737fa38077e295ef9b

                                        SHA512

                                        94320a88e642ba61242c75d22de50203f9244c41799ae2fee6d87db9acb5ce69a924c916196d33068aae4a97e2745b4b4a7fb596e3895cf0bfbe6925b83fa7e5

                                      • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                        Filesize

                                        2KB

                                        MD5

                                        df3f7a1ffaf462816eec8f6217a2c1e5

                                        SHA1

                                        1e1ea1e0e25f146a8120015c0c41e6058172e4df

                                        SHA256

                                        fe077f9a98a7f37141d75269e8d869977cbd7165d8341faf2f74e5f7b37581b3

                                        SHA512

                                        ef16f1e4eedb2e538e9418e023fd952f5f2e540e5e9f627154655082e740cc9d06c0a90d44eff9a9e074fe344962fedf9df1f8bd611c0b1d8659f9f099bf8120

                                      • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                        Filesize

                                        2KB

                                        MD5

                                        c067bfd278081b55be544d1d0c26f557

                                        SHA1

                                        9a88f2a95162af4eac01ca4cc508bb8011372977

                                        SHA256

                                        927a2fa8a88a3471b996170aa1eee362c17e6a6cc7ecbbb8ac0eedbc7dcf48b7

                                        SHA512

                                        c137e6a4a72771a37329f089530bb68be44d2c60503b213c8148c013fa5750541fac920471ec4ca1ce391768c8338bfb97d2ede5b722790a5cd01ae52ec2e446

                                      • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                        Filesize

                                        2KB

                                        MD5

                                        cfa6a36cfa5f049407f20658ffcfde08

                                        SHA1

                                        2004f46047c3a74d5de2d9ff032dcfae59a08d14

                                        SHA256

                                        0d11a17dec583b8c80b8e3796f8ce8d36174ba0db63bd82f64a8a5f55a670fc6

                                        SHA512

                                        047cbe9ea2fc99465a107e74f71fb5ecc43f57822defdf34062704959a1439e4683e2124d4b80fa9fe4aed26cc6358f7a32c9cd001d529d141fa7646d3766fda

                                      • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                        Filesize

                                        3KB

                                        MD5

                                        fc7f96228493a7f8bb4d90507d296ee3

                                        SHA1

                                        4b6ef2b7b4fdfb5f5a721967fecbbdd93e0b987b

                                        SHA256

                                        bf6b3bd8faa03bd7251a86c52a8ceb191e87fe59605d16716762cccbc727ef5f

                                        SHA512

                                        08e303207332e5833a2da0f09a22e6c3713f981afec92fef8f5f105697475c8013d4e0d6f199e7550f66b1be0af69d5af7d1f15147700de38ecf3581a34cff73

                                      • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                        Filesize

                                        3KB

                                        MD5

                                        13a560ee122f45fe71a64d0e6e490c5e

                                        SHA1

                                        4604e05d65fd8afccb05a3bbfca8ea0a325736de

                                        SHA256

                                        8f81334040fd6c7a2d299e04424241cab902a7e66ce561a3302998ead0598254

                                        SHA512

                                        a5f32847e89053649bb79947c7fe9eb69312ea7783917167bd829d2add31772f1b6405193abae70d858a8283e30dd3ca74dfb01952bb2790b23c1da9ed956c1d

                                      • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                        Filesize

                                        3KB

                                        MD5

                                        4c66f7a9a42a7b1eff47dcb7fbdb67f8

                                        SHA1

                                        d3792bf34edfb6dd0aeed8085cdcb741d3954798

                                        SHA256

                                        927713785f0217fba1a07d617997b495524ddcc55f6c4e77d707c23f926b0df2

                                        SHA512

                                        831e750a0c14277cca4482ebe550cc1c4abd54bdbe495001d802175f60c9a89c08a0fc7e7856cdb3848186a462070e90bbb7420371fcc2f5f862243a43b18108

                                      • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                        Filesize

                                        3KB

                                        MD5

                                        026b54a920beb0108a6bed5b055634b3

                                        SHA1

                                        a1b8ee00920ebe276a569b4d4a6c71d03c340c81

                                        SHA256

                                        77db39b09b0ab319f3260f0d34df7adec4e73cec5f3130e397d869eaa3b559c1

                                        SHA512

                                        75c4af4b48622dc02b808c0b74be679e89a8f58979f86f3dbb0492382f26d884d428e97068ef5aa9d23422c9e769a943544815a9bd5b85f2323b9dca9da29897

                                      • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                        Filesize

                                        4KB

                                        MD5

                                        cfd54aea512f1dccf655466cc56e9281

                                        SHA1

                                        e256c55c91309f201ef2cba4c70546691ba77d6a

                                        SHA256

                                        b0f652738e89df6d05ee3ac5d606bb6b77d9ebc2006575efe0ae06e0220b9efe

                                        SHA512

                                        535abcb306d4e69640dd231c10357447d35e0840a76fc772843472821decd3d900f00071cfd6e5baf71a9d139d165ad3c4041370bce2da149523d6b54f953181

                                      • C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe

                                        Filesize

                                        332KB

                                        MD5

                                        ea774c81fe7b5d9708caa278cf3f3c68

                                        SHA1

                                        fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                        SHA256

                                        4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                        SHA512

                                        7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                      • C:\Windows\itcctjlje\unptrtjvi\wpcap.exe

                                        Filesize

                                        424KB

                                        MD5

                                        e9c001647c67e12666f27f9984778ad6

                                        SHA1

                                        51961af0a52a2cc3ff2c4149f8d7011490051977

                                        SHA256

                                        7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                        SHA512

                                        56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                      • C:\Windows\system32\drivers\etc\hosts

                                        Filesize

                                        1KB

                                        MD5

                                        c838e174298c403c2bbdf3cb4bdbb597

                                        SHA1

                                        70eeb7dfad9488f14351415800e67454e2b4b95b

                                        SHA256

                                        1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                        SHA512

                                        c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                      • memory/652-196-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/744-245-0x0000000000EA0000-0x0000000000EB2000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/928-78-0x00000000011A0000-0x00000000011EC000-memory.dmp

                                        Filesize

                                        304KB

                                      • memory/1164-168-0x0000000000400000-0x0000000000412000-memory.dmp

                                        Filesize

                                        72KB

                                      • memory/1164-137-0x00007FF6BC840000-0x00007FF6BC92E000-memory.dmp

                                        Filesize

                                        952KB

                                      • memory/1164-151-0x0000000010000000-0x0000000010008000-memory.dmp

                                        Filesize

                                        32KB

                                      • memory/1164-135-0x00007FF6BC840000-0x00007FF6BC92E000-memory.dmp

                                        Filesize

                                        952KB

                                      • memory/1556-174-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/1632-201-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/1896-170-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/2744-223-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/2768-230-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/3024-214-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/3436-218-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/3456-192-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/3524-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                        Filesize

                                        6.6MB

                                      • memory/3576-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                        Filesize

                                        6.6MB

                                      • memory/3576-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                        Filesize

                                        6.6MB

                                      • memory/3632-188-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/3656-205-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/3904-184-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/4136-181-0x00007FF65B400000-0x00007FF65B520000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/4136-166-0x000001D085A30000-0x000001D085A40000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4136-246-0x00007FF65B400000-0x00007FF65B520000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/4136-231-0x00007FF65B400000-0x00007FF65B520000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/4136-498-0x00007FF65B400000-0x00007FF65B520000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/4136-220-0x00007FF65B400000-0x00007FF65B520000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/4136-211-0x00007FF65B400000-0x00007FF65B520000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/4136-496-0x00007FF65B400000-0x00007FF65B520000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/4136-198-0x00007FF65B400000-0x00007FF65B520000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/4136-495-0x00007FF65B400000-0x00007FF65B520000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/4136-163-0x00007FF65B400000-0x00007FF65B520000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/4136-177-0x00007FF65B400000-0x00007FF65B520000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/4220-145-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/4220-141-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/4252-227-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/4520-209-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/4756-235-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB

                                      • memory/4968-179-0x00007FF769DA0000-0x00007FF769DFB000-memory.dmp

                                        Filesize

                                        364KB