Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2022 20:24

General

  • Target

    8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772.exe

  • Size

    108KB

  • MD5

    6edd644870655dd39acd1a4b1b46cf5a

  • SHA1

    fc6d790b576e6346b03c8c5a0d262a67489701dc

  • SHA256

    8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

  • SHA512

    fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

  • SSDEEP

    1536:YK1v+eH4SZlU5ekB5dhnlcbd7PAFTJo7f:Yri4NnlcbIJo7f

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 12 IoCs
  • Disables cmd.exe use via registry modification 6 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 18 IoCs
  • Drops file in System32 directory 27 IoCs
  • Drops file in Windows directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 25 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: SetClipboardViewer 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772.exe
    "C:\Users\Admin\AppData\Local\Temp\8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3280
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
      • Modifies registry class
      PID:4892
    • C:\Users\Admin\AppData\Local\smss.exe
      C:\Users\Admin\AppData\Local\smss.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Drops startup file
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4776
      • C:\Users\Admin\AppData\Local\winlogon.exe
        C:\Users\Admin\AppData\Local\winlogon.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:4388
      • C:\Windows\SysWOW64\at.exe
        at /delete /y
        3⤵
          PID:4924
        • C:\Windows\SysWOW64\at.exe
          at 17:08 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\6084-NendangBro.com"
          3⤵
            PID:2732
          • C:\Windows\SysWOW64\at.exe
            at 11:03 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\6084-NendangBro.com"
            3⤵
              PID:4728
            • C:\Users\Admin\AppData\Local\services.exe
              C:\Users\Admin\AppData\Local\services.exe
              3⤵
              • Modifies WinLogon for persistence
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • Disables RegEdit via registry modification
              • Disables cmd.exe use via registry modification
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Suspicious use of SetWindowsHookEx
              PID:1580
            • C:\Users\Admin\AppData\Local\lsass.exe
              C:\Users\Admin\AppData\Local\lsass.exe
              3⤵
              • Modifies WinLogon for persistence
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • Disables RegEdit via registry modification
              • Disables cmd.exe use via registry modification
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Suspicious use of SetWindowsHookEx
              PID:2156
            • C:\Users\Admin\AppData\Local\inetinfo.exe
              C:\Users\Admin\AppData\Local\inetinfo.exe
              3⤵
              • Modifies WinLogon for persistence
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • Disables RegEdit via registry modification
              • Disables cmd.exe use via registry modification
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Adds Run key to start application
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Suspicious use of SetWindowsHookEx
              PID:2472
        • C:\Windows\SysWOW64\mmc.exe
          C:\Windows\SysWOW64\mmc.exe
          1⤵
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1572
          • C:\Windows\system32\mmc.exe
            "C:\Windows\system32\mmc.exe"
            2⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2284
        • C:\Windows\SysWOW64\mmc.exe
          C:\Windows\SysWOW64\mmc.exe
          1⤵
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3204
          • C:\Windows\system32\mmc.exe
            "C:\Windows\system32\mmc.exe"
            2⤵
            • Modifies data under HKEY_USERS
            • Suspicious behavior: SetClipboardViewer
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1452
        • C:\Windows\SysWOW64\mmc.exe
          C:\Windows\SysWOW64\mmc.exe
          1⤵
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:556
          • C:\Windows\system32\mmc.exe
            "C:\Windows\system32\mmc.exe"
            2⤵
            • Modifies data under HKEY_USERS
            • Suspicious behavior: SetClipboardViewer
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:536
        • C:\Windows\SysWOW64\mmc.exe
          C:\Windows\SysWOW64\mmc.exe
          1⤵
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1664
          • C:\Windows\system32\mmc.exe
            "C:\Windows\system32\mmc.exe"
            2⤵
            • Modifies data under HKEY_USERS
            • Suspicious behavior: SetClipboardViewer
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:3484
        • C:\Windows\SysWOW64\mmc.exe
          C:\Windows\SysWOW64\mmc.exe
          1⤵
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2460
          • C:\Windows\system32\mmc.exe
            "C:\Windows\system32\mmc.exe"
            2⤵
            • Modifies data under HKEY_USERS
            • Suspicious behavior: SetClipboardViewer
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:4512
        • C:\Windows\SysWOW64\mmc.exe
          C:\Windows\SysWOW64\mmc.exe
          1⤵
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4132
          • C:\Windows\system32\mmc.exe
            "C:\Windows\system32\mmc.exe"
            2⤵
            • Modifies data under HKEY_USERS
            • Suspicious behavior: SetClipboardViewer
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:972

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\br3951on.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\br3951on.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\br3951on.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\br3951on.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\br3951on.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\csrss.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\csrss.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\csrss.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\csrss.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\csrss.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\inetinfo.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\inetinfo.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\inetinfo.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\inetinfo.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\inetinfo.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\inetinfo.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\lsass.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\lsass.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\lsass.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\lsass.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\lsass.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\services.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\services.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\services.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\services.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\smss.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\smss.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\svchost.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\svchost.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\svchost.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\svchost.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\svchost.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\winlogon.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Users\Admin\AppData\Local\winlogon.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\KesenjanganSosial.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\KesenjanganSosial.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\KesenjanganSosial.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\KesenjanganSosial.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\KesenjanganSosial.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\KesenjanganSosial.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\ShellNew\RakyatKelaparan.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\ShellNew\RakyatKelaparan.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\ShellNew\RakyatKelaparan.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\ShellNew\RakyatKelaparan.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\ShellNew\RakyatKelaparan.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\ShellNew\RakyatKelaparan.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\SysWOW64\cmd-brontok.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\SysWOW64\cmd-brontok.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\SysWOW64\cmd-brontok.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\SysWOW64\cmd-brontok.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • C:\Windows\SysWOW64\cmd-brontok.exe

          Filesize

          108KB

          MD5

          6edd644870655dd39acd1a4b1b46cf5a

          SHA1

          fc6d790b576e6346b03c8c5a0d262a67489701dc

          SHA256

          8a585f0f4921d4fe4013a879379fbf1bcf07e48bfc7b390fb7fee6db8e361772

          SHA512

          fc97ae76b0443c83ef6aa75307549aee3d5a7d712752792f55e304fc0ba7037da36ab1432d82674062fa2c8ae3cb49131401db0c064b1244531ce51adb15c208

        • memory/536-154-0x0000000000000000-mapping.dmp

        • memory/972-200-0x0000000000000000-mapping.dmp

        • memory/1452-139-0x0000000000000000-mapping.dmp

        • memory/1580-169-0x0000000000000000-mapping.dmp

        • memory/2156-184-0x0000000000000000-mapping.dmp

        • memory/2284-132-0x0000000000000000-mapping.dmp

        • memory/2472-197-0x0000000000000000-mapping.dmp

        • memory/2732-167-0x0000000000000000-mapping.dmp

        • memory/3484-173-0x0000000000000000-mapping.dmp

        • memory/4388-151-0x0000000000000000-mapping.dmp

        • memory/4512-187-0x0000000000000000-mapping.dmp

        • memory/4728-168-0x0000000000000000-mapping.dmp

        • memory/4776-136-0x0000000000000000-mapping.dmp

        • memory/4892-135-0x0000000000000000-mapping.dmp

        • memory/4924-166-0x0000000000000000-mapping.dmp