Analysis

  • max time kernel
    152s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 13:36

General

  • Target

    6f08506724e94890487b53df2b143278bcf717f3fa7583d96037292155782e11.exe

  • Size

    323KB

  • MD5

    a1bb74424a908d9146d2e6ea73085794

  • SHA1

    82cb2648c5b82f627d28dfa252bc522fb83b078b

  • SHA256

    6f08506724e94890487b53df2b143278bcf717f3fa7583d96037292155782e11

  • SHA512

    7ee4fa1a902e0afe2863098c0acf196e8d01907646aeeb5c903ce9f6ee9d99345e400cfaef42094bd846650d23a11e17e5c106901e8d6dea8bbeb48de1dbc275

  • SSDEEP

    6144:aBxeN/Tdx8YzL+4eBDgelLBLZx53TV5n+yNXavM:aBxe9dx8Yz6nhtLZx53TV5n+4av

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 12 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 12 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 10 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Loads dropped DLL 20 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 47 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 45 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • System policy modification 1 TTPs 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f08506724e94890487b53df2b143278bcf717f3fa7583d96037292155782e11.exe
    "C:\Users\Admin\AppData\Local\Temp\6f08506724e94890487b53df2b143278bcf717f3fa7583d96037292155782e11.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies system executable filetype association
    • Modifies visibility of file extensions in Explorer
    • UAC bypass
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Sets file execution options in registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1976
    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
      C:\Windows\system32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies system executable filetype association
      • Modifies visibility of file extensions in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Sets file execution options in registry
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1096
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
        C:\Windows\system32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1124
      • C:\Windows\SysWOW64\Kantuk.exe
        C:\Windows\system32\Kantuk.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies system executable filetype association
        • Modifies visibility of file extensions in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Sets file execution options in registry
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Enumerates connected drives
        • Drops autorun.inf file
        • Modifies Control Panel
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:1760
      • C:\Windows\SysWOW64\4K51K4.exe
        C:\Windows\system32\4K51K4.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies system executable filetype association
        • Modifies visibility of file extensions in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Sets file execution options in registry
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Modifies Control Panel
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:1780
      • C:\Windows\SysWOW64\K0L4B0R451.exe
        C:\Windows\system32\K0L4B0R451.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies system executable filetype association
        • Modifies visibility of file extensions in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Sets file execution options in registry
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Enumerates connected drives
        • Modifies Control Panel
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:1276
      • C:\Windows\SysWOW64\GoldenGhost.exe
        C:\Windows\system32\GoldenGhost.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies system executable filetype association
        • Modifies visibility of file extensions in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Sets file execution options in registry
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Modifies Control Panel
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:1040
    • C:\Windows\SysWOW64\Kantuk.exe
      C:\Windows\system32\Kantuk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1840
    • C:\Windows\SysWOW64\4K51K4.exe
      C:\Windows\system32\4K51K4.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1376
    • C:\Windows\SysWOW64\K0L4B0R451.exe
      C:\Windows\system32\K0L4B0R451.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1952
    • C:\Windows\SysWOW64\GoldenGhost.exe
      C:\Windows\system32\GoldenGhost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1396

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Aut0exec.bat

    Filesize

    323KB

    MD5

    1eb682a64ac710e9d212f691c8c2f9ca

    SHA1

    b6fdf4e663c1fe51bcb0bc683ab6f2f2892d3e16

    SHA256

    204ac027887e2d112610da59e8cf32eaf0aefea2898f4fdad7958676bc68c3a1

    SHA512

    a50b51539cbcae4499c971768f28bfa88029c23a865717141477147247c47b025052255e4077e32b91b30d9f1a366dab373aceea74ae54b7c14908f38d9c6a48

  • C:\Users\Admin\AppData\Local\Temp\Windows_3D.scr

    Filesize

    323KB

    MD5

    4c3af5916dd70ad60c3cc937f7ff5bce

    SHA1

    afdc446614507155463e2eda2c34845f8353b881

    SHA256

    3cae607f6d06d4c8b4cd69df4e9b7fa167ed8ff515d372a26d64d504878fec09

    SHA512

    8320bd5c5aea960ea5bb062cee4671c7299d893f834943fee0f2e0204d5e975021ae0693056aa589874139410023f1df1e0439f79fb8bde9f6d81b0cbbd31816

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    323KB

    MD5

    9567bc239c76586a73f4be61c2c2a7b6

    SHA1

    5b313f5580cd2ac815f6cb7bac1f9cc7a4dd45f6

    SHA256

    8efb2c84d8aa5520931fa50078092234cbb9e0181dfa7ac4ce326833e4630f2f

    SHA512

    03d45b3612b3822b9e3a7247beb658ebdd3bca21ef44cc23e1502f3f44ae5522f069a603442f268f8bff390f307c977eb71063151aa99950ab77af6570609b43

  • C:\Windows\SysWOW64\4K51K4.exe

    Filesize

    323KB

    MD5

    50b2971269d85154a17393200f0553ea

    SHA1

    f0930046d2d54c77a5043f6c0b1cfe797222a0c4

    SHA256

    b6377b44703a8895d802525f4d2f3dbe9501f17df9f0af9e38c91da0fc790b1c

    SHA512

    b9209515d4792936167901f442255cb47158d3b437d48dfc8ea939f53e826ce9aab63a9ad20025efad28065757c764a509a483a8322f27976e3a3c5dde06247b

  • C:\Windows\SysWOW64\4K51K4.exe

    Filesize

    323KB

    MD5

    50b2971269d85154a17393200f0553ea

    SHA1

    f0930046d2d54c77a5043f6c0b1cfe797222a0c4

    SHA256

    b6377b44703a8895d802525f4d2f3dbe9501f17df9f0af9e38c91da0fc790b1c

    SHA512

    b9209515d4792936167901f442255cb47158d3b437d48dfc8ea939f53e826ce9aab63a9ad20025efad28065757c764a509a483a8322f27976e3a3c5dde06247b

  • C:\Windows\SysWOW64\4K51K4.exe

    Filesize

    323KB

    MD5

    4c3af5916dd70ad60c3cc937f7ff5bce

    SHA1

    afdc446614507155463e2eda2c34845f8353b881

    SHA256

    3cae607f6d06d4c8b4cd69df4e9b7fa167ed8ff515d372a26d64d504878fec09

    SHA512

    8320bd5c5aea960ea5bb062cee4671c7299d893f834943fee0f2e0204d5e975021ae0693056aa589874139410023f1df1e0439f79fb8bde9f6d81b0cbbd31816

  • C:\Windows\SysWOW64\4K51K4.exe

    Filesize

    323KB

    MD5

    50b2971269d85154a17393200f0553ea

    SHA1

    f0930046d2d54c77a5043f6c0b1cfe797222a0c4

    SHA256

    b6377b44703a8895d802525f4d2f3dbe9501f17df9f0af9e38c91da0fc790b1c

    SHA512

    b9209515d4792936167901f442255cb47158d3b437d48dfc8ea939f53e826ce9aab63a9ad20025efad28065757c764a509a483a8322f27976e3a3c5dde06247b

  • C:\Windows\SysWOW64\GoldenGhost.exe

    Filesize

    323KB

    MD5

    7436ecb9889078ad100a52f153327c00

    SHA1

    62c8416258ad876938b2184040fc85a67ce4cc9a

    SHA256

    b884394c293cbcb59d92c903737306d140d9590d1c55037783c57e3c16ee7543

    SHA512

    4817f278ec90fb8250b2b1f4a0e10b46fd97db124d654cb8d0a955a050df6d9553fba6b3aa45d74979a59629df9de330e324fc53963b7e3921d69769b44a8854

  • C:\Windows\SysWOW64\GoldenGhost.exe

    Filesize

    323KB

    MD5

    7436ecb9889078ad100a52f153327c00

    SHA1

    62c8416258ad876938b2184040fc85a67ce4cc9a

    SHA256

    b884394c293cbcb59d92c903737306d140d9590d1c55037783c57e3c16ee7543

    SHA512

    4817f278ec90fb8250b2b1f4a0e10b46fd97db124d654cb8d0a955a050df6d9553fba6b3aa45d74979a59629df9de330e324fc53963b7e3921d69769b44a8854

  • C:\Windows\SysWOW64\GoldenGhost.exe

    Filesize

    323KB

    MD5

    7436ecb9889078ad100a52f153327c00

    SHA1

    62c8416258ad876938b2184040fc85a67ce4cc9a

    SHA256

    b884394c293cbcb59d92c903737306d140d9590d1c55037783c57e3c16ee7543

    SHA512

    4817f278ec90fb8250b2b1f4a0e10b46fd97db124d654cb8d0a955a050df6d9553fba6b3aa45d74979a59629df9de330e324fc53963b7e3921d69769b44a8854

  • C:\Windows\SysWOW64\GoldenGhost.exe

    Filesize

    323KB

    MD5

    4c3af5916dd70ad60c3cc937f7ff5bce

    SHA1

    afdc446614507155463e2eda2c34845f8353b881

    SHA256

    3cae607f6d06d4c8b4cd69df4e9b7fa167ed8ff515d372a26d64d504878fec09

    SHA512

    8320bd5c5aea960ea5bb062cee4671c7299d893f834943fee0f2e0204d5e975021ae0693056aa589874139410023f1df1e0439f79fb8bde9f6d81b0cbbd31816

  • C:\Windows\SysWOW64\K0L4B0R451.exe

    Filesize

    323KB

    MD5

    3f91a698186ccbfa6d2a16bddb0d0fa1

    SHA1

    d65088fbd55f8d9df9745a9e501735129f710473

    SHA256

    16921bb2e4143e0c4c7bd2bfb2fc3baf289c784c062b8c77ee8a387df1752f62

    SHA512

    e4b1c56b2311639835bcba3f1840b18c2a092c3a05523e289db6a470687fe75e9d00d50159788e0b164e89d208de5542f5f29420a833a5f67dfe095bf0878306

  • C:\Windows\SysWOW64\K0L4B0R451.exe

    Filesize

    323KB

    MD5

    3f91a698186ccbfa6d2a16bddb0d0fa1

    SHA1

    d65088fbd55f8d9df9745a9e501735129f710473

    SHA256

    16921bb2e4143e0c4c7bd2bfb2fc3baf289c784c062b8c77ee8a387df1752f62

    SHA512

    e4b1c56b2311639835bcba3f1840b18c2a092c3a05523e289db6a470687fe75e9d00d50159788e0b164e89d208de5542f5f29420a833a5f67dfe095bf0878306

  • C:\Windows\SysWOW64\K0L4B0R451.exe

    Filesize

    323KB

    MD5

    b1a7b590adeef2d9a3f97ebd38a71417

    SHA1

    baab094daf351a319ff5502dbf62c08bb8d394d3

    SHA256

    2d73fa4470b4072a908daf0543a9c543a589e1aac1c3a8ee74a46659030ce2c6

    SHA512

    b5d0eaee2f583834ccae5ada29cbad32b49d0b6cf5072aa6ab64797c41564f5079d2cef7dc0d6b2d340a2b6308498829be5468198ef59205425b7f81602df03e

  • C:\Windows\SysWOW64\K0L4B0R451.exe

    Filesize

    323KB

    MD5

    3f91a698186ccbfa6d2a16bddb0d0fa1

    SHA1

    d65088fbd55f8d9df9745a9e501735129f710473

    SHA256

    16921bb2e4143e0c4c7bd2bfb2fc3baf289c784c062b8c77ee8a387df1752f62

    SHA512

    e4b1c56b2311639835bcba3f1840b18c2a092c3a05523e289db6a470687fe75e9d00d50159788e0b164e89d208de5542f5f29420a833a5f67dfe095bf0878306

  • C:\Windows\SysWOW64\Kantuk.exe

    Filesize

    323KB

    MD5

    9987c5b3834e70c94d57a55aa329841f

    SHA1

    c301edbf7b47cc15d55225f38264b967a2589f94

    SHA256

    ac223d1d9b88b26d3b18c0cddfd164104c4b366ceccb612c667a76067341841f

    SHA512

    f470d26313351d2e7881891525eb42a98ab578f703ec61bea558dbe69d76302752af923a14981c2ecddabc1a564099f3f717d34815b7284157f69e002780d123

  • C:\Windows\SysWOW64\Kantuk.exe

    Filesize

    323KB

    MD5

    9987c5b3834e70c94d57a55aa329841f

    SHA1

    c301edbf7b47cc15d55225f38264b967a2589f94

    SHA256

    ac223d1d9b88b26d3b18c0cddfd164104c4b366ceccb612c667a76067341841f

    SHA512

    f470d26313351d2e7881891525eb42a98ab578f703ec61bea558dbe69d76302752af923a14981c2ecddabc1a564099f3f717d34815b7284157f69e002780d123

  • C:\Windows\SysWOW64\Kantuk.exe

    Filesize

    323KB

    MD5

    4c3af5916dd70ad60c3cc937f7ff5bce

    SHA1

    afdc446614507155463e2eda2c34845f8353b881

    SHA256

    3cae607f6d06d4c8b4cd69df4e9b7fa167ed8ff515d372a26d64d504878fec09

    SHA512

    8320bd5c5aea960ea5bb062cee4671c7299d893f834943fee0f2e0204d5e975021ae0693056aa589874139410023f1df1e0439f79fb8bde9f6d81b0cbbd31816

  • C:\Windows\SysWOW64\Kantuk.exe

    Filesize

    323KB

    MD5

    9987c5b3834e70c94d57a55aa329841f

    SHA1

    c301edbf7b47cc15d55225f38264b967a2589f94

    SHA256

    ac223d1d9b88b26d3b18c0cddfd164104c4b366ceccb612c667a76067341841f

    SHA512

    f470d26313351d2e7881891525eb42a98ab578f703ec61bea558dbe69d76302752af923a14981c2ecddabc1a564099f3f717d34815b7284157f69e002780d123

  • C:\Windows\SysWOW64\Shell32.com

    Filesize

    323KB

    MD5

    4c3af5916dd70ad60c3cc937f7ff5bce

    SHA1

    afdc446614507155463e2eda2c34845f8353b881

    SHA256

    3cae607f6d06d4c8b4cd69df4e9b7fa167ed8ff515d372a26d64d504878fec09

    SHA512

    8320bd5c5aea960ea5bb062cee4671c7299d893f834943fee0f2e0204d5e975021ae0693056aa589874139410023f1df1e0439f79fb8bde9f6d81b0cbbd31816

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe

    Filesize

    323KB

    MD5

    4c3af5916dd70ad60c3cc937f7ff5bce

    SHA1

    afdc446614507155463e2eda2c34845f8353b881

    SHA256

    3cae607f6d06d4c8b4cd69df4e9b7fa167ed8ff515d372a26d64d504878fec09

    SHA512

    8320bd5c5aea960ea5bb062cee4671c7299d893f834943fee0f2e0204d5e975021ae0693056aa589874139410023f1df1e0439f79fb8bde9f6d81b0cbbd31816

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe

    Filesize

    323KB

    MD5

    4c3af5916dd70ad60c3cc937f7ff5bce

    SHA1

    afdc446614507155463e2eda2c34845f8353b881

    SHA256

    3cae607f6d06d4c8b4cd69df4e9b7fa167ed8ff515d372a26d64d504878fec09

    SHA512

    8320bd5c5aea960ea5bb062cee4671c7299d893f834943fee0f2e0204d5e975021ae0693056aa589874139410023f1df1e0439f79fb8bde9f6d81b0cbbd31816

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe

    Filesize

    323KB

    MD5

    4c3af5916dd70ad60c3cc937f7ff5bce

    SHA1

    afdc446614507155463e2eda2c34845f8353b881

    SHA256

    3cae607f6d06d4c8b4cd69df4e9b7fa167ed8ff515d372a26d64d504878fec09

    SHA512

    8320bd5c5aea960ea5bb062cee4671c7299d893f834943fee0f2e0204d5e975021ae0693056aa589874139410023f1df1e0439f79fb8bde9f6d81b0cbbd31816

  • \Windows\SysWOW64\4K51K4.exe

    Filesize

    323KB

    MD5

    50b2971269d85154a17393200f0553ea

    SHA1

    f0930046d2d54c77a5043f6c0b1cfe797222a0c4

    SHA256

    b6377b44703a8895d802525f4d2f3dbe9501f17df9f0af9e38c91da0fc790b1c

    SHA512

    b9209515d4792936167901f442255cb47158d3b437d48dfc8ea939f53e826ce9aab63a9ad20025efad28065757c764a509a483a8322f27976e3a3c5dde06247b

  • \Windows\SysWOW64\4K51K4.exe

    Filesize

    323KB

    MD5

    50b2971269d85154a17393200f0553ea

    SHA1

    f0930046d2d54c77a5043f6c0b1cfe797222a0c4

    SHA256

    b6377b44703a8895d802525f4d2f3dbe9501f17df9f0af9e38c91da0fc790b1c

    SHA512

    b9209515d4792936167901f442255cb47158d3b437d48dfc8ea939f53e826ce9aab63a9ad20025efad28065757c764a509a483a8322f27976e3a3c5dde06247b

  • \Windows\SysWOW64\4K51K4.exe

    Filesize

    323KB

    MD5

    50b2971269d85154a17393200f0553ea

    SHA1

    f0930046d2d54c77a5043f6c0b1cfe797222a0c4

    SHA256

    b6377b44703a8895d802525f4d2f3dbe9501f17df9f0af9e38c91da0fc790b1c

    SHA512

    b9209515d4792936167901f442255cb47158d3b437d48dfc8ea939f53e826ce9aab63a9ad20025efad28065757c764a509a483a8322f27976e3a3c5dde06247b

  • \Windows\SysWOW64\4K51K4.exe

    Filesize

    323KB

    MD5

    50b2971269d85154a17393200f0553ea

    SHA1

    f0930046d2d54c77a5043f6c0b1cfe797222a0c4

    SHA256

    b6377b44703a8895d802525f4d2f3dbe9501f17df9f0af9e38c91da0fc790b1c

    SHA512

    b9209515d4792936167901f442255cb47158d3b437d48dfc8ea939f53e826ce9aab63a9ad20025efad28065757c764a509a483a8322f27976e3a3c5dde06247b

  • \Windows\SysWOW64\GoldenGhost.exe

    Filesize

    323KB

    MD5

    7436ecb9889078ad100a52f153327c00

    SHA1

    62c8416258ad876938b2184040fc85a67ce4cc9a

    SHA256

    b884394c293cbcb59d92c903737306d140d9590d1c55037783c57e3c16ee7543

    SHA512

    4817f278ec90fb8250b2b1f4a0e10b46fd97db124d654cb8d0a955a050df6d9553fba6b3aa45d74979a59629df9de330e324fc53963b7e3921d69769b44a8854

  • \Windows\SysWOW64\GoldenGhost.exe

    Filesize

    323KB

    MD5

    7436ecb9889078ad100a52f153327c00

    SHA1

    62c8416258ad876938b2184040fc85a67ce4cc9a

    SHA256

    b884394c293cbcb59d92c903737306d140d9590d1c55037783c57e3c16ee7543

    SHA512

    4817f278ec90fb8250b2b1f4a0e10b46fd97db124d654cb8d0a955a050df6d9553fba6b3aa45d74979a59629df9de330e324fc53963b7e3921d69769b44a8854

  • \Windows\SysWOW64\GoldenGhost.exe

    Filesize

    323KB

    MD5

    7436ecb9889078ad100a52f153327c00

    SHA1

    62c8416258ad876938b2184040fc85a67ce4cc9a

    SHA256

    b884394c293cbcb59d92c903737306d140d9590d1c55037783c57e3c16ee7543

    SHA512

    4817f278ec90fb8250b2b1f4a0e10b46fd97db124d654cb8d0a955a050df6d9553fba6b3aa45d74979a59629df9de330e324fc53963b7e3921d69769b44a8854

  • \Windows\SysWOW64\GoldenGhost.exe

    Filesize

    323KB

    MD5

    7436ecb9889078ad100a52f153327c00

    SHA1

    62c8416258ad876938b2184040fc85a67ce4cc9a

    SHA256

    b884394c293cbcb59d92c903737306d140d9590d1c55037783c57e3c16ee7543

    SHA512

    4817f278ec90fb8250b2b1f4a0e10b46fd97db124d654cb8d0a955a050df6d9553fba6b3aa45d74979a59629df9de330e324fc53963b7e3921d69769b44a8854

  • \Windows\SysWOW64\K0L4B0R451.exe

    Filesize

    323KB

    MD5

    3f91a698186ccbfa6d2a16bddb0d0fa1

    SHA1

    d65088fbd55f8d9df9745a9e501735129f710473

    SHA256

    16921bb2e4143e0c4c7bd2bfb2fc3baf289c784c062b8c77ee8a387df1752f62

    SHA512

    e4b1c56b2311639835bcba3f1840b18c2a092c3a05523e289db6a470687fe75e9d00d50159788e0b164e89d208de5542f5f29420a833a5f67dfe095bf0878306

  • \Windows\SysWOW64\K0L4B0R451.exe

    Filesize

    323KB

    MD5

    3f91a698186ccbfa6d2a16bddb0d0fa1

    SHA1

    d65088fbd55f8d9df9745a9e501735129f710473

    SHA256

    16921bb2e4143e0c4c7bd2bfb2fc3baf289c784c062b8c77ee8a387df1752f62

    SHA512

    e4b1c56b2311639835bcba3f1840b18c2a092c3a05523e289db6a470687fe75e9d00d50159788e0b164e89d208de5542f5f29420a833a5f67dfe095bf0878306

  • \Windows\SysWOW64\K0L4B0R451.exe

    Filesize

    323KB

    MD5

    3f91a698186ccbfa6d2a16bddb0d0fa1

    SHA1

    d65088fbd55f8d9df9745a9e501735129f710473

    SHA256

    16921bb2e4143e0c4c7bd2bfb2fc3baf289c784c062b8c77ee8a387df1752f62

    SHA512

    e4b1c56b2311639835bcba3f1840b18c2a092c3a05523e289db6a470687fe75e9d00d50159788e0b164e89d208de5542f5f29420a833a5f67dfe095bf0878306

  • \Windows\SysWOW64\K0L4B0R451.exe

    Filesize

    323KB

    MD5

    3f91a698186ccbfa6d2a16bddb0d0fa1

    SHA1

    d65088fbd55f8d9df9745a9e501735129f710473

    SHA256

    16921bb2e4143e0c4c7bd2bfb2fc3baf289c784c062b8c77ee8a387df1752f62

    SHA512

    e4b1c56b2311639835bcba3f1840b18c2a092c3a05523e289db6a470687fe75e9d00d50159788e0b164e89d208de5542f5f29420a833a5f67dfe095bf0878306

  • \Windows\SysWOW64\Kantuk.exe

    Filesize

    323KB

    MD5

    9987c5b3834e70c94d57a55aa329841f

    SHA1

    c301edbf7b47cc15d55225f38264b967a2589f94

    SHA256

    ac223d1d9b88b26d3b18c0cddfd164104c4b366ceccb612c667a76067341841f

    SHA512

    f470d26313351d2e7881891525eb42a98ab578f703ec61bea558dbe69d76302752af923a14981c2ecddabc1a564099f3f717d34815b7284157f69e002780d123

  • \Windows\SysWOW64\Kantuk.exe

    Filesize

    323KB

    MD5

    9987c5b3834e70c94d57a55aa329841f

    SHA1

    c301edbf7b47cc15d55225f38264b967a2589f94

    SHA256

    ac223d1d9b88b26d3b18c0cddfd164104c4b366ceccb612c667a76067341841f

    SHA512

    f470d26313351d2e7881891525eb42a98ab578f703ec61bea558dbe69d76302752af923a14981c2ecddabc1a564099f3f717d34815b7284157f69e002780d123

  • \Windows\SysWOW64\Kantuk.exe

    Filesize

    323KB

    MD5

    9987c5b3834e70c94d57a55aa329841f

    SHA1

    c301edbf7b47cc15d55225f38264b967a2589f94

    SHA256

    ac223d1d9b88b26d3b18c0cddfd164104c4b366ceccb612c667a76067341841f

    SHA512

    f470d26313351d2e7881891525eb42a98ab578f703ec61bea558dbe69d76302752af923a14981c2ecddabc1a564099f3f717d34815b7284157f69e002780d123

  • \Windows\SysWOW64\Kantuk.exe

    Filesize

    323KB

    MD5

    9987c5b3834e70c94d57a55aa329841f

    SHA1

    c301edbf7b47cc15d55225f38264b967a2589f94

    SHA256

    ac223d1d9b88b26d3b18c0cddfd164104c4b366ceccb612c667a76067341841f

    SHA512

    f470d26313351d2e7881891525eb42a98ab578f703ec61bea558dbe69d76302752af923a14981c2ecddabc1a564099f3f717d34815b7284157f69e002780d123

  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe

    Filesize

    323KB

    MD5

    4c3af5916dd70ad60c3cc937f7ff5bce

    SHA1

    afdc446614507155463e2eda2c34845f8353b881

    SHA256

    3cae607f6d06d4c8b4cd69df4e9b7fa167ed8ff515d372a26d64d504878fec09

    SHA512

    8320bd5c5aea960ea5bb062cee4671c7299d893f834943fee0f2e0204d5e975021ae0693056aa589874139410023f1df1e0439f79fb8bde9f6d81b0cbbd31816

  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe

    Filesize

    323KB

    MD5

    4c3af5916dd70ad60c3cc937f7ff5bce

    SHA1

    afdc446614507155463e2eda2c34845f8353b881

    SHA256

    3cae607f6d06d4c8b4cd69df4e9b7fa167ed8ff515d372a26d64d504878fec09

    SHA512

    8320bd5c5aea960ea5bb062cee4671c7299d893f834943fee0f2e0204d5e975021ae0693056aa589874139410023f1df1e0439f79fb8bde9f6d81b0cbbd31816

  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe

    Filesize

    323KB

    MD5

    4c3af5916dd70ad60c3cc937f7ff5bce

    SHA1

    afdc446614507155463e2eda2c34845f8353b881

    SHA256

    3cae607f6d06d4c8b4cd69df4e9b7fa167ed8ff515d372a26d64d504878fec09

    SHA512

    8320bd5c5aea960ea5bb062cee4671c7299d893f834943fee0f2e0204d5e975021ae0693056aa589874139410023f1df1e0439f79fb8bde9f6d81b0cbbd31816

  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe

    Filesize

    323KB

    MD5

    4c3af5916dd70ad60c3cc937f7ff5bce

    SHA1

    afdc446614507155463e2eda2c34845f8353b881

    SHA256

    3cae607f6d06d4c8b4cd69df4e9b7fa167ed8ff515d372a26d64d504878fec09

    SHA512

    8320bd5c5aea960ea5bb062cee4671c7299d893f834943fee0f2e0204d5e975021ae0693056aa589874139410023f1df1e0439f79fb8bde9f6d81b0cbbd31816

  • memory/1040-108-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/1096-62-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/1276-101-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/1760-86-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/1780-93-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/1976-54-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/1976-57-0x0000000074D81000-0x0000000074D83000-memory.dmp

    Filesize

    8KB