Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 00:43
Behavioral task
behavioral1
Sample
01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe
Resource
win10v2004-20220812-en
General
-
Target
01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe
-
Size
91KB
-
MD5
a0df06c55b38036c7b739e78c6465fa0
-
SHA1
8cb28d9ec6f480519503b68488287b569e1f5c14
-
SHA256
01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487
-
SHA512
b762fd0176b7e9fcf3898599f646b1efbda399d13e29c02557f0d042e99e3676efed931aa04d4824489a2a75f621251da591607d731b929dccdaafa84f0efd1f
-
SSDEEP
1536:yOcjUpkWb2TTghpwulOcjUpkWb2TTghpwuh:yOcjWJuutlOcjWJuuth
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 36 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 4k51k4.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 18 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CSRSS.EXE -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 18 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CSRSS.EXE -
Disables RegEdit via registry modification 36 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 64 IoCs
pid Process 4976 4k51k4.exe 4896 IExplorer.exe 4968 WINLOGON.EXE 1816 CSRSS.EXE 3532 SERVICES.EXE 1436 LSASS.EXE 1904 4k51k4.exe 4600 SMSS.EXE 228 4k51k4.exe 2252 IExplorer.exe 5056 IExplorer.exe 4496 WINLOGON.EXE 3424 WINLOGON.EXE 4564 CSRSS.EXE 460 CSRSS.EXE 4780 SERVICES.EXE 3584 SERVICES.EXE 2908 LSASS.EXE 4688 LSASS.EXE 1784 SMSS.EXE 3000 SMSS.EXE 3804 4k51k4.exe 1116 IExplorer.exe 2256 WINLOGON.EXE 400 4k51k4.exe 1312 4k51k4.exe 3216 CSRSS.EXE 4224 IExplorer.exe 840 IExplorer.exe 4516 SERVICES.EXE 60 WINLOGON.EXE 5080 WINLOGON.EXE 1120 CSRSS.EXE 2144 LSASS.EXE 1728 CSRSS.EXE 2480 SERVICES.EXE 4204 SMSS.EXE 2656 4k51k4.exe 1964 SERVICES.EXE 3180 LSASS.EXE 3192 IExplorer.exe 1360 LSASS.EXE 4112 SMSS.EXE 4884 WINLOGON.EXE 4576 SMSS.EXE 3388 4k51k4.exe 4444 CSRSS.EXE 2608 IExplorer.exe 4036 SERVICES.EXE 4448 WINLOGON.EXE 504 LSASS.EXE 4988 CSRSS.EXE 4864 SMSS.EXE 1492 SERVICES.EXE 4692 LSASS.EXE 1916 SMSS.EXE 2336 4k51k4.exe 316 IExplorer.exe 2040 WINLOGON.EXE 220 4k51k4.exe 3948 IExplorer.exe 3316 WINLOGON.EXE 784 CSRSS.EXE 3588 SERVICES.EXE -
resource yara_rule behavioral2/memory/3796-132-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x0006000000022f58-136.dat upx behavioral2/files/0x0006000000022f58-137.dat upx behavioral2/files/0x0006000000022f5c-141.dat upx behavioral2/files/0x0006000000022f5c-142.dat upx behavioral2/files/0x0006000000022f5e-146.dat upx behavioral2/files/0x0006000000022f5e-147.dat upx behavioral2/files/0x0006000000022f5f-151.dat upx behavioral2/files/0x0006000000022f5f-152.dat upx behavioral2/memory/3796-153-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4976-154-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4896-155-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1816-158-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4968-157-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x0006000000022f60-161.dat upx behavioral2/files/0x0006000000022f60-162.dat upx behavioral2/files/0x0006000000022f61-165.dat upx behavioral2/files/0x0006000000022f5a-168.dat upx behavioral2/files/0x0006000000022f5b-169.dat upx behavioral2/files/0x0006000000022f59-167.dat upx behavioral2/files/0x0006000000022f5d-171.dat upx behavioral2/files/0x0006000000022f62-166.dat upx behavioral2/files/0x0006000000022f61-173.dat upx behavioral2/files/0x0006000000022f58-176.dat upx behavioral2/files/0x0006000000022f5a-183.dat upx behavioral2/files/0x0006000000022f5d-185.dat upx behavioral2/files/0x0006000000022f5b-184.dat upx behavioral2/files/0x0006000000022f62-188.dat upx behavioral2/files/0x0006000000022f59-182.dat upx behavioral2/files/0x0006000000022f62-181.dat upx behavioral2/files/0x0006000000022f59-190.dat upx behavioral2/files/0x0006000000022f5b-193.dat upx behavioral2/files/0x0006000000022f5a-191.dat upx behavioral2/files/0x0006000000022f5c-198.dat upx behavioral2/memory/1904-199-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x0006000000022f5d-200.dat upx behavioral2/files/0x0006000000022f58-196.dat upx behavioral2/memory/3532-204-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/1436-207-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/228-210-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2252-211-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x0006000000022f5c-212.dat upx behavioral2/memory/4600-209-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x0006000000022f5a-215.dat upx behavioral2/files/0x0006000000022f59-214.dat upx behavioral2/files/0x0006000000022f5e-219.dat upx behavioral2/files/0x0006000000022f5b-223.dat upx behavioral2/memory/5056-224-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x0006000000022f5a-221.dat upx behavioral2/files/0x0006000000022f5d-227.dat upx behavioral2/files/0x0006000000022f5d-226.dat upx behavioral2/files/0x0006000000022f59-220.dat upx behavioral2/files/0x0006000000022f5b-218.dat upx behavioral2/memory/4496-229-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x0006000000022f5e-230.dat upx behavioral2/files/0x0006000000022f5f-233.dat upx behavioral2/memory/3424-236-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x0006000000022f5f-240.dat upx behavioral2/memory/4564-239-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x0006000000022f60-244.dat upx behavioral2/files/0x0006000000022f5a-247.dat upx behavioral2/files/0x0006000000022f5b-249.dat upx behavioral2/files/0x0006000000022f59-246.dat upx behavioral2/files/0x0006000000022f59-251.dat upx -
Loads dropped DLL 16 IoCs
pid Process 1904 4k51k4.exe 228 4k51k4.exe 3804 4k51k4.exe 400 4k51k4.exe 1312 4k51k4.exe 2656 4k51k4.exe 3388 4k51k4.exe 2336 4k51k4.exe 220 4k51k4.exe 4700 4k51k4.exe 2388 4k51k4.exe 4464 4k51k4.exe 5024 4k51k4.exe 1312 4k51k4.exe 3004 4k51k4.exe 3012 4k51k4.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ 4k51k4.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ LSASS.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" LSASS.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4k51k4 = "C:\\Windows\\4k51k4.exe" WINLOGON.EXE -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\desktop.ini 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe File created C:\desktop.ini 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 4k51k4.exe File opened (read-only) \??\W: IExplorer.exe File opened (read-only) \??\T: 4k51k4.exe File opened (read-only) \??\Q: SERVICES.EXE File opened (read-only) \??\Q: 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe File opened (read-only) \??\L: 4k51k4.exe File opened (read-only) \??\P: WINLOGON.EXE File opened (read-only) \??\W: SMSS.EXE File opened (read-only) \??\G: 4k51k4.exe File opened (read-only) \??\L: IExplorer.exe File opened (read-only) \??\N: SERVICES.EXE File opened (read-only) \??\M: 4k51k4.exe File opened (read-only) \??\K: CSRSS.EXE File opened (read-only) \??\V: SERVICES.EXE File opened (read-only) \??\B: SMSS.EXE File opened (read-only) \??\T: 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe File opened (read-only) \??\U: 4k51k4.exe File opened (read-only) \??\K: LSASS.EXE File opened (read-only) \??\L: SMSS.EXE File opened (read-only) \??\P: IExplorer.exe File opened (read-only) \??\P: SMSS.EXE File opened (read-only) \??\Y: SMSS.EXE File opened (read-only) \??\H: SERVICES.EXE File opened (read-only) \??\L: SERVICES.EXE File opened (read-only) \??\N: 4k51k4.exe File opened (read-only) \??\I: CSRSS.EXE File opened (read-only) \??\B: WINLOGON.EXE File opened (read-only) \??\U: WINLOGON.EXE File opened (read-only) \??\M: SMSS.EXE File opened (read-only) \??\E: 4k51k4.exe File opened (read-only) \??\N: 4k51k4.exe File opened (read-only) \??\T: LSASS.EXE File opened (read-only) \??\X: IExplorer.exe File opened (read-only) \??\Y: WINLOGON.EXE File opened (read-only) \??\P: SMSS.EXE File opened (read-only) \??\N: SERVICES.EXE File opened (read-only) \??\S: IExplorer.exe File opened (read-only) \??\W: WINLOGON.EXE File opened (read-only) \??\S: SERVICES.EXE File opened (read-only) \??\T: CSRSS.EXE File opened (read-only) \??\W: 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe File opened (read-only) \??\T: 4k51k4.exe File opened (read-only) \??\X: IExplorer.exe File opened (read-only) \??\H: IExplorer.exe File opened (read-only) \??\R: 4k51k4.exe File opened (read-only) \??\P: CSRSS.EXE File opened (read-only) \??\L: SMSS.EXE File opened (read-only) \??\I: 4k51k4.exe File opened (read-only) \??\J: 4k51k4.exe File opened (read-only) \??\Z: CSRSS.EXE File opened (read-only) \??\E: SERVICES.EXE File opened (read-only) \??\S: LSASS.EXE File opened (read-only) \??\S: IExplorer.exe File opened (read-only) \??\M: LSASS.EXE File opened (read-only) \??\X: 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe File opened (read-only) \??\F: IExplorer.exe File opened (read-only) \??\U: LSASS.EXE File opened (read-only) \??\G: SMSS.EXE File opened (read-only) \??\X: SERVICES.EXE File opened (read-only) \??\Q: SERVICES.EXE File opened (read-only) \??\Y: IExplorer.exe File opened (read-only) \??\K: SERVICES.EXE File opened (read-only) \??\N: LSASS.EXE File opened (read-only) \??\K: SMSS.EXE -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\IExplorer.exe WINLOGON.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe SMSS.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe SMSS.EXE File opened for modification C:\Windows\SysWOW64\shell.exe 4k51k4.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 4k51k4.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr SMSS.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr 4k51k4.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe WINLOGON.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe 4k51k4.exe File created C:\Windows\SysWOW64\IExplorer.exe 4k51k4.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe WINLOGON.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\shell.exe 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe SERVICES.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe SMSS.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe SERVICES.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\MrHelloween.scr 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe File created C:\Windows\SysWOW64\IExplorer.exe 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr SERVICES.EXE File created C:\Windows\SysWOW64\IExplorer.exe SMSS.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr CSRSS.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe 4k51k4.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr WINLOGON.EXE File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe SMSS.EXE File opened for modification C:\Windows\SysWOW64\shell.exe 4k51k4.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe CSRSS.EXE File opened for modification C:\Windows\SysWOW64\MrHelloween.scr SMSS.EXE File opened for modification C:\Windows\SysWOW64\IExplorer.exe SERVICES.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr WINLOGON.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File created C:\Windows\SysWOW64\IExplorer.exe IExplorer.exe File opened for modification C:\Windows\SysWOW64\shell.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\SysWOW64\MrHelloween.scr 4k51k4.exe File created C:\Windows\SysWOW64\IExplorer.exe CSRSS.EXE File created C:\Windows\SysWOW64\IExplorer.exe SERVICES.EXE -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\4k51k4.exe CSRSS.EXE File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe SERVICES.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe File opened for modification C:\Windows\4k51k4.exe SERVICES.EXE File created C:\Windows\4k51k4.exe LSASS.EXE File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe IExplorer.exe File opened for modification C:\Windows\4k51k4.exe WINLOGON.EXE File created C:\Windows\4k51k4.exe WINLOGON.EXE File opened for modification C:\Windows\4k51k4.exe LSASS.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe CSRSS.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe IExplorer.exe File opened for modification C:\Windows\4k51k4.exe SMSS.EXE File created C:\Windows\4k51k4.exe SMSS.EXE File opened for modification C:\Windows\4k51k4.exe 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe SMSS.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe SERVICES.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe CSRSS.EXE File created C:\Windows\4k51k4.exe SMSS.EXE File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe WINLOGON.EXE File created C:\Windows\4k51k4.exe 4k51k4.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe SERVICES.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe 4k51k4.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe 4k51k4.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe 4k51k4.exe File created C:\Windows\4k51k4.exe WINLOGON.EXE File opened for modification C:\Windows\4k51k4.exe 4k51k4.exe File opened for modification C:\Windows\4k51k4.exe IExplorer.exe File opened for modification C:\Windows\4k51k4.exe CSRSS.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File created C:\Windows\4k51k4.exe IExplorer.exe File created C:\Windows\4k51k4.exe LSASS.EXE File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\4k51k4.exe LSASS.EXE File created C:\Windows\msvbvm60.dll IExplorer.exe File opened for modification C:\Windows\msvbvm60.dll IExplorer.exe -
Modifies Control Panel 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ LSASS.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" 4k51k4.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 4k51k4.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 4k51k4.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" IExplorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 4k51k4.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\MRHELL~1.SCR" 4k51k4.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ IExplorer.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" LSASS.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 4k51k4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" SMSS.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe -
Suspicious behavior: GetForegroundWindowSpam 7 IoCs
pid Process 220 4k51k4.exe 784 CSRSS.EXE 3316 WINLOGON.EXE 3948 IExplorer.exe 3588 SERVICES.EXE 2056 LSASS.EXE 2836 SMSS.EXE -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 4976 4k51k4.exe 4896 IExplorer.exe 4968 WINLOGON.EXE 1816 CSRSS.EXE 3532 SERVICES.EXE 1436 LSASS.EXE 1904 4k51k4.exe 4600 SMSS.EXE 2252 IExplorer.exe 228 4k51k4.exe 5056 IExplorer.exe 4496 WINLOGON.EXE 3424 WINLOGON.EXE 4564 CSRSS.EXE 460 CSRSS.EXE 4780 SERVICES.EXE 3584 SERVICES.EXE 2908 LSASS.EXE 4688 LSASS.EXE 1784 SMSS.EXE 3000 SMSS.EXE 3804 4k51k4.exe 1116 IExplorer.exe 2256 WINLOGON.EXE 400 4k51k4.exe 1312 4k51k4.exe 3216 CSRSS.EXE 4224 IExplorer.exe 840 IExplorer.exe 4516 SERVICES.EXE 60 WINLOGON.EXE 5080 WINLOGON.EXE 1120 CSRSS.EXE 2144 LSASS.EXE 1728 CSRSS.EXE 2480 SERVICES.EXE 4204 SMSS.EXE 2656 4k51k4.exe 1964 SERVICES.EXE 3180 LSASS.EXE 3192 IExplorer.exe 1360 LSASS.EXE 4112 SMSS.EXE 4884 WINLOGON.EXE 4576 SMSS.EXE 3388 4k51k4.exe 4444 CSRSS.EXE 2608 IExplorer.exe 4036 SERVICES.EXE 4448 WINLOGON.EXE 504 LSASS.EXE 4988 CSRSS.EXE 4864 SMSS.EXE 1492 SERVICES.EXE 4692 LSASS.EXE 1916 SMSS.EXE 2336 4k51k4.exe 316 IExplorer.exe 2040 WINLOGON.EXE 220 4k51k4.exe 3948 IExplorer.exe 3316 WINLOGON.EXE 784 CSRSS.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3796 wrote to memory of 4976 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 80 PID 3796 wrote to memory of 4976 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 80 PID 3796 wrote to memory of 4976 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 80 PID 3796 wrote to memory of 4896 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 81 PID 3796 wrote to memory of 4896 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 81 PID 3796 wrote to memory of 4896 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 81 PID 3796 wrote to memory of 4968 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 82 PID 3796 wrote to memory of 4968 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 82 PID 3796 wrote to memory of 4968 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 82 PID 3796 wrote to memory of 1816 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 83 PID 3796 wrote to memory of 1816 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 83 PID 3796 wrote to memory of 1816 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 83 PID 3796 wrote to memory of 3532 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 84 PID 3796 wrote to memory of 3532 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 84 PID 3796 wrote to memory of 3532 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 84 PID 3796 wrote to memory of 1436 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 85 PID 3796 wrote to memory of 1436 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 85 PID 3796 wrote to memory of 1436 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 85 PID 4976 wrote to memory of 1904 4976 4k51k4.exe 86 PID 4976 wrote to memory of 1904 4976 4k51k4.exe 86 PID 4976 wrote to memory of 1904 4976 4k51k4.exe 86 PID 3796 wrote to memory of 4600 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 87 PID 3796 wrote to memory of 4600 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 87 PID 3796 wrote to memory of 4600 3796 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe 87 PID 4896 wrote to memory of 228 4896 IExplorer.exe 88 PID 4896 wrote to memory of 228 4896 IExplorer.exe 88 PID 4896 wrote to memory of 228 4896 IExplorer.exe 88 PID 4976 wrote to memory of 2252 4976 4k51k4.exe 89 PID 4976 wrote to memory of 2252 4976 4k51k4.exe 89 PID 4976 wrote to memory of 2252 4976 4k51k4.exe 89 PID 4896 wrote to memory of 5056 4896 IExplorer.exe 90 PID 4896 wrote to memory of 5056 4896 IExplorer.exe 90 PID 4896 wrote to memory of 5056 4896 IExplorer.exe 90 PID 4976 wrote to memory of 4496 4976 4k51k4.exe 91 PID 4976 wrote to memory of 4496 4976 4k51k4.exe 91 PID 4976 wrote to memory of 4496 4976 4k51k4.exe 91 PID 4896 wrote to memory of 3424 4896 IExplorer.exe 92 PID 4896 wrote to memory of 3424 4896 IExplorer.exe 92 PID 4896 wrote to memory of 3424 4896 IExplorer.exe 92 PID 4976 wrote to memory of 4564 4976 4k51k4.exe 93 PID 4976 wrote to memory of 4564 4976 4k51k4.exe 93 PID 4976 wrote to memory of 4564 4976 4k51k4.exe 93 PID 4896 wrote to memory of 460 4896 IExplorer.exe 94 PID 4896 wrote to memory of 460 4896 IExplorer.exe 94 PID 4896 wrote to memory of 460 4896 IExplorer.exe 94 PID 4976 wrote to memory of 4780 4976 4k51k4.exe 95 PID 4976 wrote to memory of 4780 4976 4k51k4.exe 95 PID 4976 wrote to memory of 4780 4976 4k51k4.exe 95 PID 4896 wrote to memory of 3584 4896 IExplorer.exe 96 PID 4896 wrote to memory of 3584 4896 IExplorer.exe 96 PID 4896 wrote to memory of 3584 4896 IExplorer.exe 96 PID 4976 wrote to memory of 2908 4976 4k51k4.exe 97 PID 4976 wrote to memory of 2908 4976 4k51k4.exe 97 PID 4976 wrote to memory of 2908 4976 4k51k4.exe 97 PID 4896 wrote to memory of 4688 4896 IExplorer.exe 98 PID 4896 wrote to memory of 4688 4896 IExplorer.exe 98 PID 4896 wrote to memory of 4688 4896 IExplorer.exe 98 PID 4976 wrote to memory of 1784 4976 4k51k4.exe 99 PID 4976 wrote to memory of 1784 4976 4k51k4.exe 99 PID 4976 wrote to memory of 1784 4976 4k51k4.exe 99 PID 4896 wrote to memory of 3000 4896 IExplorer.exe 100 PID 4896 wrote to memory of 3000 4896 IExplorer.exe 100 PID 4896 wrote to memory of 3000 4896 IExplorer.exe 100 PID 4968 wrote to memory of 3804 4968 WINLOGON.EXE 101 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4k51k4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" IExplorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" IExplorer.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 4k51k4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" CSRSS.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe"C:\Users\Admin\AppData\Local\Temp\01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe"1⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3796 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4976 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1904
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2252
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4496
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4564
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4780
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2908
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1784
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4896 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:228
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:5056
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3424
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:460
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3584
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4688
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3000
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4968 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3804
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1116
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2256
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3216
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4516
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2144
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4204
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1816 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:400
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4224
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:60
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1120
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2480
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3180
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4112
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3532 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1312
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:840
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5080
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1728
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1964
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1360
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4576
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1436 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3192
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4884
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4444
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4036
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:504
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4864
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4600 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3388 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2336
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe4⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:316
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"4⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2040
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2608
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4448
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4988
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4692
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1916
-
-
-
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:220 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Loads dropped DLL
PID:4700
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:4320
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵PID:4780
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵PID:1924
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵PID:1784
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵PID:4736
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵PID:3556
-
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3948 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Loads dropped DLL
PID:2388
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:2440
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵PID:3468
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵PID:4688
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵PID:3000
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵PID:756
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵PID:4560
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3316 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Loads dropped DLL
PID:4464
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1160
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵PID:4232
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵PID:1908
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵PID:1340
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵PID:1324
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵PID:4052
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:784 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Loads dropped DLL
PID:5024
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:536
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵PID:1052
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵PID:1728
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵PID:4936
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵PID:1360
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵PID:4344
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- System policy modification
PID:3588 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Loads dropped DLL
PID:1312
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:5100
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵PID:2136
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵PID:3744
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵PID:328
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵PID:4796
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵PID:2444
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- System policy modification
PID:2056 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Loads dropped DLL
PID:3004
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:2092
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵PID:3760
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵PID:4532
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵PID:448
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵PID:4940
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵PID:1508
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- System policy modification
PID:2836 -
C:\Windows\4k51k4.exeC:\Windows\4k51k4.exe3⤵
- Loads dropped DLL
PID:3012
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe3⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:2212
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵PID:2956
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵PID:4444
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵PID:3868
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵PID:4860
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵PID:4388
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5ce33122f0eb63b19fc4266bae61ffa47
SHA1cc1666ad627f34cae8b4626db603d5748c969376
SHA2564a6589d26ccfbf85e8cb337f431736812a2f584a21c57341a3acc3005786c8c0
SHA512a1ff38d7f020b1a8de4d0a6e28378d60e1776e6e88df5458cf8c862aaed3fe665d853968169ecb4b87eae3ef4b24081f1ebcce0cff1f9868ac2bdc5b59c55608
-
Filesize
91KB
MD5f1394525c6971740d061fe3325b76999
SHA1cfb983f966905b02028f5eee9316dfbe2117c2c5
SHA256d9257df1cba1e05500240705e87e32415b8ad309721c9dcef23f9cf56c5c10a2
SHA51234b91029f8cacbb82d66a8652a1554a2d5f6fd06321fc3527201f5a56364c6950453c44f712827dccb73a198cb44d02a18d6f15d0906f3e1af432423503005d4
-
Filesize
91KB
MD57936588f942da567c3ff3612688db220
SHA1c3810a9ef438357383d042c664b0138cee1f790a
SHA256b0cd20b86dceb65e17112d40a63b04f84266920de1971546fca820728cc74b61
SHA5128d6f9bf5a1ca95fdf437f4474c3792eed6d34705166ff52b61c10d67149623c42c55b9d745d27f15b6817a37430aca4569c31c8bb49deade426de24f5271b8d9
-
Filesize
91KB
MD559b607773202ec998861842db794c56d
SHA16c5b0411f165e2e3cabeca09f207cba876bb6e03
SHA25612da5271ec6f3164ca3b17f0245d6097c46bec31d5a014412d06ce089453b6b9
SHA512d4e4a70ed9619eef67f41c6228923d665045ceaab1097bdfedb70a45285181e3d33ccc3b601821341fb5982b4ec7c141edb66f6a055567f84bf0a7122caede4f
-
Filesize
91KB
MD54d10880b7c0bf2329353ea061bcec2b1
SHA1c9eb4ae56032303621b631a3552d2aca1cded68f
SHA256a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358
SHA512904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df
-
Filesize
91KB
MD5c2158470a1a5635fd0ee946f564f4dbe
SHA1ff199d9fc26ee101d42bbd7f99339dd6c744259a
SHA2569e276f9ceb887a6c35251508d712d0e7df2e1ac55182d857571616195da5fb11
SHA512b2933cc3d82464e1fdfd4c9c6eeffa6e2f4375dce13281942866d732d58b5b6d0f7ccbbfeaac90c9c7117f53da75aca1576e8b465138d1d17fdc819473e52e95
-
Filesize
91KB
MD5ecc0986716210e54c041753042ec5368
SHA1076cd951f37f576b59600726a63166006b50722d
SHA256d1c7913825da850e70a3e226a33920452c42985b296f41ad10f89506e706dd4a
SHA5122977ce7ed39e45c9c4c916159bd61901beb42f5c15ea37acb0a90c8b56de3b64450e6247bf5294e8f881470ba2726fc43306a1b031901fce167bccc6a5f394d9
-
Filesize
91KB
MD5ecc0986716210e54c041753042ec5368
SHA1076cd951f37f576b59600726a63166006b50722d
SHA256d1c7913825da850e70a3e226a33920452c42985b296f41ad10f89506e706dd4a
SHA5122977ce7ed39e45c9c4c916159bd61901beb42f5c15ea37acb0a90c8b56de3b64450e6247bf5294e8f881470ba2726fc43306a1b031901fce167bccc6a5f394d9
-
Filesize
442B
MD5001424d7974b9a3995af292f6fcfe171
SHA1f8201d49d594d712c8450679c856c2e8307d2337
SHA256660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d
SHA51266ec4330b9a9961a2926516ec96d71e3311f67a61e6ac3070303453d26fa4fdc9524296f583c0e2179414f1a0d795cedbd094a83f5ecd3f1faa0cccfe4276657
-
Filesize
442B
MD5001424d7974b9a3995af292f6fcfe171
SHA1f8201d49d594d712c8450679c856c2e8307d2337
SHA256660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d
SHA51266ec4330b9a9961a2926516ec96d71e3311f67a61e6ac3070303453d26fa4fdc9524296f583c0e2179414f1a0d795cedbd094a83f5ecd3f1faa0cccfe4276657
-
Filesize
91KB
MD559b607773202ec998861842db794c56d
SHA16c5b0411f165e2e3cabeca09f207cba876bb6e03
SHA25612da5271ec6f3164ca3b17f0245d6097c46bec31d5a014412d06ce089453b6b9
SHA512d4e4a70ed9619eef67f41c6228923d665045ceaab1097bdfedb70a45285181e3d33ccc3b601821341fb5982b4ec7c141edb66f6a055567f84bf0a7122caede4f
-
Filesize
91KB
MD559b607773202ec998861842db794c56d
SHA16c5b0411f165e2e3cabeca09f207cba876bb6e03
SHA25612da5271ec6f3164ca3b17f0245d6097c46bec31d5a014412d06ce089453b6b9
SHA512d4e4a70ed9619eef67f41c6228923d665045ceaab1097bdfedb70a45285181e3d33ccc3b601821341fb5982b4ec7c141edb66f6a055567f84bf0a7122caede4f
-
Filesize
91KB
MD559b607773202ec998861842db794c56d
SHA16c5b0411f165e2e3cabeca09f207cba876bb6e03
SHA25612da5271ec6f3164ca3b17f0245d6097c46bec31d5a014412d06ce089453b6b9
SHA512d4e4a70ed9619eef67f41c6228923d665045ceaab1097bdfedb70a45285181e3d33ccc3b601821341fb5982b4ec7c141edb66f6a055567f84bf0a7122caede4f
-
Filesize
91KB
MD5c2158470a1a5635fd0ee946f564f4dbe
SHA1ff199d9fc26ee101d42bbd7f99339dd6c744259a
SHA2569e276f9ceb887a6c35251508d712d0e7df2e1ac55182d857571616195da5fb11
SHA512b2933cc3d82464e1fdfd4c9c6eeffa6e2f4375dce13281942866d732d58b5b6d0f7ccbbfeaac90c9c7117f53da75aca1576e8b465138d1d17fdc819473e52e95
-
Filesize
91KB
MD5c2158470a1a5635fd0ee946f564f4dbe
SHA1ff199d9fc26ee101d42bbd7f99339dd6c744259a
SHA2569e276f9ceb887a6c35251508d712d0e7df2e1ac55182d857571616195da5fb11
SHA512b2933cc3d82464e1fdfd4c9c6eeffa6e2f4375dce13281942866d732d58b5b6d0f7ccbbfeaac90c9c7117f53da75aca1576e8b465138d1d17fdc819473e52e95
-
Filesize
91KB
MD5c2158470a1a5635fd0ee946f564f4dbe
SHA1ff199d9fc26ee101d42bbd7f99339dd6c744259a
SHA2569e276f9ceb887a6c35251508d712d0e7df2e1ac55182d857571616195da5fb11
SHA512b2933cc3d82464e1fdfd4c9c6eeffa6e2f4375dce13281942866d732d58b5b6d0f7ccbbfeaac90c9c7117f53da75aca1576e8b465138d1d17fdc819473e52e95
-
Filesize
91KB
MD54d10880b7c0bf2329353ea061bcec2b1
SHA1c9eb4ae56032303621b631a3552d2aca1cded68f
SHA256a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358
SHA512904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df
-
Filesize
91KB
MD54d10880b7c0bf2329353ea061bcec2b1
SHA1c9eb4ae56032303621b631a3552d2aca1cded68f
SHA256a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358
SHA512904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df
-
Filesize
91KB
MD54d10880b7c0bf2329353ea061bcec2b1
SHA1c9eb4ae56032303621b631a3552d2aca1cded68f
SHA256a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358
SHA512904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df
-
Filesize
91KB
MD5595bd8e2c441e81836e94a80b2a2635c
SHA116c9f5407a41763a0693f2358dc463348a512725
SHA2564cfb77c8cd15035e8d237461dbccdfd472edfd0b78e4748746ca7061b03faad8
SHA5128c8c8d490a0f54b0216877d4ada18a0f21be4624d91ceba3d74a37808889527f73334b5bc57a9839ac5af19f15a5f62d34b509fd181ae630a1c7329a93f1e81e
-
Filesize
91KB
MD57936588f942da567c3ff3612688db220
SHA1c3810a9ef438357383d042c664b0138cee1f790a
SHA256b0cd20b86dceb65e17112d40a63b04f84266920de1971546fca820728cc74b61
SHA5128d6f9bf5a1ca95fdf437f4474c3792eed6d34705166ff52b61c10d67149623c42c55b9d745d27f15b6817a37430aca4569c31c8bb49deade426de24f5271b8d9
-
Filesize
91KB
MD57936588f942da567c3ff3612688db220
SHA1c3810a9ef438357383d042c664b0138cee1f790a
SHA256b0cd20b86dceb65e17112d40a63b04f84266920de1971546fca820728cc74b61
SHA5128d6f9bf5a1ca95fdf437f4474c3792eed6d34705166ff52b61c10d67149623c42c55b9d745d27f15b6817a37430aca4569c31c8bb49deade426de24f5271b8d9
-
Filesize
91KB
MD57936588f942da567c3ff3612688db220
SHA1c3810a9ef438357383d042c664b0138cee1f790a
SHA256b0cd20b86dceb65e17112d40a63b04f84266920de1971546fca820728cc74b61
SHA5128d6f9bf5a1ca95fdf437f4474c3792eed6d34705166ff52b61c10d67149623c42c55b9d745d27f15b6817a37430aca4569c31c8bb49deade426de24f5271b8d9
-
Filesize
91KB
MD559b607773202ec998861842db794c56d
SHA16c5b0411f165e2e3cabeca09f207cba876bb6e03
SHA25612da5271ec6f3164ca3b17f0245d6097c46bec31d5a014412d06ce089453b6b9
SHA512d4e4a70ed9619eef67f41c6228923d665045ceaab1097bdfedb70a45285181e3d33ccc3b601821341fb5982b4ec7c141edb66f6a055567f84bf0a7122caede4f
-
Filesize
91KB
MD5c2158470a1a5635fd0ee946f564f4dbe
SHA1ff199d9fc26ee101d42bbd7f99339dd6c744259a
SHA2569e276f9ceb887a6c35251508d712d0e7df2e1ac55182d857571616195da5fb11
SHA512b2933cc3d82464e1fdfd4c9c6eeffa6e2f4375dce13281942866d732d58b5b6d0f7ccbbfeaac90c9c7117f53da75aca1576e8b465138d1d17fdc819473e52e95
-
Filesize
91KB
MD54d10880b7c0bf2329353ea061bcec2b1
SHA1c9eb4ae56032303621b631a3552d2aca1cded68f
SHA256a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358
SHA512904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df
-
Filesize
91KB
MD52c774d072cdca7f03b165fd4264cda28
SHA12a2446c012fd3d9b7e8f2658caf70e9c1759b4de
SHA256b2fac7b5e87e055431c83356e005cfceb95bb457d36cd489578bd91a503126bb
SHA512afa96977ac47ec34f8502098164bd4fcb484e3cd767b20f50a4971bbb3b761524a9e0066f59e36bdf6e3726880eed2dbe23d165f182fbf799cb88bebc1144e03
-
Filesize
91KB
MD5595bd8e2c441e81836e94a80b2a2635c
SHA116c9f5407a41763a0693f2358dc463348a512725
SHA2564cfb77c8cd15035e8d237461dbccdfd472edfd0b78e4748746ca7061b03faad8
SHA5128c8c8d490a0f54b0216877d4ada18a0f21be4624d91ceba3d74a37808889527f73334b5bc57a9839ac5af19f15a5f62d34b509fd181ae630a1c7329a93f1e81e
-
Filesize
91KB
MD57936588f942da567c3ff3612688db220
SHA1c3810a9ef438357383d042c664b0138cee1f790a
SHA256b0cd20b86dceb65e17112d40a63b04f84266920de1971546fca820728cc74b61
SHA5128d6f9bf5a1ca95fdf437f4474c3792eed6d34705166ff52b61c10d67149623c42c55b9d745d27f15b6817a37430aca4569c31c8bb49deade426de24f5271b8d9
-
Filesize
91KB
MD5f7f709be6b9160c6ea5483589e35d685
SHA1a7adf30418b75b8f13d48e27a9a96de9b78ff87b
SHA2563603eb9549896f034eaa102a5c35b242340165959cb678b312ceee77e63dc069
SHA51277fbdca550949f39f44643eaf0341dfd976c92457fb29f2c94eb4b3c1fb6a12fb6c2d5e41a7be66633fbcd07dac2f5f4bc97064f3d8c97a738b90fa7d9aae9d7
-
Filesize
91KB
MD5f1394525c6971740d061fe3325b76999
SHA1cfb983f966905b02028f5eee9316dfbe2117c2c5
SHA256d9257df1cba1e05500240705e87e32415b8ad309721c9dcef23f9cf56c5c10a2
SHA51234b91029f8cacbb82d66a8652a1554a2d5f6fd06321fc3527201f5a56364c6950453c44f712827dccb73a198cb44d02a18d6f15d0906f3e1af432423503005d4
-
Filesize
91KB
MD57936588f942da567c3ff3612688db220
SHA1c3810a9ef438357383d042c664b0138cee1f790a
SHA256b0cd20b86dceb65e17112d40a63b04f84266920de1971546fca820728cc74b61
SHA5128d6f9bf5a1ca95fdf437f4474c3792eed6d34705166ff52b61c10d67149623c42c55b9d745d27f15b6817a37430aca4569c31c8bb49deade426de24f5271b8d9
-
Filesize
91KB
MD54d10880b7c0bf2329353ea061bcec2b1
SHA1c9eb4ae56032303621b631a3552d2aca1cded68f
SHA256a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358
SHA512904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df
-
Filesize
91KB
MD54d10880b7c0bf2329353ea061bcec2b1
SHA1c9eb4ae56032303621b631a3552d2aca1cded68f
SHA256a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358
SHA512904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df
-
Filesize
91KB
MD5915996a4fe788f6d4b11bec80b9966cf
SHA1cdea50e319c708812090d6ec1ced37246229c858
SHA256318afc03aa4d90bd809fd4aedc6d18876d80505cef5883b1708fabde12b5a6a2
SHA5121c56e49e65fa4017f5a9af5ef512cdde01e2de5e0cca3b29140caf666acac45c91ba80f58205acc04dbee0d7860b99101e59d195529d532bee44076c0633af7b
-
Filesize
91KB
MD5915996a4fe788f6d4b11bec80b9966cf
SHA1cdea50e319c708812090d6ec1ced37246229c858
SHA256318afc03aa4d90bd809fd4aedc6d18876d80505cef5883b1708fabde12b5a6a2
SHA5121c56e49e65fa4017f5a9af5ef512cdde01e2de5e0cca3b29140caf666acac45c91ba80f58205acc04dbee0d7860b99101e59d195529d532bee44076c0633af7b
-
Filesize
91KB
MD5595bd8e2c441e81836e94a80b2a2635c
SHA116c9f5407a41763a0693f2358dc463348a512725
SHA2564cfb77c8cd15035e8d237461dbccdfd472edfd0b78e4748746ca7061b03faad8
SHA5128c8c8d490a0f54b0216877d4ada18a0f21be4624d91ceba3d74a37808889527f73334b5bc57a9839ac5af19f15a5f62d34b509fd181ae630a1c7329a93f1e81e
-
Filesize
91KB
MD5ce33122f0eb63b19fc4266bae61ffa47
SHA1cc1666ad627f34cae8b4626db603d5748c969376
SHA2564a6589d26ccfbf85e8cb337f431736812a2f584a21c57341a3acc3005786c8c0
SHA512a1ff38d7f020b1a8de4d0a6e28378d60e1776e6e88df5458cf8c862aaed3fe665d853968169ecb4b87eae3ef4b24081f1ebcce0cff1f9868ac2bdc5b59c55608
-
Filesize
91KB
MD5ce33122f0eb63b19fc4266bae61ffa47
SHA1cc1666ad627f34cae8b4626db603d5748c969376
SHA2564a6589d26ccfbf85e8cb337f431736812a2f584a21c57341a3acc3005786c8c0
SHA512a1ff38d7f020b1a8de4d0a6e28378d60e1776e6e88df5458cf8c862aaed3fe665d853968169ecb4b87eae3ef4b24081f1ebcce0cff1f9868ac2bdc5b59c55608
-
Filesize
91KB
MD5ce33122f0eb63b19fc4266bae61ffa47
SHA1cc1666ad627f34cae8b4626db603d5748c969376
SHA2564a6589d26ccfbf85e8cb337f431736812a2f584a21c57341a3acc3005786c8c0
SHA512a1ff38d7f020b1a8de4d0a6e28378d60e1776e6e88df5458cf8c862aaed3fe665d853968169ecb4b87eae3ef4b24081f1ebcce0cff1f9868ac2bdc5b59c55608
-
Filesize
91KB
MD5ce33122f0eb63b19fc4266bae61ffa47
SHA1cc1666ad627f34cae8b4626db603d5748c969376
SHA2564a6589d26ccfbf85e8cb337f431736812a2f584a21c57341a3acc3005786c8c0
SHA512a1ff38d7f020b1a8de4d0a6e28378d60e1776e6e88df5458cf8c862aaed3fe665d853968169ecb4b87eae3ef4b24081f1ebcce0cff1f9868ac2bdc5b59c55608
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
91KB
MD5f1394525c6971740d061fe3325b76999
SHA1cfb983f966905b02028f5eee9316dfbe2117c2c5
SHA256d9257df1cba1e05500240705e87e32415b8ad309721c9dcef23f9cf56c5c10a2
SHA51234b91029f8cacbb82d66a8652a1554a2d5f6fd06321fc3527201f5a56364c6950453c44f712827dccb73a198cb44d02a18d6f15d0906f3e1af432423503005d4
-
Filesize
91KB
MD5f1394525c6971740d061fe3325b76999
SHA1cfb983f966905b02028f5eee9316dfbe2117c2c5
SHA256d9257df1cba1e05500240705e87e32415b8ad309721c9dcef23f9cf56c5c10a2
SHA51234b91029f8cacbb82d66a8652a1554a2d5f6fd06321fc3527201f5a56364c6950453c44f712827dccb73a198cb44d02a18d6f15d0906f3e1af432423503005d4
-
Filesize
91KB
MD5f1394525c6971740d061fe3325b76999
SHA1cfb983f966905b02028f5eee9316dfbe2117c2c5
SHA256d9257df1cba1e05500240705e87e32415b8ad309721c9dcef23f9cf56c5c10a2
SHA51234b91029f8cacbb82d66a8652a1554a2d5f6fd06321fc3527201f5a56364c6950453c44f712827dccb73a198cb44d02a18d6f15d0906f3e1af432423503005d4
-
Filesize
91KB
MD5f1394525c6971740d061fe3325b76999
SHA1cfb983f966905b02028f5eee9316dfbe2117c2c5
SHA256d9257df1cba1e05500240705e87e32415b8ad309721c9dcef23f9cf56c5c10a2
SHA51234b91029f8cacbb82d66a8652a1554a2d5f6fd06321fc3527201f5a56364c6950453c44f712827dccb73a198cb44d02a18d6f15d0906f3e1af432423503005d4
-
Filesize
91KB
MD5ce33122f0eb63b19fc4266bae61ffa47
SHA1cc1666ad627f34cae8b4626db603d5748c969376
SHA2564a6589d26ccfbf85e8cb337f431736812a2f584a21c57341a3acc3005786c8c0
SHA512a1ff38d7f020b1a8de4d0a6e28378d60e1776e6e88df5458cf8c862aaed3fe665d853968169ecb4b87eae3ef4b24081f1ebcce0cff1f9868ac2bdc5b59c55608
-
Filesize
91KB
MD5f1394525c6971740d061fe3325b76999
SHA1cfb983f966905b02028f5eee9316dfbe2117c2c5
SHA256d9257df1cba1e05500240705e87e32415b8ad309721c9dcef23f9cf56c5c10a2
SHA51234b91029f8cacbb82d66a8652a1554a2d5f6fd06321fc3527201f5a56364c6950453c44f712827dccb73a198cb44d02a18d6f15d0906f3e1af432423503005d4
-
Filesize
91KB
MD57936588f942da567c3ff3612688db220
SHA1c3810a9ef438357383d042c664b0138cee1f790a
SHA256b0cd20b86dceb65e17112d40a63b04f84266920de1971546fca820728cc74b61
SHA5128d6f9bf5a1ca95fdf437f4474c3792eed6d34705166ff52b61c10d67149623c42c55b9d745d27f15b6817a37430aca4569c31c8bb49deade426de24f5271b8d9
-
Filesize
91KB
MD54d10880b7c0bf2329353ea061bcec2b1
SHA1c9eb4ae56032303621b631a3552d2aca1cded68f
SHA256a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358
SHA512904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df
-
Filesize
91KB
MD54d10880b7c0bf2329353ea061bcec2b1
SHA1c9eb4ae56032303621b631a3552d2aca1cded68f
SHA256a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358
SHA512904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df
-
Filesize
91KB
MD5c2158470a1a5635fd0ee946f564f4dbe
SHA1ff199d9fc26ee101d42bbd7f99339dd6c744259a
SHA2569e276f9ceb887a6c35251508d712d0e7df2e1ac55182d857571616195da5fb11
SHA512b2933cc3d82464e1fdfd4c9c6eeffa6e2f4375dce13281942866d732d58b5b6d0f7ccbbfeaac90c9c7117f53da75aca1576e8b465138d1d17fdc819473e52e95
-
Filesize
91KB
MD52f7ac24e7dc52f9e53dcde73804615dc
SHA1e09a9367753a3883e50d6ebcb6b59eca782ea76a
SHA256c320cfe2df6dfed2d1e66cfc66e7a92d2cf3baa996f04c396ea1309cf9d27672
SHA512b808a1d179fe1a4e93d95600006007fc9f21315abd6a404c55a44496e8c95a699a0bff4b35777862f2f72a617c9e3a47c1a06bc6c163248301abcf1305f45443
-
Filesize
91KB
MD5595bd8e2c441e81836e94a80b2a2635c
SHA116c9f5407a41763a0693f2358dc463348a512725
SHA2564cfb77c8cd15035e8d237461dbccdfd472edfd0b78e4748746ca7061b03faad8
SHA5128c8c8d490a0f54b0216877d4ada18a0f21be4624d91ceba3d74a37808889527f73334b5bc57a9839ac5af19f15a5f62d34b509fd181ae630a1c7329a93f1e81e
-
Filesize
91KB
MD5ce33122f0eb63b19fc4266bae61ffa47
SHA1cc1666ad627f34cae8b4626db603d5748c969376
SHA2564a6589d26ccfbf85e8cb337f431736812a2f584a21c57341a3acc3005786c8c0
SHA512a1ff38d7f020b1a8de4d0a6e28378d60e1776e6e88df5458cf8c862aaed3fe665d853968169ecb4b87eae3ef4b24081f1ebcce0cff1f9868ac2bdc5b59c55608
-
Filesize
91KB
MD5f1394525c6971740d061fe3325b76999
SHA1cfb983f966905b02028f5eee9316dfbe2117c2c5
SHA256d9257df1cba1e05500240705e87e32415b8ad309721c9dcef23f9cf56c5c10a2
SHA51234b91029f8cacbb82d66a8652a1554a2d5f6fd06321fc3527201f5a56364c6950453c44f712827dccb73a198cb44d02a18d6f15d0906f3e1af432423503005d4
-
Filesize
91KB
MD57936588f942da567c3ff3612688db220
SHA1c3810a9ef438357383d042c664b0138cee1f790a
SHA256b0cd20b86dceb65e17112d40a63b04f84266920de1971546fca820728cc74b61
SHA5128d6f9bf5a1ca95fdf437f4474c3792eed6d34705166ff52b61c10d67149623c42c55b9d745d27f15b6817a37430aca4569c31c8bb49deade426de24f5271b8d9
-
Filesize
91KB
MD559b607773202ec998861842db794c56d
SHA16c5b0411f165e2e3cabeca09f207cba876bb6e03
SHA25612da5271ec6f3164ca3b17f0245d6097c46bec31d5a014412d06ce089453b6b9
SHA512d4e4a70ed9619eef67f41c6228923d665045ceaab1097bdfedb70a45285181e3d33ccc3b601821341fb5982b4ec7c141edb66f6a055567f84bf0a7122caede4f
-
Filesize
91KB
MD54d10880b7c0bf2329353ea061bcec2b1
SHA1c9eb4ae56032303621b631a3552d2aca1cded68f
SHA256a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358
SHA512904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df
-
Filesize
91KB
MD5c2158470a1a5635fd0ee946f564f4dbe
SHA1ff199d9fc26ee101d42bbd7f99339dd6c744259a
SHA2569e276f9ceb887a6c35251508d712d0e7df2e1ac55182d857571616195da5fb11
SHA512b2933cc3d82464e1fdfd4c9c6eeffa6e2f4375dce13281942866d732d58b5b6d0f7ccbbfeaac90c9c7117f53da75aca1576e8b465138d1d17fdc819473e52e95
-
Filesize
91KB
MD5338d0a313c4ce00695481bebfeecef5d
SHA1afa9b7b79a01f054c0482e2bba7b1d24a0e740f4
SHA2566d4e808759c421dd20c32aa5182e962cab51579be770ef38108f4fe09a3b5c55
SHA51265ae3a271781da2c4741ea821c8ce3d5ab685b053986e475ed51d21b1c8ec18440323c224bff29dc51238fb143fc4ac684c68da09f859e3facffe1755b339c59
-
Filesize
91KB
MD5595bd8e2c441e81836e94a80b2a2635c
SHA116c9f5407a41763a0693f2358dc463348a512725
SHA2564cfb77c8cd15035e8d237461dbccdfd472edfd0b78e4748746ca7061b03faad8
SHA5128c8c8d490a0f54b0216877d4ada18a0f21be4624d91ceba3d74a37808889527f73334b5bc57a9839ac5af19f15a5f62d34b509fd181ae630a1c7329a93f1e81e
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a
-
Filesize
1.4MB
MD525f62c02619174b35851b0e0455b3d94
SHA14e8ee85157f1769f6e3f61c0acbe59072209da71
SHA256898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2
SHA512f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a