Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 00:43

General

  • Target

    01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe

  • Size

    91KB

  • MD5

    a0df06c55b38036c7b739e78c6465fa0

  • SHA1

    8cb28d9ec6f480519503b68488287b569e1f5c14

  • SHA256

    01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487

  • SHA512

    b762fd0176b7e9fcf3898599f646b1efbda399d13e29c02557f0d042e99e3676efed931aa04d4824489a2a75f621251da591607d731b929dccdaafa84f0efd1f

  • SSDEEP

    1536:yOcjUpkWb2TTghpwulOcjUpkWb2TTghpwuh:yOcjWJuutlOcjWJuuth

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 36 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 18 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 18 IoCs
  • Disables RegEdit via registry modification 36 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 64 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 16 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies Control Panel 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 7 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe
    "C:\Users\Admin\AppData\Local\Temp\01da81373378f7d072d3fe8f2c03b1f5fc10d2530ea2d2275ee6483af3301487.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies system executable filetype association
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3796
    • C:\Windows\4k51k4.exe
      C:\Windows\4k51k4.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies system executable filetype association
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4976
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1904
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2252
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4496
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4564
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4780
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2908
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1784
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies system executable filetype association
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4896
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:228
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:5056
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3424
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:460
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3584
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4688
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3000
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies system executable filetype association
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4968
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3804
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:1116
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2256
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3216
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4516
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2144
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4204
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies system executable filetype association
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1816
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:400
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:4224
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:60
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1120
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2480
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3180
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4112
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies system executable filetype association
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:3532
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1312
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:840
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:5080
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1728
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1964
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1360
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4576
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies system executable filetype association
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1436
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2656
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:3192
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4884
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4444
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4036
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:504
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4864
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies system executable filetype association
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:4600
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies system executable filetype association
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:3388
        • C:\Windows\4k51k4.exe
          C:\Windows\4k51k4.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2336
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies system executable filetype association
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Modifies Control Panel
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:316
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies system executable filetype association
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Adds Run key to start application
          • Modifies Control Panel
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:2040
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2608
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4448
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4988
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1492
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4692
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1916
    • C:\Windows\4k51k4.exe
      C:\Windows\4k51k4.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies system executable filetype association
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:220
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Loads dropped DLL
        PID:4700
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        PID:4320
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
          PID:4780
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
          3⤵
            PID:1924
          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
            "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
            3⤵
              PID:1784
            • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
              "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
              3⤵
                PID:4736
              • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
                "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
                3⤵
                  PID:3556
              • C:\Windows\SysWOW64\IExplorer.exe
                C:\Windows\system32\IExplorer.exe
                2⤵
                • Modifies WinLogon for persistence
                • Modifies system executable filetype association
                • Modifies visibility of file extensions in Explorer
                • Modifies visiblity of hidden/system files in Explorer
                • Disables RegEdit via registry modification
                • Executes dropped EXE
                • Adds Run key to start application
                • Enumerates connected drives
                • Drops file in System32 directory
                • Drops file in Windows directory
                • Modifies Control Panel
                • Modifies registry class
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:3948
                • C:\Windows\4k51k4.exe
                  C:\Windows\4k51k4.exe
                  3⤵
                  • Loads dropped DLL
                  PID:2388
                • C:\Windows\SysWOW64\IExplorer.exe
                  C:\Windows\system32\IExplorer.exe
                  3⤵
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  PID:2440
                • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
                  "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
                  3⤵
                    PID:3468
                  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
                    "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
                    3⤵
                      PID:4688
                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
                      3⤵
                        PID:3000
                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
                        3⤵
                          PID:756
                        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
                          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
                          3⤵
                            PID:4560
                        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
                          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
                          2⤵
                          • Modifies WinLogon for persistence
                          • Modifies system executable filetype association
                          • Modifies visibility of file extensions in Explorer
                          • Modifies visiblity of hidden/system files in Explorer
                          • Disables RegEdit via registry modification
                          • Executes dropped EXE
                          • Adds Run key to start application
                          • Enumerates connected drives
                          • Drops file in System32 directory
                          • Drops file in Windows directory
                          • Modifies Control Panel
                          • Modifies registry class
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of SetWindowsHookEx
                          • System policy modification
                          PID:3316
                          • C:\Windows\4k51k4.exe
                            C:\Windows\4k51k4.exe
                            3⤵
                            • Loads dropped DLL
                            PID:4464
                          • C:\Windows\SysWOW64\IExplorer.exe
                            C:\Windows\system32\IExplorer.exe
                            3⤵
                            • Drops file in System32 directory
                            • Drops file in Windows directory
                            PID:1160
                          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
                            "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
                            3⤵
                              PID:4232
                            • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
                              "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
                              3⤵
                                PID:1908
                              • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
                                "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
                                3⤵
                                  PID:1340
                                • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
                                  "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
                                  3⤵
                                    PID:1324
                                  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
                                    "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
                                    3⤵
                                      PID:4052
                                  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
                                    "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
                                    2⤵
                                    • Modifies WinLogon for persistence
                                    • Modifies system executable filetype association
                                    • Modifies visibility of file extensions in Explorer
                                    • Modifies visiblity of hidden/system files in Explorer
                                    • Disables RegEdit via registry modification
                                    • Executes dropped EXE
                                    • Adds Run key to start application
                                    • Enumerates connected drives
                                    • Drops file in System32 directory
                                    • Drops file in Windows directory
                                    • Modifies Control Panel
                                    • Modifies registry class
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    • Suspicious use of SetWindowsHookEx
                                    • System policy modification
                                    PID:784
                                    • C:\Windows\4k51k4.exe
                                      C:\Windows\4k51k4.exe
                                      3⤵
                                      • Loads dropped DLL
                                      PID:5024
                                    • C:\Windows\SysWOW64\IExplorer.exe
                                      C:\Windows\system32\IExplorer.exe
                                      3⤵
                                      • Drops file in System32 directory
                                      • Drops file in Windows directory
                                      PID:536
                                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
                                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
                                      3⤵
                                        PID:1052
                                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
                                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
                                        3⤵
                                          PID:1728
                                        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
                                          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
                                          3⤵
                                            PID:4936
                                          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
                                            "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
                                            3⤵
                                              PID:1360
                                            • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
                                              "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
                                              3⤵
                                                PID:4344
                                            • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
                                              "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
                                              2⤵
                                              • Modifies WinLogon for persistence
                                              • Modifies system executable filetype association
                                              • Modifies visibility of file extensions in Explorer
                                              • Modifies visiblity of hidden/system files in Explorer
                                              • Disables RegEdit via registry modification
                                              • Executes dropped EXE
                                              • Adds Run key to start application
                                              • Enumerates connected drives
                                              • Drops file in System32 directory
                                              • Drops file in Windows directory
                                              • Modifies Control Panel
                                              • Modifies registry class
                                              • Suspicious behavior: GetForegroundWindowSpam
                                              • System policy modification
                                              PID:3588
                                              • C:\Windows\4k51k4.exe
                                                C:\Windows\4k51k4.exe
                                                3⤵
                                                • Loads dropped DLL
                                                PID:1312
                                              • C:\Windows\SysWOW64\IExplorer.exe
                                                C:\Windows\system32\IExplorer.exe
                                                3⤵
                                                • Drops file in System32 directory
                                                • Drops file in Windows directory
                                                PID:5100
                                              • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
                                                "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
                                                3⤵
                                                  PID:2136
                                                • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
                                                  "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
                                                  3⤵
                                                    PID:3744
                                                  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
                                                    "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
                                                    3⤵
                                                      PID:328
                                                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
                                                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
                                                      3⤵
                                                        PID:4796
                                                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
                                                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
                                                        3⤵
                                                          PID:2444
                                                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
                                                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
                                                        2⤵
                                                        • Modifies WinLogon for persistence
                                                        • Modifies system executable filetype association
                                                        • Modifies visibility of file extensions in Explorer
                                                        • Modifies visiblity of hidden/system files in Explorer
                                                        • Disables RegEdit via registry modification
                                                        • Adds Run key to start application
                                                        • Enumerates connected drives
                                                        • Drops file in System32 directory
                                                        • Drops file in Windows directory
                                                        • Modifies Control Panel
                                                        • Modifies registry class
                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                        • System policy modification
                                                        PID:2056
                                                        • C:\Windows\4k51k4.exe
                                                          C:\Windows\4k51k4.exe
                                                          3⤵
                                                          • Loads dropped DLL
                                                          PID:3004
                                                        • C:\Windows\SysWOW64\IExplorer.exe
                                                          C:\Windows\system32\IExplorer.exe
                                                          3⤵
                                                          • Drops file in System32 directory
                                                          • Drops file in Windows directory
                                                          PID:2092
                                                        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
                                                          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
                                                          3⤵
                                                            PID:3760
                                                          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
                                                            "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
                                                            3⤵
                                                              PID:4532
                                                            • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
                                                              "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
                                                              3⤵
                                                                PID:448
                                                              • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
                                                                "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
                                                                3⤵
                                                                  PID:4940
                                                                • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
                                                                  "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
                                                                  3⤵
                                                                    PID:1508
                                                                • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
                                                                  "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
                                                                  2⤵
                                                                  • Modifies WinLogon for persistence
                                                                  • Modifies system executable filetype association
                                                                  • Modifies visibility of file extensions in Explorer
                                                                  • Modifies visiblity of hidden/system files in Explorer
                                                                  • Disables RegEdit via registry modification
                                                                  • Adds Run key to start application
                                                                  • Enumerates connected drives
                                                                  • Drops file in System32 directory
                                                                  • Drops file in Windows directory
                                                                  • Modifies Control Panel
                                                                  • Modifies registry class
                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                  • System policy modification
                                                                  PID:2836
                                                                  • C:\Windows\4k51k4.exe
                                                                    C:\Windows\4k51k4.exe
                                                                    3⤵
                                                                    • Loads dropped DLL
                                                                    PID:3012
                                                                  • C:\Windows\SysWOW64\IExplorer.exe
                                                                    C:\Windows\system32\IExplorer.exe
                                                                    3⤵
                                                                    • Drops file in System32 directory
                                                                    • Drops file in Windows directory
                                                                    PID:2212
                                                                  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
                                                                    "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
                                                                    3⤵
                                                                      PID:2956
                                                                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
                                                                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
                                                                      3⤵
                                                                        PID:4444
                                                                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
                                                                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
                                                                        3⤵
                                                                          PID:3868
                                                                        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
                                                                          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
                                                                          3⤵
                                                                            PID:4860
                                                                          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
                                                                            "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
                                                                            3⤵
                                                                              PID:4388

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v6

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\4k51k4.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          ce33122f0eb63b19fc4266bae61ffa47

                                                                          SHA1

                                                                          cc1666ad627f34cae8b4626db603d5748c969376

                                                                          SHA256

                                                                          4a6589d26ccfbf85e8cb337f431736812a2f584a21c57341a3acc3005786c8c0

                                                                          SHA512

                                                                          a1ff38d7f020b1a8de4d0a6e28378d60e1776e6e88df5458cf8c862aaed3fe665d853968169ecb4b87eae3ef4b24081f1ebcce0cff1f9868ac2bdc5b59c55608

                                                                        • C:\4k51k4.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          f1394525c6971740d061fe3325b76999

                                                                          SHA1

                                                                          cfb983f966905b02028f5eee9316dfbe2117c2c5

                                                                          SHA256

                                                                          d9257df1cba1e05500240705e87e32415b8ad309721c9dcef23f9cf56c5c10a2

                                                                          SHA512

                                                                          34b91029f8cacbb82d66a8652a1554a2d5f6fd06321fc3527201f5a56364c6950453c44f712827dccb73a198cb44d02a18d6f15d0906f3e1af432423503005d4

                                                                        • C:\4k51k4.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          7936588f942da567c3ff3612688db220

                                                                          SHA1

                                                                          c3810a9ef438357383d042c664b0138cee1f790a

                                                                          SHA256

                                                                          b0cd20b86dceb65e17112d40a63b04f84266920de1971546fca820728cc74b61

                                                                          SHA512

                                                                          8d6f9bf5a1ca95fdf437f4474c3792eed6d34705166ff52b61c10d67149623c42c55b9d745d27f15b6817a37430aca4569c31c8bb49deade426de24f5271b8d9

                                                                        • C:\4k51k4.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          59b607773202ec998861842db794c56d

                                                                          SHA1

                                                                          6c5b0411f165e2e3cabeca09f207cba876bb6e03

                                                                          SHA256

                                                                          12da5271ec6f3164ca3b17f0245d6097c46bec31d5a014412d06ce089453b6b9

                                                                          SHA512

                                                                          d4e4a70ed9619eef67f41c6228923d665045ceaab1097bdfedb70a45285181e3d33ccc3b601821341fb5982b4ec7c141edb66f6a055567f84bf0a7122caede4f

                                                                        • C:\4k51k4.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          4d10880b7c0bf2329353ea061bcec2b1

                                                                          SHA1

                                                                          c9eb4ae56032303621b631a3552d2aca1cded68f

                                                                          SHA256

                                                                          a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358

                                                                          SHA512

                                                                          904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df

                                                                        • C:\4k51k4.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          c2158470a1a5635fd0ee946f564f4dbe

                                                                          SHA1

                                                                          ff199d9fc26ee101d42bbd7f99339dd6c744259a

                                                                          SHA256

                                                                          9e276f9ceb887a6c35251508d712d0e7df2e1ac55182d857571616195da5fb11

                                                                          SHA512

                                                                          b2933cc3d82464e1fdfd4c9c6eeffa6e2f4375dce13281942866d732d58b5b6d0f7ccbbfeaac90c9c7117f53da75aca1576e8b465138d1d17fdc819473e52e95

                                                                        • C:\4k51k4.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          ecc0986716210e54c041753042ec5368

                                                                          SHA1

                                                                          076cd951f37f576b59600726a63166006b50722d

                                                                          SHA256

                                                                          d1c7913825da850e70a3e226a33920452c42985b296f41ad10f89506e706dd4a

                                                                          SHA512

                                                                          2977ce7ed39e45c9c4c916159bd61901beb42f5c15ea37acb0a90c8b56de3b64450e6247bf5294e8f881470ba2726fc43306a1b031901fce167bccc6a5f394d9

                                                                        • C:\4k51k4.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          ecc0986716210e54c041753042ec5368

                                                                          SHA1

                                                                          076cd951f37f576b59600726a63166006b50722d

                                                                          SHA256

                                                                          d1c7913825da850e70a3e226a33920452c42985b296f41ad10f89506e706dd4a

                                                                          SHA512

                                                                          2977ce7ed39e45c9c4c916159bd61901beb42f5c15ea37acb0a90c8b56de3b64450e6247bf5294e8f881470ba2726fc43306a1b031901fce167bccc6a5f394d9

                                                                        • C:\Puisi.txt

                                                                          Filesize

                                                                          442B

                                                                          MD5

                                                                          001424d7974b9a3995af292f6fcfe171

                                                                          SHA1

                                                                          f8201d49d594d712c8450679c856c2e8307d2337

                                                                          SHA256

                                                                          660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d

                                                                          SHA512

                                                                          66ec4330b9a9961a2926516ec96d71e3311f67a61e6ac3070303453d26fa4fdc9524296f583c0e2179414f1a0d795cedbd094a83f5ecd3f1faa0cccfe4276657

                                                                        • C:\Puisi.txt

                                                                          Filesize

                                                                          442B

                                                                          MD5

                                                                          001424d7974b9a3995af292f6fcfe171

                                                                          SHA1

                                                                          f8201d49d594d712c8450679c856c2e8307d2337

                                                                          SHA256

                                                                          660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d

                                                                          SHA512

                                                                          66ec4330b9a9961a2926516ec96d71e3311f67a61e6ac3070303453d26fa4fdc9524296f583c0e2179414f1a0d795cedbd094a83f5ecd3f1faa0cccfe4276657

                                                                        • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          59b607773202ec998861842db794c56d

                                                                          SHA1

                                                                          6c5b0411f165e2e3cabeca09f207cba876bb6e03

                                                                          SHA256

                                                                          12da5271ec6f3164ca3b17f0245d6097c46bec31d5a014412d06ce089453b6b9

                                                                          SHA512

                                                                          d4e4a70ed9619eef67f41c6228923d665045ceaab1097bdfedb70a45285181e3d33ccc3b601821341fb5982b4ec7c141edb66f6a055567f84bf0a7122caede4f

                                                                        • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          59b607773202ec998861842db794c56d

                                                                          SHA1

                                                                          6c5b0411f165e2e3cabeca09f207cba876bb6e03

                                                                          SHA256

                                                                          12da5271ec6f3164ca3b17f0245d6097c46bec31d5a014412d06ce089453b6b9

                                                                          SHA512

                                                                          d4e4a70ed9619eef67f41c6228923d665045ceaab1097bdfedb70a45285181e3d33ccc3b601821341fb5982b4ec7c141edb66f6a055567f84bf0a7122caede4f

                                                                        • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          59b607773202ec998861842db794c56d

                                                                          SHA1

                                                                          6c5b0411f165e2e3cabeca09f207cba876bb6e03

                                                                          SHA256

                                                                          12da5271ec6f3164ca3b17f0245d6097c46bec31d5a014412d06ce089453b6b9

                                                                          SHA512

                                                                          d4e4a70ed9619eef67f41c6228923d665045ceaab1097bdfedb70a45285181e3d33ccc3b601821341fb5982b4ec7c141edb66f6a055567f84bf0a7122caede4f

                                                                        • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          c2158470a1a5635fd0ee946f564f4dbe

                                                                          SHA1

                                                                          ff199d9fc26ee101d42bbd7f99339dd6c744259a

                                                                          SHA256

                                                                          9e276f9ceb887a6c35251508d712d0e7df2e1ac55182d857571616195da5fb11

                                                                          SHA512

                                                                          b2933cc3d82464e1fdfd4c9c6eeffa6e2f4375dce13281942866d732d58b5b6d0f7ccbbfeaac90c9c7117f53da75aca1576e8b465138d1d17fdc819473e52e95

                                                                        • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          c2158470a1a5635fd0ee946f564f4dbe

                                                                          SHA1

                                                                          ff199d9fc26ee101d42bbd7f99339dd6c744259a

                                                                          SHA256

                                                                          9e276f9ceb887a6c35251508d712d0e7df2e1ac55182d857571616195da5fb11

                                                                          SHA512

                                                                          b2933cc3d82464e1fdfd4c9c6eeffa6e2f4375dce13281942866d732d58b5b6d0f7ccbbfeaac90c9c7117f53da75aca1576e8b465138d1d17fdc819473e52e95

                                                                        • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          c2158470a1a5635fd0ee946f564f4dbe

                                                                          SHA1

                                                                          ff199d9fc26ee101d42bbd7f99339dd6c744259a

                                                                          SHA256

                                                                          9e276f9ceb887a6c35251508d712d0e7df2e1ac55182d857571616195da5fb11

                                                                          SHA512

                                                                          b2933cc3d82464e1fdfd4c9c6eeffa6e2f4375dce13281942866d732d58b5b6d0f7ccbbfeaac90c9c7117f53da75aca1576e8b465138d1d17fdc819473e52e95

                                                                        • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          4d10880b7c0bf2329353ea061bcec2b1

                                                                          SHA1

                                                                          c9eb4ae56032303621b631a3552d2aca1cded68f

                                                                          SHA256

                                                                          a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358

                                                                          SHA512

                                                                          904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df

                                                                        • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          4d10880b7c0bf2329353ea061bcec2b1

                                                                          SHA1

                                                                          c9eb4ae56032303621b631a3552d2aca1cded68f

                                                                          SHA256

                                                                          a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358

                                                                          SHA512

                                                                          904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df

                                                                        • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          4d10880b7c0bf2329353ea061bcec2b1

                                                                          SHA1

                                                                          c9eb4ae56032303621b631a3552d2aca1cded68f

                                                                          SHA256

                                                                          a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358

                                                                          SHA512

                                                                          904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df

                                                                        • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          595bd8e2c441e81836e94a80b2a2635c

                                                                          SHA1

                                                                          16c9f5407a41763a0693f2358dc463348a512725

                                                                          SHA256

                                                                          4cfb77c8cd15035e8d237461dbccdfd472edfd0b78e4748746ca7061b03faad8

                                                                          SHA512

                                                                          8c8c8d490a0f54b0216877d4ada18a0f21be4624d91ceba3d74a37808889527f73334b5bc57a9839ac5af19f15a5f62d34b509fd181ae630a1c7329a93f1e81e

                                                                        • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          7936588f942da567c3ff3612688db220

                                                                          SHA1

                                                                          c3810a9ef438357383d042c664b0138cee1f790a

                                                                          SHA256

                                                                          b0cd20b86dceb65e17112d40a63b04f84266920de1971546fca820728cc74b61

                                                                          SHA512

                                                                          8d6f9bf5a1ca95fdf437f4474c3792eed6d34705166ff52b61c10d67149623c42c55b9d745d27f15b6817a37430aca4569c31c8bb49deade426de24f5271b8d9

                                                                        • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          7936588f942da567c3ff3612688db220

                                                                          SHA1

                                                                          c3810a9ef438357383d042c664b0138cee1f790a

                                                                          SHA256

                                                                          b0cd20b86dceb65e17112d40a63b04f84266920de1971546fca820728cc74b61

                                                                          SHA512

                                                                          8d6f9bf5a1ca95fdf437f4474c3792eed6d34705166ff52b61c10d67149623c42c55b9d745d27f15b6817a37430aca4569c31c8bb49deade426de24f5271b8d9

                                                                        • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          7936588f942da567c3ff3612688db220

                                                                          SHA1

                                                                          c3810a9ef438357383d042c664b0138cee1f790a

                                                                          SHA256

                                                                          b0cd20b86dceb65e17112d40a63b04f84266920de1971546fca820728cc74b61

                                                                          SHA512

                                                                          8d6f9bf5a1ca95fdf437f4474c3792eed6d34705166ff52b61c10d67149623c42c55b9d745d27f15b6817a37430aca4569c31c8bb49deade426de24f5271b8d9

                                                                        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          59b607773202ec998861842db794c56d

                                                                          SHA1

                                                                          6c5b0411f165e2e3cabeca09f207cba876bb6e03

                                                                          SHA256

                                                                          12da5271ec6f3164ca3b17f0245d6097c46bec31d5a014412d06ce089453b6b9

                                                                          SHA512

                                                                          d4e4a70ed9619eef67f41c6228923d665045ceaab1097bdfedb70a45285181e3d33ccc3b601821341fb5982b4ec7c141edb66f6a055567f84bf0a7122caede4f

                                                                        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          c2158470a1a5635fd0ee946f564f4dbe

                                                                          SHA1

                                                                          ff199d9fc26ee101d42bbd7f99339dd6c744259a

                                                                          SHA256

                                                                          9e276f9ceb887a6c35251508d712d0e7df2e1ac55182d857571616195da5fb11

                                                                          SHA512

                                                                          b2933cc3d82464e1fdfd4c9c6eeffa6e2f4375dce13281942866d732d58b5b6d0f7ccbbfeaac90c9c7117f53da75aca1576e8b465138d1d17fdc819473e52e95

                                                                        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          4d10880b7c0bf2329353ea061bcec2b1

                                                                          SHA1

                                                                          c9eb4ae56032303621b631a3552d2aca1cded68f

                                                                          SHA256

                                                                          a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358

                                                                          SHA512

                                                                          904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df

                                                                        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          2c774d072cdca7f03b165fd4264cda28

                                                                          SHA1

                                                                          2a2446c012fd3d9b7e8f2658caf70e9c1759b4de

                                                                          SHA256

                                                                          b2fac7b5e87e055431c83356e005cfceb95bb457d36cd489578bd91a503126bb

                                                                          SHA512

                                                                          afa96977ac47ec34f8502098164bd4fcb484e3cd767b20f50a4971bbb3b761524a9e0066f59e36bdf6e3726880eed2dbe23d165f182fbf799cb88bebc1144e03

                                                                        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          595bd8e2c441e81836e94a80b2a2635c

                                                                          SHA1

                                                                          16c9f5407a41763a0693f2358dc463348a512725

                                                                          SHA256

                                                                          4cfb77c8cd15035e8d237461dbccdfd472edfd0b78e4748746ca7061b03faad8

                                                                          SHA512

                                                                          8c8c8d490a0f54b0216877d4ada18a0f21be4624d91ceba3d74a37808889527f73334b5bc57a9839ac5af19f15a5f62d34b509fd181ae630a1c7329a93f1e81e

                                                                        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          7936588f942da567c3ff3612688db220

                                                                          SHA1

                                                                          c3810a9ef438357383d042c664b0138cee1f790a

                                                                          SHA256

                                                                          b0cd20b86dceb65e17112d40a63b04f84266920de1971546fca820728cc74b61

                                                                          SHA512

                                                                          8d6f9bf5a1ca95fdf437f4474c3792eed6d34705166ff52b61c10d67149623c42c55b9d745d27f15b6817a37430aca4569c31c8bb49deade426de24f5271b8d9

                                                                        • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          f7f709be6b9160c6ea5483589e35d685

                                                                          SHA1

                                                                          a7adf30418b75b8f13d48e27a9a96de9b78ff87b

                                                                          SHA256

                                                                          3603eb9549896f034eaa102a5c35b242340165959cb678b312ceee77e63dc069

                                                                          SHA512

                                                                          77fbdca550949f39f44643eaf0341dfd976c92457fb29f2c94eb4b3c1fb6a12fb6c2d5e41a7be66633fbcd07dac2f5f4bc97064f3d8c97a738b90fa7d9aae9d7

                                                                        • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          f1394525c6971740d061fe3325b76999

                                                                          SHA1

                                                                          cfb983f966905b02028f5eee9316dfbe2117c2c5

                                                                          SHA256

                                                                          d9257df1cba1e05500240705e87e32415b8ad309721c9dcef23f9cf56c5c10a2

                                                                          SHA512

                                                                          34b91029f8cacbb82d66a8652a1554a2d5f6fd06321fc3527201f5a56364c6950453c44f712827dccb73a198cb44d02a18d6f15d0906f3e1af432423503005d4

                                                                        • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          7936588f942da567c3ff3612688db220

                                                                          SHA1

                                                                          c3810a9ef438357383d042c664b0138cee1f790a

                                                                          SHA256

                                                                          b0cd20b86dceb65e17112d40a63b04f84266920de1971546fca820728cc74b61

                                                                          SHA512

                                                                          8d6f9bf5a1ca95fdf437f4474c3792eed6d34705166ff52b61c10d67149623c42c55b9d745d27f15b6817a37430aca4569c31c8bb49deade426de24f5271b8d9

                                                                        • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          4d10880b7c0bf2329353ea061bcec2b1

                                                                          SHA1

                                                                          c9eb4ae56032303621b631a3552d2aca1cded68f

                                                                          SHA256

                                                                          a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358

                                                                          SHA512

                                                                          904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df

                                                                        • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          4d10880b7c0bf2329353ea061bcec2b1

                                                                          SHA1

                                                                          c9eb4ae56032303621b631a3552d2aca1cded68f

                                                                          SHA256

                                                                          a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358

                                                                          SHA512

                                                                          904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df

                                                                        • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          915996a4fe788f6d4b11bec80b9966cf

                                                                          SHA1

                                                                          cdea50e319c708812090d6ec1ced37246229c858

                                                                          SHA256

                                                                          318afc03aa4d90bd809fd4aedc6d18876d80505cef5883b1708fabde12b5a6a2

                                                                          SHA512

                                                                          1c56e49e65fa4017f5a9af5ef512cdde01e2de5e0cca3b29140caf666acac45c91ba80f58205acc04dbee0d7860b99101e59d195529d532bee44076c0633af7b

                                                                        • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          915996a4fe788f6d4b11bec80b9966cf

                                                                          SHA1

                                                                          cdea50e319c708812090d6ec1ced37246229c858

                                                                          SHA256

                                                                          318afc03aa4d90bd809fd4aedc6d18876d80505cef5883b1708fabde12b5a6a2

                                                                          SHA512

                                                                          1c56e49e65fa4017f5a9af5ef512cdde01e2de5e0cca3b29140caf666acac45c91ba80f58205acc04dbee0d7860b99101e59d195529d532bee44076c0633af7b

                                                                        • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          595bd8e2c441e81836e94a80b2a2635c

                                                                          SHA1

                                                                          16c9f5407a41763a0693f2358dc463348a512725

                                                                          SHA256

                                                                          4cfb77c8cd15035e8d237461dbccdfd472edfd0b78e4748746ca7061b03faad8

                                                                          SHA512

                                                                          8c8c8d490a0f54b0216877d4ada18a0f21be4624d91ceba3d74a37808889527f73334b5bc57a9839ac5af19f15a5f62d34b509fd181ae630a1c7329a93f1e81e

                                                                        • C:\Windows\4k51k4.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          ce33122f0eb63b19fc4266bae61ffa47

                                                                          SHA1

                                                                          cc1666ad627f34cae8b4626db603d5748c969376

                                                                          SHA256

                                                                          4a6589d26ccfbf85e8cb337f431736812a2f584a21c57341a3acc3005786c8c0

                                                                          SHA512

                                                                          a1ff38d7f020b1a8de4d0a6e28378d60e1776e6e88df5458cf8c862aaed3fe665d853968169ecb4b87eae3ef4b24081f1ebcce0cff1f9868ac2bdc5b59c55608

                                                                        • C:\Windows\4k51k4.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          ce33122f0eb63b19fc4266bae61ffa47

                                                                          SHA1

                                                                          cc1666ad627f34cae8b4626db603d5748c969376

                                                                          SHA256

                                                                          4a6589d26ccfbf85e8cb337f431736812a2f584a21c57341a3acc3005786c8c0

                                                                          SHA512

                                                                          a1ff38d7f020b1a8de4d0a6e28378d60e1776e6e88df5458cf8c862aaed3fe665d853968169ecb4b87eae3ef4b24081f1ebcce0cff1f9868ac2bdc5b59c55608

                                                                        • C:\Windows\4k51k4.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          ce33122f0eb63b19fc4266bae61ffa47

                                                                          SHA1

                                                                          cc1666ad627f34cae8b4626db603d5748c969376

                                                                          SHA256

                                                                          4a6589d26ccfbf85e8cb337f431736812a2f584a21c57341a3acc3005786c8c0

                                                                          SHA512

                                                                          a1ff38d7f020b1a8de4d0a6e28378d60e1776e6e88df5458cf8c862aaed3fe665d853968169ecb4b87eae3ef4b24081f1ebcce0cff1f9868ac2bdc5b59c55608

                                                                        • C:\Windows\4k51k4.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          ce33122f0eb63b19fc4266bae61ffa47

                                                                          SHA1

                                                                          cc1666ad627f34cae8b4626db603d5748c969376

                                                                          SHA256

                                                                          4a6589d26ccfbf85e8cb337f431736812a2f584a21c57341a3acc3005786c8c0

                                                                          SHA512

                                                                          a1ff38d7f020b1a8de4d0a6e28378d60e1776e6e88df5458cf8c862aaed3fe665d853968169ecb4b87eae3ef4b24081f1ebcce0cff1f9868ac2bdc5b59c55608

                                                                        • C:\Windows\MSVBVM60.DLL

                                                                          Filesize

                                                                          1.4MB

                                                                          MD5

                                                                          25f62c02619174b35851b0e0455b3d94

                                                                          SHA1

                                                                          4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                          SHA256

                                                                          898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                          SHA512

                                                                          f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                        • C:\Windows\SysWOW64\IExplorer.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          f1394525c6971740d061fe3325b76999

                                                                          SHA1

                                                                          cfb983f966905b02028f5eee9316dfbe2117c2c5

                                                                          SHA256

                                                                          d9257df1cba1e05500240705e87e32415b8ad309721c9dcef23f9cf56c5c10a2

                                                                          SHA512

                                                                          34b91029f8cacbb82d66a8652a1554a2d5f6fd06321fc3527201f5a56364c6950453c44f712827dccb73a198cb44d02a18d6f15d0906f3e1af432423503005d4

                                                                        • C:\Windows\SysWOW64\IExplorer.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          f1394525c6971740d061fe3325b76999

                                                                          SHA1

                                                                          cfb983f966905b02028f5eee9316dfbe2117c2c5

                                                                          SHA256

                                                                          d9257df1cba1e05500240705e87e32415b8ad309721c9dcef23f9cf56c5c10a2

                                                                          SHA512

                                                                          34b91029f8cacbb82d66a8652a1554a2d5f6fd06321fc3527201f5a56364c6950453c44f712827dccb73a198cb44d02a18d6f15d0906f3e1af432423503005d4

                                                                        • C:\Windows\SysWOW64\IExplorer.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          f1394525c6971740d061fe3325b76999

                                                                          SHA1

                                                                          cfb983f966905b02028f5eee9316dfbe2117c2c5

                                                                          SHA256

                                                                          d9257df1cba1e05500240705e87e32415b8ad309721c9dcef23f9cf56c5c10a2

                                                                          SHA512

                                                                          34b91029f8cacbb82d66a8652a1554a2d5f6fd06321fc3527201f5a56364c6950453c44f712827dccb73a198cb44d02a18d6f15d0906f3e1af432423503005d4

                                                                        • C:\Windows\SysWOW64\IExplorer.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          f1394525c6971740d061fe3325b76999

                                                                          SHA1

                                                                          cfb983f966905b02028f5eee9316dfbe2117c2c5

                                                                          SHA256

                                                                          d9257df1cba1e05500240705e87e32415b8ad309721c9dcef23f9cf56c5c10a2

                                                                          SHA512

                                                                          34b91029f8cacbb82d66a8652a1554a2d5f6fd06321fc3527201f5a56364c6950453c44f712827dccb73a198cb44d02a18d6f15d0906f3e1af432423503005d4

                                                                        • C:\Windows\SysWOW64\MrHelloween.scr

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          ce33122f0eb63b19fc4266bae61ffa47

                                                                          SHA1

                                                                          cc1666ad627f34cae8b4626db603d5748c969376

                                                                          SHA256

                                                                          4a6589d26ccfbf85e8cb337f431736812a2f584a21c57341a3acc3005786c8c0

                                                                          SHA512

                                                                          a1ff38d7f020b1a8de4d0a6e28378d60e1776e6e88df5458cf8c862aaed3fe665d853968169ecb4b87eae3ef4b24081f1ebcce0cff1f9868ac2bdc5b59c55608

                                                                        • C:\Windows\SysWOW64\MrHelloween.scr

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          f1394525c6971740d061fe3325b76999

                                                                          SHA1

                                                                          cfb983f966905b02028f5eee9316dfbe2117c2c5

                                                                          SHA256

                                                                          d9257df1cba1e05500240705e87e32415b8ad309721c9dcef23f9cf56c5c10a2

                                                                          SHA512

                                                                          34b91029f8cacbb82d66a8652a1554a2d5f6fd06321fc3527201f5a56364c6950453c44f712827dccb73a198cb44d02a18d6f15d0906f3e1af432423503005d4

                                                                        • C:\Windows\SysWOW64\MrHelloween.scr

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          7936588f942da567c3ff3612688db220

                                                                          SHA1

                                                                          c3810a9ef438357383d042c664b0138cee1f790a

                                                                          SHA256

                                                                          b0cd20b86dceb65e17112d40a63b04f84266920de1971546fca820728cc74b61

                                                                          SHA512

                                                                          8d6f9bf5a1ca95fdf437f4474c3792eed6d34705166ff52b61c10d67149623c42c55b9d745d27f15b6817a37430aca4569c31c8bb49deade426de24f5271b8d9

                                                                        • C:\Windows\SysWOW64\MrHelloween.scr

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          4d10880b7c0bf2329353ea061bcec2b1

                                                                          SHA1

                                                                          c9eb4ae56032303621b631a3552d2aca1cded68f

                                                                          SHA256

                                                                          a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358

                                                                          SHA512

                                                                          904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df

                                                                        • C:\Windows\SysWOW64\MrHelloween.scr

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          4d10880b7c0bf2329353ea061bcec2b1

                                                                          SHA1

                                                                          c9eb4ae56032303621b631a3552d2aca1cded68f

                                                                          SHA256

                                                                          a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358

                                                                          SHA512

                                                                          904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df

                                                                        • C:\Windows\SysWOW64\MrHelloween.scr

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          c2158470a1a5635fd0ee946f564f4dbe

                                                                          SHA1

                                                                          ff199d9fc26ee101d42bbd7f99339dd6c744259a

                                                                          SHA256

                                                                          9e276f9ceb887a6c35251508d712d0e7df2e1ac55182d857571616195da5fb11

                                                                          SHA512

                                                                          b2933cc3d82464e1fdfd4c9c6eeffa6e2f4375dce13281942866d732d58b5b6d0f7ccbbfeaac90c9c7117f53da75aca1576e8b465138d1d17fdc819473e52e95

                                                                        • C:\Windows\SysWOW64\MrHelloween.scr

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          2f7ac24e7dc52f9e53dcde73804615dc

                                                                          SHA1

                                                                          e09a9367753a3883e50d6ebcb6b59eca782ea76a

                                                                          SHA256

                                                                          c320cfe2df6dfed2d1e66cfc66e7a92d2cf3baa996f04c396ea1309cf9d27672

                                                                          SHA512

                                                                          b808a1d179fe1a4e93d95600006007fc9f21315abd6a404c55a44496e8c95a699a0bff4b35777862f2f72a617c9e3a47c1a06bc6c163248301abcf1305f45443

                                                                        • C:\Windows\SysWOW64\MrHelloween.scr

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          595bd8e2c441e81836e94a80b2a2635c

                                                                          SHA1

                                                                          16c9f5407a41763a0693f2358dc463348a512725

                                                                          SHA256

                                                                          4cfb77c8cd15035e8d237461dbccdfd472edfd0b78e4748746ca7061b03faad8

                                                                          SHA512

                                                                          8c8c8d490a0f54b0216877d4ada18a0f21be4624d91ceba3d74a37808889527f73334b5bc57a9839ac5af19f15a5f62d34b509fd181ae630a1c7329a93f1e81e

                                                                        • C:\Windows\SysWOW64\shell.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          ce33122f0eb63b19fc4266bae61ffa47

                                                                          SHA1

                                                                          cc1666ad627f34cae8b4626db603d5748c969376

                                                                          SHA256

                                                                          4a6589d26ccfbf85e8cb337f431736812a2f584a21c57341a3acc3005786c8c0

                                                                          SHA512

                                                                          a1ff38d7f020b1a8de4d0a6e28378d60e1776e6e88df5458cf8c862aaed3fe665d853968169ecb4b87eae3ef4b24081f1ebcce0cff1f9868ac2bdc5b59c55608

                                                                        • C:\Windows\SysWOW64\shell.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          f1394525c6971740d061fe3325b76999

                                                                          SHA1

                                                                          cfb983f966905b02028f5eee9316dfbe2117c2c5

                                                                          SHA256

                                                                          d9257df1cba1e05500240705e87e32415b8ad309721c9dcef23f9cf56c5c10a2

                                                                          SHA512

                                                                          34b91029f8cacbb82d66a8652a1554a2d5f6fd06321fc3527201f5a56364c6950453c44f712827dccb73a198cb44d02a18d6f15d0906f3e1af432423503005d4

                                                                        • C:\Windows\SysWOW64\shell.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          7936588f942da567c3ff3612688db220

                                                                          SHA1

                                                                          c3810a9ef438357383d042c664b0138cee1f790a

                                                                          SHA256

                                                                          b0cd20b86dceb65e17112d40a63b04f84266920de1971546fca820728cc74b61

                                                                          SHA512

                                                                          8d6f9bf5a1ca95fdf437f4474c3792eed6d34705166ff52b61c10d67149623c42c55b9d745d27f15b6817a37430aca4569c31c8bb49deade426de24f5271b8d9

                                                                        • C:\Windows\SysWOW64\shell.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          59b607773202ec998861842db794c56d

                                                                          SHA1

                                                                          6c5b0411f165e2e3cabeca09f207cba876bb6e03

                                                                          SHA256

                                                                          12da5271ec6f3164ca3b17f0245d6097c46bec31d5a014412d06ce089453b6b9

                                                                          SHA512

                                                                          d4e4a70ed9619eef67f41c6228923d665045ceaab1097bdfedb70a45285181e3d33ccc3b601821341fb5982b4ec7c141edb66f6a055567f84bf0a7122caede4f

                                                                        • C:\Windows\SysWOW64\shell.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          4d10880b7c0bf2329353ea061bcec2b1

                                                                          SHA1

                                                                          c9eb4ae56032303621b631a3552d2aca1cded68f

                                                                          SHA256

                                                                          a525b5e997525e93e921c2ab3fca6cd6e0812007ff795bf5624ec75dee2cd358

                                                                          SHA512

                                                                          904d5240a9cc24b09bb8e4740eeaea4193b7d9d4a5a52ad9bb063621a99d593c3b795077877e8da6cb660eb5225ef9ddbcd234f4e6798be210b588323a7e07df

                                                                        • C:\Windows\SysWOW64\shell.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          c2158470a1a5635fd0ee946f564f4dbe

                                                                          SHA1

                                                                          ff199d9fc26ee101d42bbd7f99339dd6c744259a

                                                                          SHA256

                                                                          9e276f9ceb887a6c35251508d712d0e7df2e1ac55182d857571616195da5fb11

                                                                          SHA512

                                                                          b2933cc3d82464e1fdfd4c9c6eeffa6e2f4375dce13281942866d732d58b5b6d0f7ccbbfeaac90c9c7117f53da75aca1576e8b465138d1d17fdc819473e52e95

                                                                        • C:\Windows\SysWOW64\shell.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          338d0a313c4ce00695481bebfeecef5d

                                                                          SHA1

                                                                          afa9b7b79a01f054c0482e2bba7b1d24a0e740f4

                                                                          SHA256

                                                                          6d4e808759c421dd20c32aa5182e962cab51579be770ef38108f4fe09a3b5c55

                                                                          SHA512

                                                                          65ae3a271781da2c4741ea821c8ce3d5ab685b053986e475ed51d21b1c8ec18440323c224bff29dc51238fb143fc4ac684c68da09f859e3facffe1755b339c59

                                                                        • C:\Windows\SysWOW64\shell.exe

                                                                          Filesize

                                                                          91KB

                                                                          MD5

                                                                          595bd8e2c441e81836e94a80b2a2635c

                                                                          SHA1

                                                                          16c9f5407a41763a0693f2358dc463348a512725

                                                                          SHA256

                                                                          4cfb77c8cd15035e8d237461dbccdfd472edfd0b78e4748746ca7061b03faad8

                                                                          SHA512

                                                                          8c8c8d490a0f54b0216877d4ada18a0f21be4624d91ceba3d74a37808889527f73334b5bc57a9839ac5af19f15a5f62d34b509fd181ae630a1c7329a93f1e81e

                                                                        • C:\Windows\msvbvm60.dll

                                                                          Filesize

                                                                          1.4MB

                                                                          MD5

                                                                          25f62c02619174b35851b0e0455b3d94

                                                                          SHA1

                                                                          4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                          SHA256

                                                                          898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                          SHA512

                                                                          f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                        • C:\Windows\msvbvm60.dll

                                                                          Filesize

                                                                          1.4MB

                                                                          MD5

                                                                          25f62c02619174b35851b0e0455b3d94

                                                                          SHA1

                                                                          4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                          SHA256

                                                                          898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                          SHA512

                                                                          f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                        • memory/60-322-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/220-453-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/228-210-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/316-437-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/400-303-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/504-403-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/840-316-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/1116-290-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/1312-304-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/1360-367-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/1436-207-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/1436-426-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/1728-338-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/1784-280-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/1816-158-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/1816-420-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/1904-199-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/1916-421-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/1964-354-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/2040-436-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/2252-211-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/2256-295-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/2336-428-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/2480-343-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/2608-389-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/2656-352-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/2908-270-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/2908-269-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/3180-357-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/3192-364-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/3388-435-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/3388-379-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/3424-236-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/3532-422-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/3532-204-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/3584-268-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/3796-153-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/3796-132-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/3804-287-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4036-392-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4204-344-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4224-312-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4444-384-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4448-399-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4496-229-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4516-321-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4564-239-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4576-377-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4600-431-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4600-209-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4688-277-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4780-252-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4864-412-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4864-414-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4884-374-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4896-155-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4896-401-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4968-405-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4968-157-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4976-358-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4976-154-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/4988-409-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/5056-224-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB

                                                                        • memory/5080-327-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                          Filesize

                                                                          140KB