Analysis
-
max time kernel
100s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe
Resource
win10v2004-20220901-en
General
-
Target
7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe
-
Size
70KB
-
MD5
53d7f16c242c352a30f8ddef88916f2c
-
SHA1
3c1d53646d6df6ab6030fa4f8e5448adc7eea85e
-
SHA256
7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6
-
SHA512
7fcbad023cc9d876957a778c2106eceae30db64272b594ea8c09af85cebfc7f2b52dde1d0cefeb3712b536952d695c22cd0bd95e9345568f88a41b50f7ad2ab6
-
SSDEEP
768:1iCHI1nffAkGisSQ6KRcJZOYoBudWaDyqzlL49FLdS5yA+jz+CE8+R5nOwekfZUW:1LHIlfH7Q6qRBwWa2qxQFZA+j6bWw+9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Lubang Hitam.exe" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\Lubang Hitam.exe\"" Lubang Hitam.exe -
Modifies system executable filetype association 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Black Hole.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Black Hole.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" LSASS.EXE -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 12 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" CSRSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Black Hole.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Black Hole.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Black Hole.exe -
Disables RegEdit via registry modification 24 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Black Hole.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Lubang Hitam.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 29 IoCs
pid Process 1232 Black Hole.exe 340 Lubang Hitam.exe 428 WINLOGON.EXE 1780 Black Hole.exe 1632 CSRSS.EXE 832 SERVICES.EXE 1952 Black Hole.exe 328 LSASS.EXE 2028 Lubang Hitam.exe 1164 Lubang Hitam.exe 1620 SMSS.EXE 428 Black Hole.exe 1608 Black Hole.exe 1104 Black Hole.exe 2216 Black Hole.exe 2272 Lubang Hitam.exe 2340 Lubang Hitam.exe 2332 Lubang Hitam.exe 2324 Lubang Hitam.exe 1384 WINLOGON.EXE 956 WINLOGON.EXE 1644 WINLOGON.EXE 896 WINLOGON.EXE 1356 Black Hole.exe 1044 CSRSS.EXE 520 CSRSS.EXE 2072 CSRSS.EXE 1416 CSRSS.EXE 1892 Lubang Hitam.exe -
Loads dropped DLL 41 IoCs
pid Process 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 340 Process not Found 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 1632 CSRSS.EXE 1632 CSRSS.EXE 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 1164 Lubang Hitam.exe 1164 Lubang Hitam.exe 1952 Black Hole.exe 328 LSASS.EXE 832 SERVICES.EXE 832 SERVICES.EXE 328 LSASS.EXE 1952 Black Hole.exe 1164 Lubang Hitam.exe 832 SERVICES.EXE 1952 Black Hole.exe 1164 Lubang Hitam.exe 1952 Black Hole.exe 328 LSASS.EXE 832 SERVICES.EXE 328 LSASS.EXE 328 LSASS.EXE 328 LSASS.EXE 1952 Black Hole.exe 1952 Black Hole.exe 832 SERVICES.EXE 832 SERVICES.EXE 1164 Lubang Hitam.exe 1164 Lubang Hitam.exe 1620 SMSS.EXE 1620 SMSS.EXE -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\ WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\ CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\ Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\ WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\ Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\ SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\ 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\ Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\ Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\ SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\ LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Black Hole.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ LSASS.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" Black Hole.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Lubang Hitam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" Lubang Hitam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" Lubang Hitam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" Lubang Hitam.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" Lubang Hitam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Black Hole = "C:\\Windows\\Black Hole.exe" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" LSASS.EXE -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened (read-only) \??\H: Black Hole.exe File opened (read-only) \??\X: Black Hole.exe File opened (read-only) \??\N: LSASS.EXE File opened (read-only) \??\S: SERVICES.EXE File opened (read-only) \??\P: Lubang Hitam.exe File opened (read-only) \??\K: SMSS.EXE File opened (read-only) \??\W: SMSS.EXE File opened (read-only) \??\Q: 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened (read-only) \??\X: CSRSS.EXE File opened (read-only) \??\M: LSASS.EXE File opened (read-only) \??\Z: LSASS.EXE File opened (read-only) \??\R: Lubang Hitam.exe File opened (read-only) \??\X: SMSS.EXE File opened (read-only) \??\Z: SMSS.EXE File opened (read-only) \??\O: 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened (read-only) \??\V: 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened (read-only) \??\Z: CSRSS.EXE File opened (read-only) \??\N: SERVICES.EXE File opened (read-only) \??\V: SERVICES.EXE File opened (read-only) \??\Q: SMSS.EXE File opened (read-only) \??\R: SMSS.EXE File opened (read-only) \??\B: 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened (read-only) \??\B: LSASS.EXE File opened (read-only) \??\G: SMSS.EXE File opened (read-only) \??\I: SMSS.EXE File opened (read-only) \??\H: 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened (read-only) \??\W: 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened (read-only) \??\J: Lubang Hitam.exe File opened (read-only) \??\O: Black Hole.exe File opened (read-only) \??\B: SERVICES.EXE File opened (read-only) \??\J: Lubang Hitam.exe File opened (read-only) \??\G: 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened (read-only) \??\Y: 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened (read-only) \??\G: CSRSS.EXE File opened (read-only) \??\P: CSRSS.EXE File opened (read-only) \??\I: Black Hole.exe File opened (read-only) \??\E: Lubang Hitam.exe File opened (read-only) \??\U: Lubang Hitam.exe File opened (read-only) \??\Q: CSRSS.EXE File opened (read-only) \??\B: Black Hole.exe File opened (read-only) \??\Y: SMSS.EXE File opened (read-only) \??\E: 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened (read-only) \??\L: Lubang Hitam.exe File opened (read-only) \??\U: Lubang Hitam.exe File opened (read-only) \??\H: CSRSS.EXE File opened (read-only) \??\T: Black Hole.exe File opened (read-only) \??\P: LSASS.EXE File opened (read-only) \??\W: LSASS.EXE File opened (read-only) \??\X: LSASS.EXE File opened (read-only) \??\O: SMSS.EXE File opened (read-only) \??\U: SMSS.EXE File opened (read-only) \??\Z: 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened (read-only) \??\W: Lubang Hitam.exe File opened (read-only) \??\E: Black Hole.exe File opened (read-only) \??\K: Lubang Hitam.exe File opened (read-only) \??\G: Lubang Hitam.exe File opened (read-only) \??\L: CSRSS.EXE File opened (read-only) \??\S: LSASS.EXE File opened (read-only) \??\K: SERVICES.EXE File opened (read-only) \??\T: LSASS.EXE File opened (read-only) \??\G: SERVICES.EXE File opened (read-only) \??\J: SMSS.EXE File opened (read-only) \??\K: 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\Autorun.inf 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened for modification C:\Autorun.inf 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe -
Drops file in System32 directory 46 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Destruction.scr SERVICES.EXE File opened for modification C:\Windows\SysWOW64\Shell.exe LSASS.EXE File created C:\Windows\SysWOW64\Lubang Hitam.exe Black Hole.exe File opened for modification C:\Windows\SysWOW64\Lubang Hitam.exe Black Hole.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Shell.exe Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Shell.exe CSRSS.EXE File created C:\Windows\SysWOW64\Lubang Hitam.exe CSRSS.EXE File opened for modification C:\Windows\SysWOW64\Lubang Hitam.exe Lubang Hitam.exe File created C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Shell.exe 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File created C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Lubang Hitam.exe LSASS.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Destruction.scr Black Hole.exe File opened for modification C:\Windows\SysWOW64\Lubang Hitam.exe SERVICES.EXE File created C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File created C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Destruction.scr SMSS.EXE File opened for modification C:\Windows\SysWOW64\Lubang Hitam.exe SMSS.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Lubang Hitam.exe 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File created C:\Windows\SysWOW64\Lubang Hitam.exe SERVICES.EXE File created C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Shell.exe SMSS.EXE File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File created C:\Windows\SysWOW64\Destruction.scr 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened for modification C:\Windows\SysWOW64\Destruction.scr 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened for modification C:\Windows\SysWOW64\Destruction.scr Lubang Hitam.exe File created C:\Windows\SysWOW64\Lubang Hitam.exe Lubang Hitam.exe File created C:\Windows\SysWOW64\Lubang Hitam.exe LSASS.EXE File created C:\Windows\SysWOW64\Lubang Hitam.exe Lubang Hitam.exe File created C:\Windows\SysWOW64\Lubang Hitam.exe 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened for modification C:\Windows\SysWOW64\Lubang Hitam.exe Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Destruction.scr CSRSS.EXE File opened for modification C:\Windows\SysWOW64\Destruction.scr LSASS.EXE File opened for modification C:\Windows\SysWOW64\Shell.exe SERVICES.EXE File opened for modification C:\Windows\SysWOW64\Shell.exe Lubang Hitam.exe File created C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\SysWOW64\Destruction.scr Lubang Hitam.exe File created C:\Windows\SysWOW64\Lubang Hitam.exe SMSS.EXE File created C:\Windows\SysWOW64\Shell.exe 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened for modification C:\Windows\SysWOW64\Lubang Hitam.exe CSRSS.EXE File opened for modification C:\Windows\SysWOW64\Shell.exe Black Hole.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll Lubang Hitam.exe -
Drops file in Windows directory 44 IoCs
description ioc Process File opened for modification C:\WINDOWS\Black Hole.txt Lubang Hitam.exe File opened for modification C:\Windows\msvbvm60.dll Lubang Hitam.exe File created C:\Windows\Black Hole.exe 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File created C:\Windows\Black Hole.exe LSASS.EXE File created C:\Windows\Black Hole.exe Black Hole.exe File created C:\Windows\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\WINDOWS\Hacked By Gerry.txt SERVICES.EXE File opened for modification C:\Windows\Black Hole.exe CSRSS.EXE File created C:\Windows\Black Hole.exe SERVICES.EXE File opened for modification C:\WINDOWS\Black Hole.txt Black Hole.exe File opened for modification C:\WINDOWS\Black Hole.txt LSASS.EXE File opened for modification C:\Windows\Black Hole.exe 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File created C:\Windows\msvbvm60.dll Lubang Hitam.exe File created C:\Windows\Black Hole.exe Lubang Hitam.exe File created C:\Windows\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\WINDOWS\Black Hole.txt SMSS.EXE File created C:\Windows\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\WINDOWS\Hacked By Gerry.txt Lubang Hitam.exe File opened for modification C:\Windows\Black Hole.exe Black Hole.exe File opened for modification C:\Windows\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\Black Hole.exe Lubang Hitam.exe File opened for modification C:\Windows\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\WINDOWS\Black Hole.txt 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened for modification C:\Windows\Black Hole.exe Lubang Hitam.exe File created C:\Windows\msvbvm60.dll Lubang Hitam.exe File created C:\Windows\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\Windows\msvbvm60.dll Lubang Hitam.exe File created C:\WINDOWS\Black Hole.txt 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened for modification C:\Windows\msvbvm60.dll Lubang Hitam.exe File opened for modification C:\WINDOWS\Black Hole.txt Lubang Hitam.exe File opened for modification C:\WINDOWS\Hacked By Gerry.txt LSASS.EXE File created C:\Windows\Black Hole.exe SMSS.EXE File opened for modification C:\WINDOWS\Black Hole.txt SERVICES.EXE File opened for modification C:\Windows\Black Hole.exe SMSS.EXE File created C:\WINDOWS\Hacked By Gerry.txt 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened for modification C:\WINDOWS\Hacked By Gerry.txt 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe File opened for modification C:\WINDOWS\Black Hole.txt CSRSS.EXE File opened for modification C:\WINDOWS\Hacked By Gerry.txt CSRSS.EXE File opened for modification C:\WINDOWS\Hacked By Gerry.txt Black Hole.exe File opened for modification C:\Windows\Black Hole.exe SERVICES.EXE File opened for modification C:\Windows\Black Hole.exe LSASS.EXE File opened for modification C:\WINDOWS\Hacked By Gerry.txt Lubang Hitam.exe File opened for modification C:\WINDOWS\Hacked By Gerry.txt SMSS.EXE File opened for modification C:\Windows\msvbvm60.dll Lubang Hitam.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" SERVICES.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\ LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\SwapMouseButtons = "1" Black Hole.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\SwapMouseButtons = "1" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Lubang Hitam.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\SwapMouseButtons = "1" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" Lubang Hitam.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" Black Hole.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\ Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\ SERVICES.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\SwapMouseButtons = "1" Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\ Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" SMSS.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ Lubang Hitam.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\SwapMouseButtons = "1" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Lubang Hitam.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\ 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\ CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\ Lubang Hitam.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\ Lubang Hitam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" CSRSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\SwapMouseButtons = "1" Lubang Hitam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" LSASS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\SwapMouseButtons = "1" LSASS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" Black Hole.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\SwapMouseButtons = "1" Lubang Hitam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" WINLOGON.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\SwapMouseButtons = "1" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Lubang Hitam.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ CSRSS.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\ SMSS.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\SwapMouseButtons = "1" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\ WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SMSS.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\DESTRU~1.SCR" WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\ WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Lubang Hitam.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Mouse\SwapMouseButtons = "1" WINLOGON.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ WINLOGON.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" SERVICES.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Black Hole.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" LSASS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile SMSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command SERVICES.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Lubang Hitam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command WINLOGON.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" CSRSS.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Black Hole.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\Shell.exe\" \"%1\" %*" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1232 Black Hole.exe 1780 Process not Found 1780 Process not Found 1780 Process not Found 1780 Process not Found 1780 Process not Found 1952 Black Hole.exe 1952 Black Hole.exe 1952 Black Hole.exe 1952 Black Hole.exe 1952 Black Hole.exe 1952 Black Hole.exe 1952 Black Hole.exe 1952 Black Hole.exe 1952 Black Hole.exe 1952 Black Hole.exe 1952 Black Hole.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeShutdownPrivilege 588 shutdown.exe Token: SeRemoteShutdownPrivilege 588 shutdown.exe Token: SeShutdownPrivilege 1628 shutdown.exe Token: SeRemoteShutdownPrivilege 1628 shutdown.exe Token: SeShutdownPrivilege 628 shutdown.exe Token: SeRemoteShutdownPrivilege 628 shutdown.exe Token: SeShutdownPrivilege 1544 cmd.exe Token: SeRemoteShutdownPrivilege 1544 cmd.exe Token: SeShutdownPrivilege 692 cmd.exe Token: SeRemoteShutdownPrivilege 692 cmd.exe Token: SeShutdownPrivilege 1660 shutdown.exe Token: SeRemoteShutdownPrivilege 1660 shutdown.exe Token: SeShutdownPrivilege 1892 conhost.exe Token: SeRemoteShutdownPrivilege 1892 conhost.exe Token: SeShutdownPrivilege 1824 shutdown.exe Token: SeRemoteShutdownPrivilege 1824 shutdown.exe Token: SeShutdownPrivilege 588 cmd.exe Token: SeRemoteShutdownPrivilege 588 cmd.exe Token: SeShutdownPrivilege 1172 shutdown.exe Token: SeRemoteShutdownPrivilege 1172 shutdown.exe Token: SeShutdownPrivilege 2264 shutdown.exe Token: SeRemoteShutdownPrivilege 2264 shutdown.exe Token: SeShutdownPrivilege 2368 shutdown.exe Token: SeRemoteShutdownPrivilege 2368 shutdown.exe Token: SeShutdownPrivilege 2404 shutdown.exe Token: SeRemoteShutdownPrivilege 2404 shutdown.exe Token: SeShutdownPrivilege 2348 shutdown.exe Token: SeRemoteShutdownPrivilege 2348 shutdown.exe Token: SeShutdownPrivilege 2440 shutdown.exe Token: SeRemoteShutdownPrivilege 2440 shutdown.exe Token: SeShutdownPrivilege 2472 shutdown.exe Token: SeRemoteShutdownPrivilege 2472 shutdown.exe Token: SeShutdownPrivilege 588 shutdown.exe Token: SeRemoteShutdownPrivilege 588 shutdown.exe Token: SeShutdownPrivilege 1464 shutdown.exe Token: SeRemoteShutdownPrivilege 1464 shutdown.exe Token: SeShutdownPrivilege 1544 Process not Found Token: SeRemoteShutdownPrivilege 1544 Process not Found Token: SeShutdownPrivilege 1740 shutdown.exe Token: SeRemoteShutdownPrivilege 1740 shutdown.exe Token: SeShutdownPrivilege 1144 shutdown.exe Token: SeRemoteShutdownPrivilege 1144 shutdown.exe Token: SeShutdownPrivilege 1120 shutdown.exe Token: SeRemoteShutdownPrivilege 1120 shutdown.exe Token: SeShutdownPrivilege 1752 shutdown.exe Token: SeRemoteShutdownPrivilege 1752 shutdown.exe -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 1232 Black Hole.exe 340 Lubang Hitam.exe 428 WINLOGON.EXE 1780 Black Hole.exe 1632 CSRSS.EXE 832 SERVICES.EXE 328 LSASS.EXE 1952 Black Hole.exe 1164 Lubang Hitam.exe 1620 SMSS.EXE 428 Black Hole.exe 1104 Black Hole.exe 1608 Black Hole.exe 2216 Black Hole.exe 2272 Lubang Hitam.exe 2332 Lubang Hitam.exe 2340 Lubang Hitam.exe 2324 Lubang Hitam.exe 956 WINLOGON.EXE 1644 WINLOGON.EXE 896 WINLOGON.EXE 1384 WINLOGON.EXE 1356 Black Hole.exe 1044 CSRSS.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 952 wrote to memory of 588 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 28 PID 952 wrote to memory of 588 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 28 PID 952 wrote to memory of 588 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 28 PID 952 wrote to memory of 588 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 28 PID 952 wrote to memory of 520 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 30 PID 952 wrote to memory of 520 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 30 PID 952 wrote to memory of 520 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 30 PID 952 wrote to memory of 520 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 30 PID 952 wrote to memory of 1088 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 31 PID 952 wrote to memory of 1088 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 31 PID 952 wrote to memory of 1088 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 31 PID 952 wrote to memory of 1088 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 31 PID 952 wrote to memory of 1164 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 33 PID 952 wrote to memory of 1164 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 33 PID 952 wrote to memory of 1164 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 33 PID 952 wrote to memory of 1164 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 33 PID 952 wrote to memory of 1588 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 35 PID 952 wrote to memory of 1588 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 35 PID 952 wrote to memory of 1588 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 35 PID 952 wrote to memory of 1588 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 35 PID 952 wrote to memory of 1888 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 37 PID 952 wrote to memory of 1888 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 37 PID 952 wrote to memory of 1888 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 37 PID 952 wrote to memory of 1888 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 37 PID 952 wrote to memory of 1892 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 40 PID 952 wrote to memory of 1892 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 40 PID 952 wrote to memory of 1892 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 40 PID 952 wrote to memory of 1892 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 40 PID 952 wrote to memory of 760 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 41 PID 952 wrote to memory of 760 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 41 PID 952 wrote to memory of 760 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 41 PID 952 wrote to memory of 760 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 41 PID 952 wrote to memory of 1640 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 43 PID 952 wrote to memory of 1640 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 43 PID 952 wrote to memory of 1640 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 43 PID 952 wrote to memory of 1640 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 43 PID 952 wrote to memory of 2012 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 45 PID 952 wrote to memory of 2012 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 45 PID 952 wrote to memory of 2012 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 45 PID 952 wrote to memory of 2012 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 45 PID 952 wrote to memory of 1144 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 47 PID 952 wrote to memory of 1144 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 47 PID 952 wrote to memory of 1144 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 47 PID 952 wrote to memory of 1144 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 47 PID 952 wrote to memory of 864 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 48 PID 952 wrote to memory of 864 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 48 PID 952 wrote to memory of 864 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 48 PID 952 wrote to memory of 864 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 48 PID 952 wrote to memory of 1484 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 51 PID 952 wrote to memory of 1484 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 51 PID 952 wrote to memory of 1484 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 51 PID 952 wrote to memory of 1484 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 51 PID 952 wrote to memory of 1328 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 53 PID 952 wrote to memory of 1328 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 53 PID 952 wrote to memory of 1328 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 53 PID 952 wrote to memory of 1328 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 53 PID 952 wrote to memory of 1516 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 54 PID 952 wrote to memory of 1516 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 54 PID 952 wrote to memory of 1516 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 54 PID 952 wrote to memory of 1516 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 54 PID 952 wrote to memory of 1376 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 57 PID 952 wrote to memory of 1376 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 57 PID 952 wrote to memory of 1376 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 57 PID 952 wrote to memory of 1376 952 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe 57 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives = "67108863" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoViewContextMenu = "1" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSaveSettings = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecycleFiles = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDrives = "67108863" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetTaskbar = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSaveSettings = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoWinkeys = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecentDocsMenu = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoAdminPage = "1" SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\WinOldApp Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSaveSettings = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSaveSettings = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecentDocsMenu = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoClose = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetFolders = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetFolders = "1" CSRSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDesktop = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoWinkeys = "1" Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System SMSS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoLowDiskSpaceChecks = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecycleFiles = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDesktop = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecycleFiles = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetTaskbar = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\WinOldApp\Disabled = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecycleFiles = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFind = "1" CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDesktop = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoPropertiesMyComputer = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoPwdPage = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoClose = "1" LSASS.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSetFolders = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoPwdPage = "1" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecentDocsMenu = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\WinOldApp\Disabled = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecycleFiles = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoViewContextMenu = "1" Black Hole.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System WINLOGON.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Lubang Hitam.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System SERVICES.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\WinOldApp CSRSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoLowDiskSpaceChecks = "1" SERVICES.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" LSASS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoTrayItemsDisplay = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRecycleFiles = "1" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoPwdPage = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" SMSS.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoAdminPage = "1" WINLOGON.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoAdminPage = "1" Lubang Hitam.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoWinkeys = "1" Black Hole.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoSaveSettings = "1" SMSS.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe"C:\Users\Admin\AppData\Local\Temp\7a3880a4289ed44b59cc6043819334572ef281d7c968173ad1b3feade70798f6.exe"1⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:952 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!2⤵
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q z:2⤵PID:520
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q y:2⤵PID:1088
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q x:2⤵PID:1164
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q w:2⤵PID:1588
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q v:2⤵PID:1888
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q u:2⤵PID:1892
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q t:2⤵PID:760
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q s:2⤵PID:1640
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q r:2⤵PID:2012
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q q:2⤵PID:1144
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q p:2⤵PID:864
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q o:2⤵PID:1484
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q n:2⤵PID:1328
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q m:2⤵PID:1516
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q l:2⤵PID:1376
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q k:2⤵PID:816
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q j:2⤵PID:1428
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q i:2⤵PID:1716
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q h:2⤵PID:896
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q g:2⤵PID:528
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q e:2⤵PID:1164
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q f:2⤵PID:1824
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q d:2⤵PID:1288
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q c:2⤵PID:468
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1232 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:340 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!3⤵
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q z:3⤵PID:1548
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q x:3⤵PID:1120
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q v:3⤵PID:2024
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q w:3⤵PID:1408
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q y:3⤵PID:1660
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q s:3⤵PID:568
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q t:3⤵PID:328
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q u:3⤵PID:1376
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q q:3⤵PID:1964
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q r:3⤵PID:1716
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q n:3⤵PID:1148
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q o:3⤵PID:1212
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q p:3⤵PID:1588
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q m:3⤵PID:696
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q l:3⤵PID:1524
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q k:3⤵PID:1044
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q j:3⤵PID:1968
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q g:3⤵PID:864
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q f:3⤵PID:992
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q e:3⤵PID:836
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q h:3⤵PID:280
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q i:3⤵PID:1232
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q d:3⤵PID:1732
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q c:3⤵PID:1408
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1780 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:692
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"3⤵
- Executes dropped EXE
PID:2028
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:428 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!3⤵PID:1544
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q z:3⤵PID:1652
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q v:3⤵PID:1388
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q u:3⤵PID:1432
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q w:3⤵PID:1536
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q x:3⤵PID:1560
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q t:3⤵PID:700
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q y:3⤵PID:592
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q s:3⤵PID:1484
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q o:3⤵PID:328
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q n:3⤵PID:1104
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q p:3⤵PID:1144
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q l:3⤵PID:1556
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q i:3⤵PID:612
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q h:3⤵PID:1740
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q g:3⤵PID:1636
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q j:3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q k:3⤵PID:1256
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q m:3⤵PID:1824
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q q:3⤵PID:1680
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q r:3⤵PID:1232
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q f:3⤵PID:1756
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q e:3⤵PID:1940
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q d:3⤵PID:1388
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1632 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q z:3⤵PID:1828
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q y:3⤵PID:1120
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q w:3⤵PID:1588
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q u:3⤵PID:1040
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q f:3⤵PID:760
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q g:3⤵PID:1616
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q e:3⤵PID:1620
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q h:3⤵PID:1496
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q i:3⤵PID:1212
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q j:3⤵PID:1356
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q k:3⤵PID:1824
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q l:3⤵PID:1736
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q m:3⤵PID:900
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q n:3⤵PID:1044
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q o:3⤵PID:520
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q p:3⤵PID:696
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q q:3⤵PID:1072
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q r:3⤵PID:1952
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q s:3⤵
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q t:3⤵PID:1144
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q v:3⤵PID:1680
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q x:3⤵PID:544
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q c:3⤵PID:1788
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q d:3⤵PID:1608
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"3⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1952 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:588
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:428 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1384 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:1544
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"4⤵
- Executes dropped EXE
PID:520 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:2672
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"4⤵PID:2892
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:2936
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"4⤵PID:2796
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:1904
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"4⤵PID:3040
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:1612
-
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"3⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1164 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q y:4⤵PID:1132
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q x:4⤵PID:1404
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q t:4⤵PID:628
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q c:4⤵PID:1940
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q d:4⤵PID:1752
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q e:4⤵PID:1524
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q f:4⤵PID:1072
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q g:4⤵PID:708
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q h:4⤵PID:1144
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q i:4⤵PID:592
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q j:4⤵PID:1288
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q k:4⤵PID:568
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q l:4⤵PID:840
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q m:4⤵PID:1892
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q n:4⤵PID:1492
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q o:4⤵PID:1408
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q p:4⤵PID:1716
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q q:4⤵PID:896
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q r:4⤵PID:864
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q s:4⤵PID:1484
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q u:4⤵PID:1748
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q v:4⤵PID:1504
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q w:4⤵PID:1384
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q z:4⤵PID:2024
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2216 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2264
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2272 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1644 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"4⤵
- Executes dropped EXE
PID:1416 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:2572
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"4⤵PID:2804
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:2984
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"4⤵PID:2788
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:1232
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"4⤵PID:628
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:1032
-
-
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:832 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!3⤵PID:1892
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q z:3⤵PID:1408
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q y:3⤵PID:1376
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q x:3⤵PID:1328
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q v:3⤵PID:784
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q u:3⤵PID:1720
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q w:3⤵PID:1652
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q t:3⤵PID:820
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q s:3⤵PID:1676
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q r:3⤵PID:1964
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q p:3⤵PID:1688
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q q:3⤵PID:1536
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q o:3⤵PID:612
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q n:3⤵PID:1616
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q m:3⤵PID:1128
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q l:3⤵PID:1256
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q k:3⤵PID:520
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q j:3⤵PID:1740
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q i:3⤵PID:1384
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q h:3⤵PID:900
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q g:3⤵PID:1788
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q f:3⤵PID:532
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q e:3⤵PID:916
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q d:3⤵PID:1432
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q c:3⤵PID:568
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1104 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2340 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:956 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q z:4⤵PID:2156
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q y:4⤵PID:1524
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q x:4⤵PID:1432
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q w:4⤵PID:2160
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q r:4⤵PID:2216
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q o:4⤵PID:1608
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q m:4⤵PID:2424
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q n:4⤵PID:2460
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q p:4⤵PID:2456
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q q:4⤵PID:2436
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q s:4⤵PID:1124
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q l:4⤵PID:2596
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q k:4⤵PID:2452
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q t:4⤵PID:2244
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q j:4⤵PID:2636
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q u:4⤵PID:2236
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q v:4⤵PID:532
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q i:4⤵PID:2656
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q g:4⤵PID:2608
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q h:4⤵PID:2552
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q f:4⤵PID:2700
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q c:4⤵PID:2836
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q d:4⤵PID:2716
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q e:4⤵PID:2768
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"4⤵PID:2300
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:2636
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"4⤵PID:2564
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:2940
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"4⤵PID:2888
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:2532
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"4⤵PID:2812
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:1716
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"4⤵PID:2616
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!5⤵PID:2772
-
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
PID:2072
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵PID:2148
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:836
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵PID:2376
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:2276
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵PID:2352
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:2668
-
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:328 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1824
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q z:3⤵PID:1556
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q y:3⤵PID:1628
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q x:3⤵PID:1560
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q w:3⤵PID:896
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q v:3⤵PID:840
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q j:3⤵PID:820
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q c:3⤵PID:1036
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q d:3⤵PID:544
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q e:3⤵
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q f:3⤵PID:1492
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q g:3⤵PID:1008
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q h:3⤵PID:956
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q i:3⤵PID:340
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q k:3⤵PID:468
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q l:3⤵PID:1356
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q m:3⤵PID:1608
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q n:3⤵PID:532
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q o:3⤵PID:1640
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q p:3⤵PID:1408
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q q:3⤵PID:520
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q r:3⤵PID:1980
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q s:3⤵PID:1764
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q t:3⤵PID:1484
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q u:3⤵PID:1516
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2332 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:896 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵
- Suspicious use of AdjustPrivilegeToken
PID:588
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1044
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵PID:1036
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:2508
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵PID:1560
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:1408
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵PID:2472
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:2524
-
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Modifies WinLogon for persistence
- Modifies system executable filetype association
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Windows security bypass
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1620 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q v:3⤵PID:2588
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q t:3⤵PID:2628
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q p:3⤵PID:2696
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q i:3⤵PID:2812
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q j:3⤵PID:2804
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q k:3⤵PID:2796
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q l:3⤵PID:2788
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q m:3⤵PID:2780
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q n:3⤵PID:2772
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q o:3⤵PID:2724
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q q:3⤵PID:2688
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q r:3⤵PID:2680
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q s:3⤵PID:2672
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q u:3⤵PID:2616
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q w:3⤵PID:2572
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q x:3⤵PID:2564
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q y:3⤵PID:2556
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q z:3⤵PID:2548
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q h:3⤵PID:2840
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q f:3⤵PID:2960
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q g:3⤵PID:2952
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q e:3⤵PID:2984
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q c:3⤵PID:3016
-
-
C:\WINDOWS\SysWOW64\cmd.exeC:\WINDOWS\system32\cmd.exe /c rd /s /q d:3⤵PID:3000
-
-
C:\Windows\Black Hole.exe"C:\Windows\Black Hole.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1356 -
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:2080
-
-
-
C:\Windows\SysWOW64\Lubang Hitam.exe"C:\Windows\system32\Lubang Hitam.exe"3⤵
- Executes dropped EXE
PID:1892
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"3⤵PID:1428
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:2296
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"3⤵PID:2196
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:2496
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"3⤵PID:2512
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:2140
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"3⤵PID:2588
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:2664
-
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"3⤵PID:1628
-
C:\WINDOWS\SysWOW64\shutdown.exeC:\WINDOWS\system32\shutdown.exe -s -f -t 3600 -c An Error Occured. System Not Found!4⤵PID:2684
-
-
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1690761724-1469743917-682055781-950851460-9756378916097686361650028871-382583382"1⤵PID:1408
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1087491402-1843231215-12283105431132162125-449121108-727915909-203414712-1341753679"1⤵PID:1732
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-318980303-690711543-1548002630-1461767245-1491880854-1478373063-750571102212241303"1⤵PID:1536
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "507637428-20668867831775770145-884966397-1284018344-182112525-645888550-190028908"1⤵PID:1104
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "970555870-106973834677583782-18320337391026578636-1514951186-2016064098-740439068"1⤵PID:1740
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-160938077720916970964586637032123826277-19826734522171581201272884013233283742"1⤵PID:1432
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1555219578-1926363424-1964585052100116694-21404183935164230578690870661761506035"1⤵PID:612
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-146118176205303682310849473501715280601-19611935731870774226-15046192441041299734"1⤵PID:1212
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-9028955861494959465-8565615431479128384953105450837151387-842044790-230080785"1⤵PID:1496
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1258255486-1232522731318831203-1878191594683283134-20557466391791527794-1207956212"1⤵PID:1356
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-850466841-2092070744-1013926911-368898030-493374392-452657768-2093046321648741822"1⤵PID:544
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1651802847850493913780520282039752378-15511095561640120375-621866731340011699"1⤵PID:1128
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-78866558011915225881265623241-1768064869-1359829261-202655994367200376-1814757752"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1186363103819227614-10727297671236728167766911073-12956502401111401572459666373"1⤵PID:784
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "16624593851633651048-1944179061656860761-1829752901455539423-612099005-536546733"1⤵PID:1556
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "63058466-420261229-1135263958-17742170591905033291126712554-1497582166-222422656"1⤵PID:1964
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "823632327357399561-1241066363-1422902836274026715966999912-1464639672336464343"1⤵PID:568
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "855082695506729497-1592046607-1324580883173988848-2043538539-974547699-8097250"1⤵PID:900
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-647593683530272858-198485674036096947017991575313154677901554046346233469058"1⤵PID:2244
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "481284758-1712368052-12578954-261051152-1299444776410706301-822192441528341400"1⤵PID:2596
Network
MITRE ATT&CK Enterprise v6
Persistence
Change Default File Association
1Hidden Files and Directories
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Disabling Security Tools
2Hidden Files and Directories
2Modify Registry
8Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD52e89ee6d11f183e32110c76e67b66e1d
SHA147016dcae36c13f4adb1ac12880036292be6243b
SHA25625b8000f5d23e69f1619537ac1a197e4f105d53568806683b6c2c394ae05f9dd
SHA5124e126b2195f8edb78862af221e1d6dda6c620fbed5cf1467bac059ac8dacba3a45235598c67d190617fa941726790ab60c9cd2d979236018667b0eb698859d7e
-
Filesize
70KB
MD587bdcbbf4ea65949dd11b8c58e8d61a6
SHA103ea16212dd2ea45773593067b2838b85ee52492
SHA25606c1b3df1b3017788f540a1302e8fa097ea61cd7367e32981b4da124c589734f
SHA512fe3061626051c9a4758243f5ca44514f7ed02ddad02304b49f939859174022a636363fe4eabd2a4960f19fe6e129c92d22a6859ae52e0f43bc3db85b3e8b1370
-
Filesize
70KB
MD5f8ba0ad3c372324eedc91e5d3719fec5
SHA139aa009e0caa6cccabe8c4c99f073bb863eb7ab0
SHA25686112e1c368f2ac7f278af9820e604cea6dd6df47e441d4ead71963f8fd39a37
SHA512fcc133baf6fd2d2762d4ea99e7e1adc8c40416db73f5b1d23b9482186eeb5b2669a480b4aa67e1d8184c4b069f2647f3e1980d3c5e971da9f41cf5f5824a7e63
-
Filesize
70KB
MD5190bd4851ad71ddd57803d9b6d7197cb
SHA106cdc71a93bdd18b41e7c64b759daae4093bcf59
SHA25603388efac53e6c0bd0039fdbb95e7c540ed67a6af0eceed205c51ce21cd9f99c
SHA5128ebc8a21745760d436d0d261ea1bae32eeb74457f11be44226276ff17e8ae11f2329cb85a1aac6f85edd511c88075389f290256d0a52555be5c1839f42ac2ffc
-
Filesize
70KB
MD530effec34a9f06465d12ca4820131a9b
SHA13d397551899a72cfff9e509218b5279bf3505507
SHA25606073bc8aee0356247fef8071975d15772109b62cfd31e52cc43caa93270a216
SHA51209763cf8fd6cdf4a1652c89aa8bce2a4531fb1ebef862edd366346cfa4dd5ef5238ca740752441a08afff159022443bc2cb661f9de45dde88317dd170480ddd2
-
Filesize
70KB
MD5f8ba0ad3c372324eedc91e5d3719fec5
SHA139aa009e0caa6cccabe8c4c99f073bb863eb7ab0
SHA25686112e1c368f2ac7f278af9820e604cea6dd6df47e441d4ead71963f8fd39a37
SHA512fcc133baf6fd2d2762d4ea99e7e1adc8c40416db73f5b1d23b9482186eeb5b2669a480b4aa67e1d8184c4b069f2647f3e1980d3c5e971da9f41cf5f5824a7e63
-
Filesize
70KB
MD52cf1cae7c4074d2d32b8fe82ea874be7
SHA1f924c835917ac1b34b58bde55cdac483a4bfc300
SHA2562c9804eee2ba4fde149c1f7e52e8173482436ae847cb90855ab1eb00a1521cb8
SHA512fdd1db0c79877720534656d0d08481c51859c69b83e7a1cedf0ab8694379b9ed6d04690b9f92afe9585db6c1dda5b4820f0395dbf8fee78e42d83a13406ab20e
-
Filesize
70KB
MD590e05aaea564a51b9354797820a0f283
SHA1867a16d9d61c8195823a2d7f298e40d4b04ab651
SHA256f9055bff65c1b05ad08b2ff262126b0426d65cb87bf5335f6c9ef1b4afd459c3
SHA51259f7fa15796ae797a777e0a4fd89d90707e9f1576af9af5a91e86d45b9976d77a8df01e673244bae08e3fa1f1371fd315eb3e1444cca74a60d854b2cd2e661aa
-
Filesize
70KB
MD5c0b8bc65a05f41dceef78dc18659e16d
SHA154b89845905c2970a6dec8c14b130a9535af5f6d
SHA2568b01a0bba4888b2c89e8c064bc40982e861e5751941e396e64cfe911506f9a71
SHA5128aa7fc6feb3958d19883e657d1877ad85e925adf36c8853f3025731f0eb47cc8695c471792826734b626f0cccd3514753aa39db7988e8bbb2c35fa4daa81302a
-
Filesize
70KB
MD5190bd4851ad71ddd57803d9b6d7197cb
SHA106cdc71a93bdd18b41e7c64b759daae4093bcf59
SHA25603388efac53e6c0bd0039fdbb95e7c540ed67a6af0eceed205c51ce21cd9f99c
SHA5128ebc8a21745760d436d0d261ea1bae32eeb74457f11be44226276ff17e8ae11f2329cb85a1aac6f85edd511c88075389f290256d0a52555be5c1839f42ac2ffc
-
Filesize
70KB
MD530effec34a9f06465d12ca4820131a9b
SHA13d397551899a72cfff9e509218b5279bf3505507
SHA25606073bc8aee0356247fef8071975d15772109b62cfd31e52cc43caa93270a216
SHA51209763cf8fd6cdf4a1652c89aa8bce2a4531fb1ebef862edd366346cfa4dd5ef5238ca740752441a08afff159022443bc2cb661f9de45dde88317dd170480ddd2
-
Filesize
70KB
MD5357bf8d23d63e91e2e790121bb2e1acf
SHA1157b73796a8f63a183e695726658f2f962d51ed1
SHA256939448f87a9176706c2ee50e663f2d9064e4360ec17fd449ec3ab18d6163099b
SHA512b6629ad85e9eb9755f1303d51fa3437cf09dc9dcfa498a6b9fbbc8a7a4fbf91077886e5239410c21e493dc117bd3073e5a843b139995dbd0a8a2631d5b45633a
-
Filesize
70KB
MD530effec34a9f06465d12ca4820131a9b
SHA13d397551899a72cfff9e509218b5279bf3505507
SHA25606073bc8aee0356247fef8071975d15772109b62cfd31e52cc43caa93270a216
SHA51209763cf8fd6cdf4a1652c89aa8bce2a4531fb1ebef862edd366346cfa4dd5ef5238ca740752441a08afff159022443bc2cb661f9de45dde88317dd170480ddd2
-
Filesize
70KB
MD54c919b4305ffd5fa45d8fd3bbf93f40f
SHA1dafde90855f575661804a3af969d3c4dbbb2140e
SHA2568783b0e171b8838e86fcd3e27480026bd9c65a9df6b33cb087fa20edffa3ef03
SHA512155cdaa9a5f74a7593646e45f09fa6b07e3ae11a874f41849d6865b6f6909a190a84d81a9378f6f5e2416e0896f1592d33f0bfd5dac53d6bd004136d4e93c3d9
-
Filesize
70KB
MD5f8ba0ad3c372324eedc91e5d3719fec5
SHA139aa009e0caa6cccabe8c4c99f073bb863eb7ab0
SHA25686112e1c368f2ac7f278af9820e604cea6dd6df47e441d4ead71963f8fd39a37
SHA512fcc133baf6fd2d2762d4ea99e7e1adc8c40416db73f5b1d23b9482186eeb5b2669a480b4aa67e1d8184c4b069f2647f3e1980d3c5e971da9f41cf5f5824a7e63
-
Filesize
70KB
MD50da31cf2744a08c834d37ce51404a489
SHA142ee25407cc26cd01dab00b5d5cab2b749dae985
SHA25644a784dca5a852908ba17a4b00e28477389f68a6b399c590a3bd902dc9dab888
SHA51286dafa35463f31cdf01fcb2fa624a05bc4972d4f2abce3b51cd4b64d8cbd74eb0258d3f0f1df3894544af0f69d66482f3b31a5039f20a06a9a7fa0ea9dd2e20e
-
Filesize
70KB
MD5c85be4083e7c4eb257cd703f04564e09
SHA1c6bf180d857ce342b18ab21ee107e82a4c6b455e
SHA256b46b71d3592e28fbfe83f0aeea19b24b73c84ff1db3fca8e431645d6a04354a4
SHA512837ec038a9cbb50f55ae44caf21b40125620b16b5cedf1cb160725f8a33045094512c6c1bc780fc8d84c046e4abba89e9274b290737ec6a2dafbcf4e95c58ec2
-
Filesize
70KB
MD5c85be4083e7c4eb257cd703f04564e09
SHA1c6bf180d857ce342b18ab21ee107e82a4c6b455e
SHA256b46b71d3592e28fbfe83f0aeea19b24b73c84ff1db3fca8e431645d6a04354a4
SHA512837ec038a9cbb50f55ae44caf21b40125620b16b5cedf1cb160725f8a33045094512c6c1bc780fc8d84c046e4abba89e9274b290737ec6a2dafbcf4e95c58ec2
-
Filesize
70KB
MD52cf1cae7c4074d2d32b8fe82ea874be7
SHA1f924c835917ac1b34b58bde55cdac483a4bfc300
SHA2562c9804eee2ba4fde149c1f7e52e8173482436ae847cb90855ab1eb00a1521cb8
SHA512fdd1db0c79877720534656d0d08481c51859c69b83e7a1cedf0ab8694379b9ed6d04690b9f92afe9585db6c1dda5b4820f0395dbf8fee78e42d83a13406ab20e
-
Filesize
70KB
MD5f2be874800b168cab22998a47f870160
SHA1e2d3cc7c453130ab9cdd647084946a512133dabb
SHA256a9076d7e54dc01f3792c21f59d5d5adf32cc97ee3e68f266f2487f2dd603524d
SHA512d46fcfaf77b207dbf51f3a965ac4e741e2d1e8d51b6fbe18e43275f397551be939e720556cd2171cb84eef4ea2c04efc10434ca64dee0166b9cb5cacddd5936a
-
Filesize
70KB
MD590e05aaea564a51b9354797820a0f283
SHA1867a16d9d61c8195823a2d7f298e40d4b04ab651
SHA256f9055bff65c1b05ad08b2ff262126b0426d65cb87bf5335f6c9ef1b4afd459c3
SHA51259f7fa15796ae797a777e0a4fd89d90707e9f1576af9af5a91e86d45b9976d77a8df01e673244bae08e3fa1f1371fd315eb3e1444cca74a60d854b2cd2e661aa
-
Filesize
70KB
MD527a340e56a0510399716a9b30dcb79af
SHA1a1722ab20db2b14f6f9a0f8e4acc0a5c411b23db
SHA25603d037828d447521995ba834ca74251b40aaed4061d4f48f4c62f5babe33281f
SHA5125f2eaead96340b75e6e44a81e6baa86deab8e84af6829b75a6deff7ebf3f2a695b9c48c014d3bffc1a715b2d7c41d445056387b554526f00350bc3db7d561e28
-
Filesize
70KB
MD527a340e56a0510399716a9b30dcb79af
SHA1a1722ab20db2b14f6f9a0f8e4acc0a5c411b23db
SHA25603d037828d447521995ba834ca74251b40aaed4061d4f48f4c62f5babe33281f
SHA5125f2eaead96340b75e6e44a81e6baa86deab8e84af6829b75a6deff7ebf3f2a695b9c48c014d3bffc1a715b2d7c41d445056387b554526f00350bc3db7d561e28
-
Filesize
70KB
MD590e05aaea564a51b9354797820a0f283
SHA1867a16d9d61c8195823a2d7f298e40d4b04ab651
SHA256f9055bff65c1b05ad08b2ff262126b0426d65cb87bf5335f6c9ef1b4afd459c3
SHA51259f7fa15796ae797a777e0a4fd89d90707e9f1576af9af5a91e86d45b9976d77a8df01e673244bae08e3fa1f1371fd315eb3e1444cca74a60d854b2cd2e661aa
-
Filesize
70KB
MD590e05aaea564a51b9354797820a0f283
SHA1867a16d9d61c8195823a2d7f298e40d4b04ab651
SHA256f9055bff65c1b05ad08b2ff262126b0426d65cb87bf5335f6c9ef1b4afd459c3
SHA51259f7fa15796ae797a777e0a4fd89d90707e9f1576af9af5a91e86d45b9976d77a8df01e673244bae08e3fa1f1371fd315eb3e1444cca74a60d854b2cd2e661aa
-
Filesize
70KB
MD527a340e56a0510399716a9b30dcb79af
SHA1a1722ab20db2b14f6f9a0f8e4acc0a5c411b23db
SHA25603d037828d447521995ba834ca74251b40aaed4061d4f48f4c62f5babe33281f
SHA5125f2eaead96340b75e6e44a81e6baa86deab8e84af6829b75a6deff7ebf3f2a695b9c48c014d3bffc1a715b2d7c41d445056387b554526f00350bc3db7d561e28
-
Filesize
70KB
MD527a340e56a0510399716a9b30dcb79af
SHA1a1722ab20db2b14f6f9a0f8e4acc0a5c411b23db
SHA25603d037828d447521995ba834ca74251b40aaed4061d4f48f4c62f5babe33281f
SHA5125f2eaead96340b75e6e44a81e6baa86deab8e84af6829b75a6deff7ebf3f2a695b9c48c014d3bffc1a715b2d7c41d445056387b554526f00350bc3db7d561e28
-
Filesize
70KB
MD590e05aaea564a51b9354797820a0f283
SHA1867a16d9d61c8195823a2d7f298e40d4b04ab651
SHA256f9055bff65c1b05ad08b2ff262126b0426d65cb87bf5335f6c9ef1b4afd459c3
SHA51259f7fa15796ae797a777e0a4fd89d90707e9f1576af9af5a91e86d45b9976d77a8df01e673244bae08e3fa1f1371fd315eb3e1444cca74a60d854b2cd2e661aa
-
Filesize
70KB
MD527a340e56a0510399716a9b30dcb79af
SHA1a1722ab20db2b14f6f9a0f8e4acc0a5c411b23db
SHA25603d037828d447521995ba834ca74251b40aaed4061d4f48f4c62f5babe33281f
SHA5125f2eaead96340b75e6e44a81e6baa86deab8e84af6829b75a6deff7ebf3f2a695b9c48c014d3bffc1a715b2d7c41d445056387b554526f00350bc3db7d561e28
-
Filesize
70KB
MD590e05aaea564a51b9354797820a0f283
SHA1867a16d9d61c8195823a2d7f298e40d4b04ab651
SHA256f9055bff65c1b05ad08b2ff262126b0426d65cb87bf5335f6c9ef1b4afd459c3
SHA51259f7fa15796ae797a777e0a4fd89d90707e9f1576af9af5a91e86d45b9976d77a8df01e673244bae08e3fa1f1371fd315eb3e1444cca74a60d854b2cd2e661aa
-
Filesize
70KB
MD50007021a170538b3aa961310f0aae255
SHA13f10edf97b7153260e8237741154d7ac67e06f88
SHA256ea6b395a7aa0f374bbf08491eb4db988c0e1601caf9b866bf9f13da6106ac3e0
SHA512f744d656d2734859522fb48560bbd7bd33e0489c247dada4a78ad4d42fbb20084695d1c7950fda517ff4a3bd69c8a5669f2fcd5b34469d82c502361eba4f10c4
-
Filesize
70KB
MD51293b8d4aacd5d8f022750e6e7ce0170
SHA13b13f0218c731c741bb8026997ec32c726a6e7f8
SHA25680995e62d295429e267e6b580ef4fc95a41e5b86d30eb9f0d03c9c527b955bf1
SHA512d2005f9518c82f8a46924f466e76c855d6aef07d4b167f87183837b280780211128808aed5eb4730ed39d6fc860e25ba7173bf5922643172e601e480dd1a9ea6
-
Filesize
1KB
MD56635e047c242e6d64b2716d81095bf5f
SHA15def5300f894e58bbb0caaa94680f7735ccd248d
SHA2569757b4f406657c44fcbd40757d1ae06e833a8e1542ca976e6ae63578031b32bf
SHA512c9bae9bf090e7c67fac53d061bb43c2091e991c8f568889463d0c1af8f48652c79c51785c0906705098b418b2d7a4b200580fb44091ecf8bf24d8b1b45a258c0
-
Filesize
1KB
MD56635e047c242e6d64b2716d81095bf5f
SHA15def5300f894e58bbb0caaa94680f7735ccd248d
SHA2569757b4f406657c44fcbd40757d1ae06e833a8e1542ca976e6ae63578031b32bf
SHA512c9bae9bf090e7c67fac53d061bb43c2091e991c8f568889463d0c1af8f48652c79c51785c0906705098b418b2d7a4b200580fb44091ecf8bf24d8b1b45a258c0
-
Filesize
1KB
MD5e067dafcbe64a95f5045a281397732db
SHA11af7095f98c486ca247449980000d06b04ffc50c
SHA256b6085ee8c1f2de574973b9f3a7417257e25573c2b5228b5a8f87e3788e2733b6
SHA5121b575d62fee219538f8d624ab833cbce0aee431559a0adfa1e3ce9cd4f5ab8a2887b394843ebf164c884ccbed5687d644474328471b23c28edba8f99ccf08b58
-
Filesize
1KB
MD5e067dafcbe64a95f5045a281397732db
SHA11af7095f98c486ca247449980000d06b04ffc50c
SHA256b6085ee8c1f2de574973b9f3a7417257e25573c2b5228b5a8f87e3788e2733b6
SHA5121b575d62fee219538f8d624ab833cbce0aee431559a0adfa1e3ce9cd4f5ab8a2887b394843ebf164c884ccbed5687d644474328471b23c28edba8f99ccf08b58
-
Filesize
70KB
MD590e05aaea564a51b9354797820a0f283
SHA1867a16d9d61c8195823a2d7f298e40d4b04ab651
SHA256f9055bff65c1b05ad08b2ff262126b0426d65cb87bf5335f6c9ef1b4afd459c3
SHA51259f7fa15796ae797a777e0a4fd89d90707e9f1576af9af5a91e86d45b9976d77a8df01e673244bae08e3fa1f1371fd315eb3e1444cca74a60d854b2cd2e661aa
-
Filesize
70KB
MD590e05aaea564a51b9354797820a0f283
SHA1867a16d9d61c8195823a2d7f298e40d4b04ab651
SHA256f9055bff65c1b05ad08b2ff262126b0426d65cb87bf5335f6c9ef1b4afd459c3
SHA51259f7fa15796ae797a777e0a4fd89d90707e9f1576af9af5a91e86d45b9976d77a8df01e673244bae08e3fa1f1371fd315eb3e1444cca74a60d854b2cd2e661aa
-
Filesize
70KB
MD5a1e7d5a1cf5ee06b71f2cb554959e824
SHA1bf92882d96ca56421597ea068e2ac4409f82b180
SHA2567f9a08ac7ab1fc60997459d746fd9ecbdb52cf9eee7fee05a5992aad811afcf4
SHA512c73c9e9bcba168e078f108e45402436d3354fc261d95f35ece782a04e9e83467dc3fcda121dda9b494be019911753a3df9935b3f0b5b45c2c83f4565867b28c0
-
Filesize
70KB
MD5a1e7d5a1cf5ee06b71f2cb554959e824
SHA1bf92882d96ca56421597ea068e2ac4409f82b180
SHA2567f9a08ac7ab1fc60997459d746fd9ecbdb52cf9eee7fee05a5992aad811afcf4
SHA512c73c9e9bcba168e078f108e45402436d3354fc261d95f35ece782a04e9e83467dc3fcda121dda9b494be019911753a3df9935b3f0b5b45c2c83f4565867b28c0
-
Filesize
70KB
MD527a340e56a0510399716a9b30dcb79af
SHA1a1722ab20db2b14f6f9a0f8e4acc0a5c411b23db
SHA25603d037828d447521995ba834ca74251b40aaed4061d4f48f4c62f5babe33281f
SHA5125f2eaead96340b75e6e44a81e6baa86deab8e84af6829b75a6deff7ebf3f2a695b9c48c014d3bffc1a715b2d7c41d445056387b554526f00350bc3db7d561e28
-
Filesize
70KB
MD527a340e56a0510399716a9b30dcb79af
SHA1a1722ab20db2b14f6f9a0f8e4acc0a5c411b23db
SHA25603d037828d447521995ba834ca74251b40aaed4061d4f48f4c62f5babe33281f
SHA5125f2eaead96340b75e6e44a81e6baa86deab8e84af6829b75a6deff7ebf3f2a695b9c48c014d3bffc1a715b2d7c41d445056387b554526f00350bc3db7d561e28
-
Filesize
1.3MB
MD55343a19c618bc515ceb1695586c6c137
SHA14dedae8cbde066f31c8e6b52c0baa3f8b1117742
SHA2562246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce
SHA512708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606
-
Filesize
70KB
MD5bdd2501f0cae479f4fbcb65bb032ea17
SHA110b20fca7543644d32ef93f21f52cfd938e0a49a
SHA256f908a9893fb45edb9e51b4529e05832023aeb8061b2b15586141712961c0e4f6
SHA512f4183d66422db86391fe99e895e24b800a64c48c1567169d42f8b13a448f724cb13baccb37abfc474a889bae8f4bf1ec7592d10c4444fe1ec3c5c81e559d9542
-
Filesize
70KB
MD5190bd4851ad71ddd57803d9b6d7197cb
SHA106cdc71a93bdd18b41e7c64b759daae4093bcf59
SHA25603388efac53e6c0bd0039fdbb95e7c540ed67a6af0eceed205c51ce21cd9f99c
SHA5128ebc8a21745760d436d0d261ea1bae32eeb74457f11be44226276ff17e8ae11f2329cb85a1aac6f85edd511c88075389f290256d0a52555be5c1839f42ac2ffc
-
Filesize
70KB
MD52e89ee6d11f183e32110c76e67b66e1d
SHA147016dcae36c13f4adb1ac12880036292be6243b
SHA25625b8000f5d23e69f1619537ac1a197e4f105d53568806683b6c2c394ae05f9dd
SHA5124e126b2195f8edb78862af221e1d6dda6c620fbed5cf1467bac059ac8dacba3a45235598c67d190617fa941726790ab60c9cd2d979236018667b0eb698859d7e
-
Filesize
70KB
MD52e89ee6d11f183e32110c76e67b66e1d
SHA147016dcae36c13f4adb1ac12880036292be6243b
SHA25625b8000f5d23e69f1619537ac1a197e4f105d53568806683b6c2c394ae05f9dd
SHA5124e126b2195f8edb78862af221e1d6dda6c620fbed5cf1467bac059ac8dacba3a45235598c67d190617fa941726790ab60c9cd2d979236018667b0eb698859d7e
-
Filesize
70KB
MD52e89ee6d11f183e32110c76e67b66e1d
SHA147016dcae36c13f4adb1ac12880036292be6243b
SHA25625b8000f5d23e69f1619537ac1a197e4f105d53568806683b6c2c394ae05f9dd
SHA5124e126b2195f8edb78862af221e1d6dda6c620fbed5cf1467bac059ac8dacba3a45235598c67d190617fa941726790ab60c9cd2d979236018667b0eb698859d7e
-
Filesize
70KB
MD52e89ee6d11f183e32110c76e67b66e1d
SHA147016dcae36c13f4adb1ac12880036292be6243b
SHA25625b8000f5d23e69f1619537ac1a197e4f105d53568806683b6c2c394ae05f9dd
SHA5124e126b2195f8edb78862af221e1d6dda6c620fbed5cf1467bac059ac8dacba3a45235598c67d190617fa941726790ab60c9cd2d979236018667b0eb698859d7e
-
Filesize
70KB
MD52e89ee6d11f183e32110c76e67b66e1d
SHA147016dcae36c13f4adb1ac12880036292be6243b
SHA25625b8000f5d23e69f1619537ac1a197e4f105d53568806683b6c2c394ae05f9dd
SHA5124e126b2195f8edb78862af221e1d6dda6c620fbed5cf1467bac059ac8dacba3a45235598c67d190617fa941726790ab60c9cd2d979236018667b0eb698859d7e
-
Filesize
70KB
MD5e537626ab9eee488f7533c860e86ac47
SHA1483e2a2e3ed6dc23da2d435ae77f16bb626b1353
SHA2562b1f71e67aa5e1685109096981c276e6894d5f40e99d374030d2c499d9b7ad59
SHA512db989ea573a4be61ced3d4211d18d53bfd110cffcc65165e1ce6f731edc805c15709c03dbbfd882880e740349e1446658ad8195726f33a02ffe0d0475f6621e7
-
Filesize
70KB
MD5190bd4851ad71ddd57803d9b6d7197cb
SHA106cdc71a93bdd18b41e7c64b759daae4093bcf59
SHA25603388efac53e6c0bd0039fdbb95e7c540ed67a6af0eceed205c51ce21cd9f99c
SHA5128ebc8a21745760d436d0d261ea1bae32eeb74457f11be44226276ff17e8ae11f2329cb85a1aac6f85edd511c88075389f290256d0a52555be5c1839f42ac2ffc
-
Filesize
70KB
MD5190bd4851ad71ddd57803d9b6d7197cb
SHA106cdc71a93bdd18b41e7c64b759daae4093bcf59
SHA25603388efac53e6c0bd0039fdbb95e7c540ed67a6af0eceed205c51ce21cd9f99c
SHA5128ebc8a21745760d436d0d261ea1bae32eeb74457f11be44226276ff17e8ae11f2329cb85a1aac6f85edd511c88075389f290256d0a52555be5c1839f42ac2ffc
-
Filesize
70KB
MD530effec34a9f06465d12ca4820131a9b
SHA13d397551899a72cfff9e509218b5279bf3505507
SHA25606073bc8aee0356247fef8071975d15772109b62cfd31e52cc43caa93270a216
SHA51209763cf8fd6cdf4a1652c89aa8bce2a4531fb1ebef862edd366346cfa4dd5ef5238ca740752441a08afff159022443bc2cb661f9de45dde88317dd170480ddd2
-
Filesize
70KB
MD530effec34a9f06465d12ca4820131a9b
SHA13d397551899a72cfff9e509218b5279bf3505507
SHA25606073bc8aee0356247fef8071975d15772109b62cfd31e52cc43caa93270a216
SHA51209763cf8fd6cdf4a1652c89aa8bce2a4531fb1ebef862edd366346cfa4dd5ef5238ca740752441a08afff159022443bc2cb661f9de45dde88317dd170480ddd2
-
Filesize
70KB
MD5f8ba0ad3c372324eedc91e5d3719fec5
SHA139aa009e0caa6cccabe8c4c99f073bb863eb7ab0
SHA25686112e1c368f2ac7f278af9820e604cea6dd6df47e441d4ead71963f8fd39a37
SHA512fcc133baf6fd2d2762d4ea99e7e1adc8c40416db73f5b1d23b9482186eeb5b2669a480b4aa67e1d8184c4b069f2647f3e1980d3c5e971da9f41cf5f5824a7e63
-
Filesize
70KB
MD5f8ba0ad3c372324eedc91e5d3719fec5
SHA139aa009e0caa6cccabe8c4c99f073bb863eb7ab0
SHA25686112e1c368f2ac7f278af9820e604cea6dd6df47e441d4ead71963f8fd39a37
SHA512fcc133baf6fd2d2762d4ea99e7e1adc8c40416db73f5b1d23b9482186eeb5b2669a480b4aa67e1d8184c4b069f2647f3e1980d3c5e971da9f41cf5f5824a7e63
-
Filesize
70KB
MD52cf1cae7c4074d2d32b8fe82ea874be7
SHA1f924c835917ac1b34b58bde55cdac483a4bfc300
SHA2562c9804eee2ba4fde149c1f7e52e8173482436ae847cb90855ab1eb00a1521cb8
SHA512fdd1db0c79877720534656d0d08481c51859c69b83e7a1cedf0ab8694379b9ed6d04690b9f92afe9585db6c1dda5b4820f0395dbf8fee78e42d83a13406ab20e
-
Filesize
70KB
MD52cf1cae7c4074d2d32b8fe82ea874be7
SHA1f924c835917ac1b34b58bde55cdac483a4bfc300
SHA2562c9804eee2ba4fde149c1f7e52e8173482436ae847cb90855ab1eb00a1521cb8
SHA512fdd1db0c79877720534656d0d08481c51859c69b83e7a1cedf0ab8694379b9ed6d04690b9f92afe9585db6c1dda5b4820f0395dbf8fee78e42d83a13406ab20e
-
Filesize
70KB
MD52e89ee6d11f183e32110c76e67b66e1d
SHA147016dcae36c13f4adb1ac12880036292be6243b
SHA25625b8000f5d23e69f1619537ac1a197e4f105d53568806683b6c2c394ae05f9dd
SHA5124e126b2195f8edb78862af221e1d6dda6c620fbed5cf1467bac059ac8dacba3a45235598c67d190617fa941726790ab60c9cd2d979236018667b0eb698859d7e
-
Filesize
70KB
MD52e89ee6d11f183e32110c76e67b66e1d
SHA147016dcae36c13f4adb1ac12880036292be6243b
SHA25625b8000f5d23e69f1619537ac1a197e4f105d53568806683b6c2c394ae05f9dd
SHA5124e126b2195f8edb78862af221e1d6dda6c620fbed5cf1467bac059ac8dacba3a45235598c67d190617fa941726790ab60c9cd2d979236018667b0eb698859d7e
-
Filesize
70KB
MD52e89ee6d11f183e32110c76e67b66e1d
SHA147016dcae36c13f4adb1ac12880036292be6243b
SHA25625b8000f5d23e69f1619537ac1a197e4f105d53568806683b6c2c394ae05f9dd
SHA5124e126b2195f8edb78862af221e1d6dda6c620fbed5cf1467bac059ac8dacba3a45235598c67d190617fa941726790ab60c9cd2d979236018667b0eb698859d7e
-
Filesize
70KB
MD52e89ee6d11f183e32110c76e67b66e1d
SHA147016dcae36c13f4adb1ac12880036292be6243b
SHA25625b8000f5d23e69f1619537ac1a197e4f105d53568806683b6c2c394ae05f9dd
SHA5124e126b2195f8edb78862af221e1d6dda6c620fbed5cf1467bac059ac8dacba3a45235598c67d190617fa941726790ab60c9cd2d979236018667b0eb698859d7e
-
Filesize
70KB
MD52e89ee6d11f183e32110c76e67b66e1d
SHA147016dcae36c13f4adb1ac12880036292be6243b
SHA25625b8000f5d23e69f1619537ac1a197e4f105d53568806683b6c2c394ae05f9dd
SHA5124e126b2195f8edb78862af221e1d6dda6c620fbed5cf1467bac059ac8dacba3a45235598c67d190617fa941726790ab60c9cd2d979236018667b0eb698859d7e