Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    166s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/10/2023, 13:58 UTC

General

  • Target

    NEAS.NEASd706c2e356a3bebe0475aafc6a63dadeexe_JC.exe

  • Size

    91KB

  • MD5

    d706c2e356a3bebe0475aafc6a63dade

  • SHA1

    ca5c68350f9243d604a12559db2e44db8144bdb3

  • SHA256

    632afae0364939a18b6d18c91f9233f1db69524917d7ea3f763cd8e8dbea486d

  • SHA512

    69f105dcc29e13ae47265631bcc76851ccc03c639ae05f125a094512d0789c327a996525c4c851e517a0d2fc769fbe7f519fd987b4fac4e41a3c9dad15c86c25

  • SSDEEP

    768:E3gRYjXbUeHORIC4ZxBMldNKm8Mxm8I+IxrjPfAQ4o3ImuKyp3gRYjXbUeHORIC7:uT3OA3+KQsxfS4jynT3OA3+KQsxfS4q

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 14 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.NEASd706c2e356a3bebe0475aafc6a63dadeexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.NEASd706c2e356a3bebe0475aafc6a63dadeexe_JC.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2008
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2932
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:960
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:5016
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1668
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1340
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1216
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4916
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3760
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:520
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2932
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3996
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1340
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2560
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2468

Network

  • flag-us
    DNS
    59.128.231.4.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    59.128.231.4.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    86.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    86.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    18.31.95.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.31.95.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    74.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    74.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    158.240.127.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    158.240.127.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    1.202.248.87.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    1.202.248.87.in-addr.arpa
    IN PTR
    Response
    1.202.248.87.in-addr.arpa
    IN PTR
    https-87-248-202-1amsllnwnet
  • flag-us
    DNS
    208.194.73.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    208.194.73.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    2.136.104.51.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    2.136.104.51.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    146.78.124.51.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    146.78.124.51.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    113.208.253.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    113.208.253.8.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    38.148.119.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    38.148.119.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    0.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    0.159.190.20.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    59.128.231.4.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    59.128.231.4.in-addr.arpa

  • 8.8.8.8:53
    86.23.85.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    86.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    18.31.95.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    18.31.95.13.in-addr.arpa

  • 8.8.8.8:53
    74.32.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    74.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    158.240.127.40.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    158.240.127.40.in-addr.arpa

  • 8.8.8.8:53
    1.202.248.87.in-addr.arpa
    dns
    71 B
    116 B
    1
    1

    DNS Request

    1.202.248.87.in-addr.arpa

  • 8.8.8.8:53
    208.194.73.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    208.194.73.20.in-addr.arpa

  • 8.8.8.8:53
    2.136.104.51.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    2.136.104.51.in-addr.arpa

  • 8.8.8.8:53
    146.78.124.51.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    146.78.124.51.in-addr.arpa

  • 8.8.8.8:53
    113.208.253.8.in-addr.arpa
    dns
    72 B
    126 B
    1
    1

    DNS Request

    113.208.253.8.in-addr.arpa

  • 8.8.8.8:53
    38.148.119.40.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    38.148.119.40.in-addr.arpa

  • 8.8.8.8:53
    0.159.190.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    0.159.190.20.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    f40196ff220ef2a1a940277b836cb437

    SHA1

    36d569e31ab7a2d5576d90c18dad724cd32a1707

    SHA256

    e13437555c69768692ad97d87d20a8f247f711e80827457f858e596192829d70

    SHA512

    06339d23ec7082e28dd78ad591f2bc43e9aed4380bf53602e351fa34cc529a55155a7c773ef240208f7bb30f646667773d833c1135a919a7b7f423ae5331895d

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    c01d2aa650a9be297927af6bca63e2d0

    SHA1

    4e7b18b9ccc2f7673908a4112928588cf2bf3dad

    SHA256

    5f702fc4d827bc92e8f557bdf919ad171cc9218ed0b533d6bed853d1099c57dc

    SHA512

    5fec9cb9a4e264bf2fd31068de96b6e55aeb9a7611e78a58df007b7af3ca6663421a296298fdb51ea97eabeb1aff33b763f88e6d133c36dabb24c4c0c06b8fbe

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    30a821e1dde1eae794353198bc42eca2

    SHA1

    477f60377de53d97b2c825ea2ac8ae510fbcf2b1

    SHA256

    7b4f055e45adbb6dbaf8f1196e5ebdfc1ed36108b5dd1a978c0ac351647b139a

    SHA512

    67232f8fa565b587185d9b7d4ab884c31df4d45f6a666c42058d4361b1cac57b56c5fb698cea12068de201609cd4da9a97704400fb52b15904558ada50fdcb35

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    32622d9f67202fbc8fea0a7d9f0a6216

    SHA1

    0a81bdca45cb447d4491023c0847184ce081356e

    SHA256

    451223a784959e85589baa1fd5cfad1f45e1c3fb9051c90c50e77d751efd1bd5

    SHA512

    5087da0490f5144dcb56ef8cd43e8c0231e6b380d44630500d0cb1f730ea766b8e5bb4fda88f80f602f36e51dc87ffa27080a9c32a2474b76ad8da528761d502

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    50e790fe6f4e7e2c79d4010cb0efddb3

    SHA1

    bb027284b0c0e3286e9566fa6179e96db73b53f2

    SHA256

    dfad9f288adcfa7e0580bcae9c992e8f1fe6641b4cfdd79fa7873ec03044a655

    SHA512

    92f12e38904078151674d3be0df03232bcb2af2fe0072fc8e9ea8c389e761a9b1fc28f4bece6c64db388fffa3e46bc9da6c1c2e85548ffc0cccc452d4129f9b4

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    b749a523382b62f605025afb3ba29ae1

    SHA1

    f52a5af67e4c9f91c962cba83935366d2ce47b23

    SHA256

    f9192b94bec7bd7052758f5efc96b2b34613fc7ae1697dc22cdaf08e42638e08

    SHA512

    43632874b70cf7c38ee0df06bd51edc56d9d1509e4725b61ab63855b9304b77e72aac75be6217d79aff8577ae3b0efc0768ded04fdee140343d29c4f5ccdb1a7

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    8984a8ffe965412d180f214add82e86c

    SHA1

    5e9ba7ae50cb82357713a6f708245d60e9d67b0f

    SHA256

    e710f8ec2205d6a71607c388c8011120fb473c89bbd9c2b6caa73c9ba3e558bf

    SHA512

    cea9eea880c85968e2b4d8c8b8c6e7c952accbde89d946e11aa733e219ac6911bd3921a3d7658595bf524511e1abe5e5555feacd9a6c08af5ad5df324df2ad0b

  • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    dba3f48faf3820b090f7571c4b62853d

    SHA1

    e06f9f30920b005c3dd43c4e13f1785c49a8945f

    SHA256

    efd5e5e792012258d4b1e1a0232a8a6fdd7ff465bb025d13042374e5490a216a

    SHA512

    ffc9116502ec0bade9b1741ba7cde89addb12faade92ff06247cacb9b5759077de8f2e476528a4eadc99aa9100408ff0c819d3260b669cda3ba953c6a2acb31d

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    cd1018df037ad9c36ce7cf9440161d3d

    SHA1

    a6183b99f55ea42ae51f8fb415f508c67d68d22a

    SHA256

    af912bf1a82882a54a67749d5e3f6264109fb7d37e5e214a6b66bb70c743fe6e

    SHA512

    7908a08fdbae5012aaf23f60613c8d19eb4b84f8e168fb5cc829fba0bb8777e9912975c04b8a6b8007d6d2048ca46f2803a3287b389290c0975d2f5d709e7e6e

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    68ee88cb56d6f92758d2e4b75cbd4d52

    SHA1

    bce6f69b8d033bee6246f2e2c4e29a0be447ccb4

    SHA256

    0773a80b7f38446ab77705a048901cadd329c52956f54208829ef2eb529126e3

    SHA512

    316a8d832be5f683003607b0c1f5cd25277253891f363a558c3fa318dbaadd7ba2031254bb6e7b171b7b5ba763f16c8f1fe61bc103a7fb28261a76031227e16a

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    c01d2aa650a9be297927af6bca63e2d0

    SHA1

    4e7b18b9ccc2f7673908a4112928588cf2bf3dad

    SHA256

    5f702fc4d827bc92e8f557bdf919ad171cc9218ed0b533d6bed853d1099c57dc

    SHA512

    5fec9cb9a4e264bf2fd31068de96b6e55aeb9a7611e78a58df007b7af3ca6663421a296298fdb51ea97eabeb1aff33b763f88e6d133c36dabb24c4c0c06b8fbe

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    30a821e1dde1eae794353198bc42eca2

    SHA1

    477f60377de53d97b2c825ea2ac8ae510fbcf2b1

    SHA256

    7b4f055e45adbb6dbaf8f1196e5ebdfc1ed36108b5dd1a978c0ac351647b139a

    SHA512

    67232f8fa565b587185d9b7d4ab884c31df4d45f6a666c42058d4361b1cac57b56c5fb698cea12068de201609cd4da9a97704400fb52b15904558ada50fdcb35

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    b749a523382b62f605025afb3ba29ae1

    SHA1

    f52a5af67e4c9f91c962cba83935366d2ce47b23

    SHA256

    f9192b94bec7bd7052758f5efc96b2b34613fc7ae1697dc22cdaf08e42638e08

    SHA512

    43632874b70cf7c38ee0df06bd51edc56d9d1509e4725b61ab63855b9304b77e72aac75be6217d79aff8577ae3b0efc0768ded04fdee140343d29c4f5ccdb1a7

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    8984a8ffe965412d180f214add82e86c

    SHA1

    5e9ba7ae50cb82357713a6f708245d60e9d67b0f

    SHA256

    e710f8ec2205d6a71607c388c8011120fb473c89bbd9c2b6caa73c9ba3e558bf

    SHA512

    cea9eea880c85968e2b4d8c8b8c6e7c952accbde89d946e11aa733e219ac6911bd3921a3d7658595bf524511e1abe5e5555feacd9a6c08af5ad5df324df2ad0b

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    68ee88cb56d6f92758d2e4b75cbd4d52

    SHA1

    bce6f69b8d033bee6246f2e2c4e29a0be447ccb4

    SHA256

    0773a80b7f38446ab77705a048901cadd329c52956f54208829ef2eb529126e3

    SHA512

    316a8d832be5f683003607b0c1f5cd25277253891f363a558c3fa318dbaadd7ba2031254bb6e7b171b7b5ba763f16c8f1fe61bc103a7fb28261a76031227e16a

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    d706c2e356a3bebe0475aafc6a63dade

    SHA1

    ca5c68350f9243d604a12559db2e44db8144bdb3

    SHA256

    632afae0364939a18b6d18c91f9233f1db69524917d7ea3f763cd8e8dbea486d

    SHA512

    69f105dcc29e13ae47265631bcc76851ccc03c639ae05f125a094512d0789c327a996525c4c851e517a0d2fc769fbe7f519fd987b4fac4e41a3c9dad15c86c25

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    06299fd6684cb939625010032e296460

    SHA1

    d01e80a2ec2d00c1ea6726253ca9a102237bd656

    SHA256

    6b455814d567b1778fe9ccc0e536d19c502888924bc31ae828aa40350e325c4d

    SHA512

    0719fbc4cf17f9f5a9a294577b45a173ad3c3e89da6d90da2e56d87361e3eb77294391b76f243f313f8d34a62d0133a6e52f582cdfc7c38d373de8887f56e43c

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    c6c40f40d4a88c34095a3fbecdc3df5b

    SHA1

    fef734970daf8d519167a10cf4c04ae6c676e9f5

    SHA256

    92db8595ec4d07cbea96c186836f260ebe7a571d40b589d372209a55a33512b3

    SHA512

    5b2778fc3c1584aec1bd9dbc1e1518add0b95ca9ff4c08114e854a2aca947e3575c0849510d2a540ecd63f1322a4e4fa79dfed61e3c94eaddef261785006bd79

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    c6c40f40d4a88c34095a3fbecdc3df5b

    SHA1

    fef734970daf8d519167a10cf4c04ae6c676e9f5

    SHA256

    92db8595ec4d07cbea96c186836f260ebe7a571d40b589d372209a55a33512b3

    SHA512

    5b2778fc3c1584aec1bd9dbc1e1518add0b95ca9ff4c08114e854a2aca947e3575c0849510d2a540ecd63f1322a4e4fa79dfed61e3c94eaddef261785006bd79

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    097b56f98b9f14e8686fc856ee46a6e8

    SHA1

    a4f94c7a324f50399721c73df31bf1336d8cb34a

    SHA256

    98886995dbb07ad15660385c2a15dbf4c1d546cabd42dd114644121a893bb9fb

    SHA512

    fc80c1bfba887da75a14425a9ad9e00a937ba0d67216d4bac745c218a2534cfcba62ba49cba477aa09547ea2ed77f84d876b1417bcb77398c390dae632d64f9b

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    56a5a33b0018d95cefa6153533652682

    SHA1

    bcc6237a40c5f28a63d5f692a5aeec70c9bc8b8b

    SHA256

    70a7469d9ed71674c81dcdd390149fa2af74a542a22e5c76c8ea25d366648cfb

    SHA512

    3f747fc156b6ab272a12c1ff71d74cd09545c1d5d244314fd7e0fbc5aec1f87438f4f98c7da7fa04dbc389b66df8d30a9b62ed98a55867008acbcc52bff7273f

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    56a5a33b0018d95cefa6153533652682

    SHA1

    bcc6237a40c5f28a63d5f692a5aeec70c9bc8b8b

    SHA256

    70a7469d9ed71674c81dcdd390149fa2af74a542a22e5c76c8ea25d366648cfb

    SHA512

    3f747fc156b6ab272a12c1ff71d74cd09545c1d5d244314fd7e0fbc5aec1f87438f4f98c7da7fa04dbc389b66df8d30a9b62ed98a55867008acbcc52bff7273f

  • C:\XK\Folder.htt

    Filesize

    640B

    MD5

    5d142e7978321fde49abd9a068b64d97

    SHA1

    70020fcf7f3d6dafb6c8cd7a55395196a487bef4

    SHA256

    fe222b08327bbfb35cbd627c0526ba7b5755b02ce0a95823a4c0bf58e601d061

    SHA512

    2351284652a9a1b35006baf4727a85199406e464ac33cb4701a6182e1076aaff022c227dbe4ad6e916eba15ebad08b10719a8e86d5a0f89844a163a7d4a7bbf9

  • C:\desktop.ini

    Filesize

    217B

    MD5

    c00d8433fe598abff197e690231531e0

    SHA1

    4f6b87a4327ff5343e9e87275d505b9f145a7e42

    SHA256

    52fb776a91b260bf196016ecb195550cdd9084058fe7b4dd3fe2d4fda1b6470e

    SHA512

    a71523ec2bd711e381a37baabd89517dff6c6530a435f4382b7f4056f98aff5d6014e85ce3b79bd1f02fdd6adc925cd3fc051752c1069e9eb511a465cd9908e1

  • memory/520-263-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/520-259-0x0000000074C00000-0x0000000074D5D000-memory.dmp

    Filesize

    1.4MB

  • memory/960-63-0x0000000074C00000-0x0000000074D5D000-memory.dmp

    Filesize

    1.4MB

  • memory/960-67-0x00000000001C0000-0x00000000001C4000-memory.dmp

    Filesize

    16KB

  • memory/960-64-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/960-70-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1216-102-0x00000000001E0000-0x00000000001E4000-memory.dmp

    Filesize

    16KB

  • memory/1216-103-0x0000000074C00000-0x0000000074D5D000-memory.dmp

    Filesize

    1.4MB

  • memory/1216-107-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1340-341-0x0000000074C00000-0x0000000074D5D000-memory.dmp

    Filesize

    1.4MB

  • memory/1340-94-0x0000000074C00000-0x0000000074D5D000-memory.dmp

    Filesize

    1.4MB

  • memory/1340-93-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1340-345-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1668-89-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/1668-85-0x00000000001E0000-0x00000000001E4000-memory.dmp

    Filesize

    16KB

  • memory/1668-84-0x0000000074C00000-0x0000000074D5D000-memory.dmp

    Filesize

    1.4MB

  • memory/2008-3-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2008-140-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2008-142-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2008-1-0x00000000001C0000-0x00000000001C4000-memory.dmp

    Filesize

    16KB

  • memory/2008-291-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2008-390-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2008-2-0x0000000074C00000-0x0000000074D5D000-memory.dmp

    Filesize

    1.4MB

  • memory/2008-0-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2008-4-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2008-7-0x00000000001C0000-0x00000000001C4000-memory.dmp

    Filesize

    16KB

  • memory/2008-8-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2468-385-0x0000000074C00000-0x0000000074D5D000-memory.dmp

    Filesize

    1.4MB

  • memory/2468-389-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2560-382-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2560-378-0x0000000074C00000-0x0000000074D5D000-memory.dmp

    Filesize

    1.4MB

  • memory/2932-55-0x0000000074C00000-0x0000000074D5D000-memory.dmp

    Filesize

    1.4MB

  • memory/2932-295-0x0000000000020000-0x0000000000024000-memory.dmp

    Filesize

    16KB

  • memory/2932-296-0x0000000074C00000-0x0000000074D5D000-memory.dmp

    Filesize

    1.4MB

  • memory/2932-300-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/2932-302-0x0000000000020000-0x0000000000024000-memory.dmp

    Filesize

    16KB

  • memory/2932-65-0x00000000001C0000-0x00000000001C4000-memory.dmp

    Filesize

    16KB

  • memory/2932-60-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3760-258-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3760-252-0x0000000074C00000-0x0000000074D5D000-memory.dmp

    Filesize

    1.4MB

  • memory/3760-251-0x0000000000020000-0x0000000000024000-memory.dmp

    Filesize

    16KB

  • memory/3996-309-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/3996-330-0x00000000001E0000-0x00000000001E4000-memory.dmp

    Filesize

    16KB

  • memory/3996-304-0x0000000074C00000-0x0000000074D5D000-memory.dmp

    Filesize

    1.4MB

  • memory/4916-111-0x0000000074C00000-0x0000000074D5D000-memory.dmp

    Filesize

    1.4MB

  • memory/5016-75-0x0000000074C00000-0x0000000074D5D000-memory.dmp

    Filesize

    1.4MB

  • memory/5016-74-0x00000000001C0000-0x00000000001C4000-memory.dmp

    Filesize

    16KB

  • memory/5016-79-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/5016-80-0x00000000001C0000-0x00000000001C4000-memory.dmp

    Filesize

    16KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.