Analysis

  • max time kernel
    27s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/03/2024, 05:42

General

  • Target

    bffcb3b265905dcd15503d306cf6faae.exe

  • Size

    323KB

  • MD5

    bffcb3b265905dcd15503d306cf6faae

  • SHA1

    5971fb2aa44163d1ad18a13a00e7836dc1634f82

  • SHA256

    788e90f6c82a39bee2f10e7a24b8673142d61564811d6c182da3b9093f8b7c81

  • SHA512

    cd2db0b5f3c870599ef928f13ce0cc80122bb93c99e1c5a7b05b957b2fb5b0306009de5f254d81721c0fc85800acfa0b07542f9aec2d7dec1b793a2a391f7067

  • SSDEEP

    6144:jBxeN/Tdx8YzL+4eBDgelLBL9C53TV5n+yNXavM:jBxe9dx8Yz6nhtL9C53TV5n+4av

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 12 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 12 IoCs
  • Disables use of System Restore points 1 TTPs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 20 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 44 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 47 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 45 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs
  • System policy modification 1 TTPs 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bffcb3b265905dcd15503d306cf6faae.exe
    "C:\Users\Admin\AppData\Local\Temp\bffcb3b265905dcd15503d306cf6faae.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • UAC bypass
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Sets file execution options in registry
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2404
    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
      C:\Windows\system32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1328
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
        C:\Windows\system32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:936
      • C:\Windows\SysWOW64\Kantuk.exe
        C:\Windows\system32\Kantuk.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Sets file execution options in registry
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Enumerates connected drives
        • Drops autorun.inf file
        • Modifies Control Panel
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:1972
      • C:\Windows\SysWOW64\4K51K4.exe
        C:\Windows\system32\4K51K4.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Sets file execution options in registry
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Modifies Control Panel
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:2520
      • C:\Windows\SysWOW64\K0L4B0R451.exe
        C:\Windows\system32\K0L4B0R451.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Sets file execution options in registry
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Enumerates connected drives
        • Modifies Control Panel
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:2208
      • C:\Windows\SysWOW64\GoldenGhost.exe
        C:\Windows\system32\GoldenGhost.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Sets file execution options in registry
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Modifies Control Panel
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:1704
    • C:\Windows\SysWOW64\Kantuk.exe
      C:\Windows\system32\Kantuk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1608
    • C:\Windows\SysWOW64\4K51K4.exe
      C:\Windows\system32\4K51K4.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2080
    • C:\Windows\SysWOW64\K0L4B0R451.exe
      C:\Windows\system32\K0L4B0R451.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2640
    • C:\Windows\SysWOW64\GoldenGhost.exe
      C:\Windows\system32\GoldenGhost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Aut0exec.bat

    Filesize

    323KB

    MD5

    6d2f89c4ce4cd43940d040a2d1a591df

    SHA1

    944f4ba3b3748d04e1537d160942899dc8735c68

    SHA256

    f9ed7e10b18820df54db59a947a5f0743a7ecc9aabdceb84a045698398631d9f

    SHA512

    0b2023331665f84f15aa4fec329e2442f737462c7e30a97e0ba0314c9bfcccdf44cdc9b25913679b490c76d5bcabc6bac14fc610a05216d460c12a92665791b3

  • C:\Aut0exec.bat

    Filesize

    323KB

    MD5

    fecc8cb5f436ba2f7c701a2448d4fa79

    SHA1

    ef7d5a718fcd95a6258793c7f6095285144c018e

    SHA256

    52a093329a465345ff5c74153168f7da5a481da597e91f2586cc412f99b062d4

    SHA512

    e5a35df5510eef45df3534e569030aa37728baec2d28b30b204a13fe42f84db9a95fedafd74e4debfb39d73f19b2d0686319d05d937ef8fb512bca05e330aa3b

  • C:\Aut0exec.bat

    Filesize

    64KB

    MD5

    7e72548fe5e8848cadfbe53d649f387c

    SHA1

    4b6b7b167d0f2c27545e412c7e658c0f90c3c5ac

    SHA256

    b0593d00eb733f4631eaf5cd86573bcde525d843a14e1337644f85d63814758f

    SHA512

    143fbf5ff2babb5c83f368ed3de114021c717232b03b4f056dfb40ffc30bc9024c2a3890de64be133024b2a5a8c0c78f794f71c0c7e3a7ca5c869597b3d68ed5

  • C:\Aut0exec.bat.tmp

    Filesize

    323KB

    MD5

    506e54e19f7066be422d5b1884520503

    SHA1

    f1ae9b5b0169feb74deb88f6aabe7dea42951fef

    SHA256

    6268fa55eaae91f5a8fb636f18338e772e85381aa13259f65914ad00a2a6b3ee

    SHA512

    34defc1f764594e05cde28fcf90967cf42d22c2f5e434dd02016c3de41d5c37d252c9ea99d12c3f69ad23eb355964745d3b9a7746c6aee73800e190fbee649f2

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif

    Filesize

    323KB

    MD5

    aae025e5c850f23b0540a7421dbcc5a5

    SHA1

    f8cd4202b941020e51b1dd4cc11a3be4c00b5d08

    SHA256

    e2cddf7d774502376bf4ac10df8593c43a255e63b2e7fa8fcb5556ba31a2307a

    SHA512

    f09e5098ffb8deb3a705908285ed4684d27884bca91f475527f7cfbac31674072c0b0302b227a7819ce2b6f4cedeed30ee4af6aca6a81ec5841b6a3193311c71

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif.tmp

    Filesize

    323KB

    MD5

    c06d89868e117b81949d0fcf78be7d04

    SHA1

    024086da9551325fd6da28bef0508ad7f65ca302

    SHA256

    6a17417552edba8ceba009fa292ac37998a26f6187d730f8319b211de3f0dcff

    SHA512

    7385a2ac30b426c7999ff2d7ad385c67af052187b9b96d96b25ab57234564858c80bd707fdfb88fc27e23f193b633f5eea5355c6826eee3cf33e20a5aeffdfc9

  • C:\Users\Admin\AppData\Local\Temp\Windows_3D.scr.tmp

    Filesize

    323KB

    MD5

    24f4f2397fdd7c99fba669aec226b944

    SHA1

    88c6fce14fbb407b511ffac14b0db8e0232d7fe8

    SHA256

    c0ebcb8f81e22319ecd93bc89eed3cc2c7163f8ed46911ecf817f95e80da34ec

    SHA512

    741dc1866212cb2c13dcd7616c51a8316ed9ff776f29dea914dda79f1539ef1f4d75e91a9cb20065e7597397ba3fb11d9830572ecc910c67c63ec59bcc09f26f

  • C:\Users\Admin\AppData\Local\Temp\Windows_3D.scr.tmp

    Filesize

    323KB

    MD5

    09b3d0257fee6eb8c3faa985fefdaa0e

    SHA1

    d4f1237e6a14ea1617fa09c33b80cd567e02acd9

    SHA256

    f55fd9bfada83a171e0d7a2de7757817cf63c010d972a8177b1bb189c8945838

    SHA512

    0c691175154c34fca47cd8c53e8a7891a27537215f4f7de38261f73f9943339017f7e9cc5378972fea923af346ae1740c84916f5283ccad641728e39bbf87fac

  • C:\Users\Admin\AppData\Local\Temp\Windows_3D.scr.tmp

    Filesize

    323KB

    MD5

    1d3813850de5d2e4953937eb905b818b

    SHA1

    a3b7945f83305d18e2a4a5f7600dfccd015c98a5

    SHA256

    e4917832c69d5fdf591de2d352f34fd42dfbdf505e50d0c85c6de300b21f122a

    SHA512

    0d3ee04e8931378e0080f9285e0a2bcc535d456cdb58cddc4181722e5cb2b7404a69fe7d44b1c364a7f8fc6388183a4517ef314844e737401314ef227735b965

  • C:\Windows\SysWOW64\4K51K4.exe

    Filesize

    323KB

    MD5

    4e69daef7693a9ff712f99966e59e43d

    SHA1

    5b079a68163d131c0135e9220d2b7c6d96a84c4a

    SHA256

    938e329edc54609048665f010e299f7c29507fc128a9722ad6dda07fc8af39af

    SHA512

    9610971a46d497e39782d94739f63523bbb48afc3869536e549da1ecd28e1c678622b5eb3ca3d1accf37ae7c67e2df1e49716f9dada68822883c5edaf5ef3638

  • C:\Windows\SysWOW64\4K51K4.exe

    Filesize

    323KB

    MD5

    e7627572fe96747162e987082c642801

    SHA1

    d95c107d51edda92fafc32fcbd8d9009363a5167

    SHA256

    a056b423d72e4bff0ea136d7bf6885ae8a954055d0bf8ec5e528c4e281af2db0

    SHA512

    0aa809d3fc0b5c668e64717a9d7dc9d3278429fbc41470a4cad1598e7c1051b5f6c5bea838f065886571b46c79cf44470345a3c8ad5187fa297690f805cff6f1

  • C:\Windows\SysWOW64\4K51K4.exe

    Filesize

    323KB

    MD5

    90ab68de8be8b50b4a72d0adb7937b77

    SHA1

    bb827c627f82bd3a9002e906ba17a749f4b103b5

    SHA256

    17806ffc096d1249d3f27e2aa21fe1bb582ef71b5f329e22f924874f1b1511c7

    SHA512

    b46e0447d614208ecc023c4848f07d704bac354a1231c1cbed4d08c932d15d74737a0cda1d6594e7a58965e662b5c55fd5d88e73f3b89d8fa54d0a098df5a9f8

  • C:\Windows\SysWOW64\4K51K4.exe.tmp

    Filesize

    323KB

    MD5

    2796a81c8af547b8af82e821064896f6

    SHA1

    9d25ef519c9f36ce1fb2d0873e2bf14a7828ae33

    SHA256

    2f3c9e031d1a4c889a508ae176f0ec3777664db44730bbe4dee1fff537544593

    SHA512

    98757b7a5246014eb6d5dc21bccfd3e896eb543f037a70b20185dd987359ffebad0077ac18a451a5ba272386ff0823ffbf5aaabf21c953b0d5d456c96fbcbc0d

  • C:\Windows\SysWOW64\Folder.ico

    Filesize

    7KB

    MD5

    d7f9d9553c172cba8825fa161e8e9851

    SHA1

    e45bdc6609d9d719e1cefa846f17d3d66332a3a0

    SHA256

    cd2e513851d519098acef16d191188ac2586d2174dfd1a84f4db7f41a6970086

    SHA512

    a03a806d9db86c0c4f6f8efc4b40008aa51f1625fc1c703a929bfa57a5caf962119b3c76044775af607d4ee1a8a671e1d0a2be66d19ee551717398f9ddc8ad24

  • C:\Windows\SysWOW64\GoldenGhost.exe

    Filesize

    323KB

    MD5

    e8d34586e653cd3d4c945ddfadbc8109

    SHA1

    5f98094efd8798d2054bd72e4378f1201f7bf15d

    SHA256

    baf49fac2742120caad6a03ce050a940f402d0317f5422040aed8bcde84013e5

    SHA512

    4396a4721c6156ff464c122fc1f49b4619fe667cdc8e66f3db066d14bdc78ae23e1e3ad14c7b1c09d7535f06fb543f70ff2df1bb2f7880f12e776d639b2520eb

  • C:\Windows\SysWOW64\GoldenGhost.exe

    Filesize

    323KB

    MD5

    bffcb3b265905dcd15503d306cf6faae

    SHA1

    5971fb2aa44163d1ad18a13a00e7836dc1634f82

    SHA256

    788e90f6c82a39bee2f10e7a24b8673142d61564811d6c182da3b9093f8b7c81

    SHA512

    cd2db0b5f3c870599ef928f13ce0cc80122bb93c99e1c5a7b05b957b2fb5b0306009de5f254d81721c0fc85800acfa0b07542f9aec2d7dec1b793a2a391f7067

  • C:\Windows\SysWOW64\GoldenGhost.exe.tmp

    Filesize

    323KB

    MD5

    dd10dab154c01dec5f447ccc62fa11a6

    SHA1

    10fb2f9607aeb1447e27f06e5a2eb9a5c98c45f5

    SHA256

    185329d972775a21a3433106ace7b884798c41737ac3a27e331b4c299f2bb76c

    SHA512

    1cf8d1456aca976470b9b4ee073cd434f7a668ac08e974d4b0105b2ce217c197d355939c484c56fab0d5ad1077974c2e326cb22a1928655522d92e7cebee5238

  • C:\Windows\SysWOW64\GoldenGhost.exe.tmp

    Filesize

    323KB

    MD5

    a49d71e03a18294410c3ba747b173132

    SHA1

    4d5b1eb39b5fab9db7c32e4c2e01299d6d14cbf9

    SHA256

    2754084a48525fa2ce6a8b64c980a9a04f4a392673569cdaf7aed734047fb7b5

    SHA512

    b07e6c65d3a8cd365e90343e5850b1745fe82add9a2468c3d939d41c9ef5ebc4a2cbf78cbf0b3a0de8348a10b625f7a70ce50f5b6385c3fc35ce19b63ce1dc47

  • C:\Windows\SysWOW64\K0L4B0R451.exe

    Filesize

    323KB

    MD5

    d4455c8442f495731b2836c5ac1ee2f2

    SHA1

    38346b47977ec73ac116c3ab72643433d1c8233b

    SHA256

    daeba9134d1d54fa8237d12acde258ba49f1225a02ee11ae4611b2964a316595

    SHA512

    f8ca7840001ec3d1a7c3e4bc38e8e8749c35cfbc637cf6b16f65490d2b8c94f6b905bb7562ff3ec085e03944a2104af9a4d084ea6c601cf56ac3f5c1c567d013

  • C:\Windows\SysWOW64\K0L4B0R451.exe.tmp

    Filesize

    323KB

    MD5

    cfa19e14f738d282b4016f2abb59dbfa

    SHA1

    03cf162ffc0dd0e1669885806360b6b1d26f16df

    SHA256

    17647d78dad702a5bff5606f0d93875eba3fafa7dfa2bc8f09ee669412efabf0

    SHA512

    9e86cff14512041706723f3588f7e6a8e8201e64a748c18f8d399412c0b29f4f98afb193dfdf56655a38df3b6109add1594e4373f5c5fb8dda451c9d7b8b4c7a

  • C:\Windows\SysWOW64\K0L4B0R451.exe.tmp

    Filesize

    323KB

    MD5

    0544c16f37a4dc3bde2af58efc70b365

    SHA1

    e4a5d4bff0013d8a5e0f220c5807c1d27aeaafe4

    SHA256

    991fd23459bdd117293488ce535d396724b50110a7cfb974723ccd916566a8b5

    SHA512

    069f453c1a50cdd986f5e9bd650ab9fc00765de27e44e0c19b529abd15f015f7605795f4e0ff94e4e4961ca9a3e7a1cfed0577bdc498408b50c736ea967d1ac0

  • C:\Windows\SysWOW64\Kantuk.exe

    Filesize

    323KB

    MD5

    caa8c01c3690a760fa3dda2a17872a52

    SHA1

    e2cd6c83facdd9380cc0b221aa1893f89fca0eda

    SHA256

    61a2f3c02300a8db8b0b15b86f9867725808a32d0aaae9bdfe699980f2739bf9

    SHA512

    15b802c9ee92cb39dec1fe46d59db46aa57c22dc0506d36d9d56261fb4f9f5c0c8795ffb24d17b1cb6a4ddc20465d7e9767d4801c09bc49352c6ce9eda419dcc

  • C:\Windows\SysWOW64\Kantuk.exe

    Filesize

    323KB

    MD5

    05431426d9ef30ba1bc72d4fe53ce04c

    SHA1

    93cba6fe656ac7cc49f2711a3d69a141702c642a

    SHA256

    022bd2132ccb6486a3ed8ce3b60f88e09a5feaf91abf991feeda0c9b161b5e7b

    SHA512

    dfe5def0f34c1a71c3e1b43b4cd21d9767922a1ee3850c773e739854776916c123c46da9244043b6d5490dddcda0748e1a0cafe31d6b87bd34f1766cd562e244

  • C:\Windows\SysWOW64\Kantuk.exe.tmp

    Filesize

    323KB

    MD5

    23853cc6aa4086715f3d3a86db60096a

    SHA1

    d72cd79f619457833138816dfe75605a59f2a2ee

    SHA256

    17ff6f36800f502727263cdbe26814a2b7a6d4884886b625f29589434e922675

    SHA512

    9b2f175eb60f5d8f47d35f62e6c0ae205582916a10de3dcd10fe4c6e10765c002f1ec82caaadc0775d346e45a81bd0e4c82ace67d75d13861bf817cbd61a4191

  • C:\Windows\SysWOW64\Kantuk.exe.tmp

    Filesize

    323KB

    MD5

    2f1e9e3378d35ff0a56043ba0c6a19a1

    SHA1

    963685994e6ae61d80d5843d28b1f4852445e7a9

    SHA256

    1ba52b97dc0522a3cee414bfa1d2f776baa26ef2be9606f6292b1aaf3720e3a1

    SHA512

    e508486b2dd809976b22b566b749e87425dd0ae4fa3d01f329186f37a48b199a7a92831396569a8848383af2f8e4c414d1d7aeeed5fbb5c3a5c1554410367a22

  • C:\Windows\SysWOW64\Player.ico

    Filesize

    2KB

    MD5

    43be35d4fb3ebc6ca0970f05365440e3

    SHA1

    87bc28e5d9a6ab0c79a07118ca578726ce61b1bc

    SHA256

    5a15c1aab77f132e7ce5928996919ed66564c6082a7f94d0a42229c480113fc5

    SHA512

    b2e24ff3702805d2ff8ecf3ddde8a8e6258965f992f37104c2ed9b763e1448ab32c7609a607e1d90cfba281e7add1e839855656d6453433a42c0d6c8923c9395

  • C:\Windows\SysWOW64\Shell32.com

    Filesize

    323KB

    MD5

    628d7e7f3870cdd1423354e0af41e844

    SHA1

    9a91422817c3b3176e3fc5fd5e5004cee4fa7edf

    SHA256

    185621c268df14180852d020357ba73f401cbcbb89f7a43baa0f0853d95f9384

    SHA512

    5e16f0fa18167252e7951fdfc07066dbec7b09bf978f7ba49e153be27f6a2c1a1b31bd0117c6b9e78070ce997469ba09297603ec8cb4908f799b6b4bab13da7e

  • C:\Windows\SysWOW64\Shell32.com.tmp

    Filesize

    323KB

    MD5

    185029d8e3462485453ce880e7b0c3d3

    SHA1

    7a2704499a575e32c298899f53f51fa5095dadd6

    SHA256

    45878565211ae467b2ce7308c415d97b94052e969c377b92c2b0d134f2c6f0a3

    SHA512

    33fa151b7e6ebcd178cb7e17cb3ce29a10d3224ffe0f7372ca64b7b5dbc724a844e791b2802747ebd9114bff1ff5f331983a66f5847c63ec9e7b16e01df8b61e

  • C:\Windows\SysWOW64\Shell32.com.tmp

    Filesize

    323KB

    MD5

    179a1c04de7142bdb24dff2f7c2e9788

    SHA1

    bb6647b53effffeb640900c0385acdde95f279ae

    SHA256

    9ca50051aa9bf76fb1a87f7fb92a67d9b45ba367ea875db763270cd30a3ccb0c

    SHA512

    a0c790b5d221234d139d8995e8a652d31162202f497c18dd96216c9bdb87e799d9c3bd3609b0af684010237a3ecf4af0c85ddf08d46cd891c5bf5377454e53ae

  • C:\Windows\SysWOW64\Word.ico

    Filesize

    3KB

    MD5

    8482935ff2fab6025b44b5a23c750480

    SHA1

    d770c46d210c0fd302fa035a6054f5ac19f3bd13

    SHA256

    dcbcdce04483e9d2d8a5d7779b18b7f64cfc06e758b07f671493e38dfb9ab33c

    SHA512

    00c711d815815a88fc15f73c8cba6a81b2bfc505baff2cc67b456545151fe896029f11127e447c9bbc5a2d5dc561a06a52be9a9f9c0d28e98ea4e174cdd54398

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\JPG.ico

    Filesize

    2KB

    MD5

    62b7610403ea3ac4776df9eb93bf4ba4

    SHA1

    b4a6cd17516f8fba679f15eda654928dc44dc502

    SHA256

    b0fd7ffb4c8f0e4566658a7284ca0652961648aaab44a53c5b9713664b122c29

    SHA512

    fa1995a21ffe073a15fa00a3a8717492b0a67f3615abe4c7e6bce054bb23cf545e10e21cfe3625b665c8bb199577815dbeccc7c6107cdb49f673b8d53f23888d

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe.tmp

    Filesize

    323KB

    MD5

    a0cc9b8f5aecd5aa8b5ad63efb8e3596

    SHA1

    2513f200a828f83ed306e56eeb1ae55188fec49e

    SHA256

    174134e17b39a68658889893e11048940daa92195e9b60536abde12dae5ceb6e

    SHA512

    5009df3d3823fb817d02e9a9c16a926e31f2e66cc2690e92df560df24ddf33fd8a148af8c70e24959361db58e5ce5cdd74bd5dff0332390a40c73f6847323faa

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe.tmp

    Filesize

    323KB

    MD5

    443fabf98aa74f9c94c4dd39abffe92a

    SHA1

    46d7d3c54d641472fb14845c6a3b8c2d5328fa13

    SHA256

    6260e072bbe8c3d5ece0ccbb70d49b282a8881275b854900df5fc1b7accb2681

    SHA512

    478bd505e5fd5755037de1222a00192030c88d95fd98e6317153691338ec64922765603ec8050f0ece6c239bd7d6c59ea10c7f100e477809a42a787a7d46b46b

  • \Windows\SysWOW64\4K51K4.exe

    Filesize

    323KB

    MD5

    a23f3083c0c9b639a003c1be19cdbf88

    SHA1

    7d9fc117082cf1768024f00998fc7397b6fb54ff

    SHA256

    7b4aabb6803e39d9e9fbecf02010d2ae5f7d11896c6c7bc8afd14b6a19e58c08

    SHA512

    25e5d4e4650a5f7efd849d1c8490f1f45027919a8bda35e2066c3c1b9c49c5af60d2c9c3619de7cacfc4d34622dcbb117488a6b58150071248d54de58f6c82ff

  • \Windows\SysWOW64\GoldenGhost.exe

    Filesize

    323KB

    MD5

    5fcc9595184479c6e1fd80f78029e615

    SHA1

    ccb9ce79441b1e795d0cc7c9ba8855cdae3eac0a

    SHA256

    7aca30db8e714af715122763b75b8fdc4ad4e8dce1c97f8f8f89bdddb45fbe87

    SHA512

    7d7099b524ed4c4004ec71a51c73eda2b2fb357904fa655e4f9421756b4c5cfd5fba0209afb566a77afd29d72ca21c4c9cbe2ad012f02aed9b967ff2102eb962

  • \Windows\SysWOW64\Kantuk.exe

    Filesize

    323KB

    MD5

    19cf50fca373feeeb84a59b881d91916

    SHA1

    b800e6683952294dc83cb27c9ee1a5d060abad56

    SHA256

    6558eb79d122ad300bfdcbc47e189595bab946e8afb2891e09ce9d4b937accf6

    SHA512

    35ddfce5cc3e30460eb350086b05fd26de4305e11092cbe84b3f4dc2e8a2fe2b7b63f00c224905f6da61bb5d35139a159f26a49128ebad99ca15de5c560099a7

  • memory/1328-211-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/1704-362-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/1972-323-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2208-352-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2404-0-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2520-346-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB