Analysis

  • max time kernel
    151s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 22:50

General

  • Target

    50f212da43ad32fe7504eef47811e2f0_NeikiAnalytics.exe

  • Size

    52KB

  • MD5

    50f212da43ad32fe7504eef47811e2f0

  • SHA1

    bac5412ee24fd94f00c0d27855851aca5f6a31bc

  • SHA256

    7001597d4fa6b20a09ebbb2476555535d819d4d7c5f81b60318c9c626e70d72b

  • SHA512

    ed83b4d8062723ff19de27b6af9f507285c27c8464cb25c8f144154bfb7fa464232c0025709aa4b82d06900a8dedf16f76268f0ba531e1f2cb58d8e45bc96fa0

  • SSDEEP

    768:d+ciLamXW9XgMxjFkpvMVX8q18q13yO1+33j5n/wy0kfw:IzaEW5gMxZVXf8a3yO10pwyu

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 16 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
  • Windows security bypass 2 TTPs 40 IoCs
  • Blocks application from running via registry modification 48 IoCs

    Adds application to list of disallowed applications.

  • Disables RegEdit via registry modification 16 IoCs
  • Disables use of System Restore points 1 TTPs
  • Sets file execution options in registry 2 TTPs 16 IoCs
  • Executes dropped EXE 25 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Windows security modification 2 TTPs 48 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 37 IoCs
  • Drops file in Windows directory 24 IoCs
  • Modifies Control Panel 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 16 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50f212da43ad32fe7504eef47811e2f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\50f212da43ad32fe7504eef47811e2f0_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Windows security bypass
    • Blocks application from running via registry modification
    • Disables RegEdit via registry modification
    • Sets file execution options in registry
    • Modifies system executable filetype association
    • Windows security modification
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3588
    • C:\Windows\nEwb0Rn.exe
      C:\Windows\nEwb0Rn.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4764
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4020
    • C:\Windows\SysWOW64\WishfulThinking.exe
      C:\Windows\system32\WishfulThinking.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:3120
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:3972
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4028
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3544
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:4488
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3668
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4556
    • C:\Windows\nEwb0Rn.exe
      C:\Windows\nEwb0Rn.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3556
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4360
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2260
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4592
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4020
    • C:\Windows\SysWOW64\WishfulThinking.exe
      C:\Windows\system32\WishfulThinking.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4328
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4924
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:4072
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2392
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4356
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3604
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3864
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:4800
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3092
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4552
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:220
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1884

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

      Filesize

      52KB

      MD5

      9327c84324659bb2bb5787e0239f014d

      SHA1

      2ae42e5d3b9e4706ebc9114e527b2bc3a7e67826

      SHA256

      1af32347ee8f61a535756f45d6d6cc7f28146fded485781cb79668030ce056dc

      SHA512

      11dd721abfeacdcd66a88d10fd5463fd531e2d7f1bdb5415fe7db47d9f4698ba2c211c6f00652cde85b3f1f958bfae595338e6ac0721ca3e31f5cb38693717f7

    • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

      Filesize

      52KB

      MD5

      96f7a8ae4fa81f93bcc635f8dbdde85c

      SHA1

      58e56ba88e01c517c65e9b136257dbac54947193

      SHA256

      7d95ebd7c10cf11a62e86da9e3e9c025857477a9f1848a8b51e804954d656a5e

      SHA512

      a76b6a689375119254b83f1835348ade34694d66135a862ac224dce49ec3c531c4c8fa8a2e1e9638f1d06e51389794655b42a9d54db81b3178920d3bd4145273

    • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

      Filesize

      52KB

      MD5

      041594dfaf4b6f60509d367a85b0a57c

      SHA1

      40b9f5d278b85e4a6d3ca651c51e0018fc811a8b

      SHA256

      9383b978846524caf1155c1442686b70ec088bd7b802bcc2fd09a95321d5a452

      SHA512

      d302f4b086399a800d8e26315a14dd46c881c76c55a6b620df4c35fd8bee2003015e084846c4cfdc4a7c48d0f20d13d1795f701503a4f9dd50dbae391fc44904

    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE

      Filesize

      52KB

      MD5

      f186d31ecf98e4facf37651babb12604

      SHA1

      781c65b7baabfe1e1e01c38407eed5b38fc65f69

      SHA256

      3dd1b47dd95350a891906a22913dcfd6dd2dcf1c1a297b6b5321c1d66eed9c2c

      SHA512

      1342130479d147743b863c6500b6277eb53d70072cb69ee73b1d88502d4dfd8f960ffb2924bf23d243ead7ec27f2de8d1b4d55b5226ce96a7f7cad75aa277065

    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE

      Filesize

      52KB

      MD5

      338222e5b57e59b3d836bac2a3e7cd6d

      SHA1

      248e6d776f5bf683fcf2ee06e4b367c95eb10dd8

      SHA256

      826a4e57223ee82e297e9fd7ede59f0e90432931edc8d9be9fb315284de4a4b9

      SHA512

      ac017166d312a843a3845993c09a6e9b88b3a7d5ea8f80739df0e215f75fabe156e54983222db61bb37cc77e310eda67a37ba68baa80e9d18c27931988edc2ce

    • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

      Filesize

      52KB

      MD5

      acb1f6ccecaf7c3fedcd23a427a5af7d

      SHA1

      a6125a08b18248b400275f461770bbb863bfce5f

      SHA256

      32457afb41096fbaebf129b43122880352db37050816234b7b156488210b6a2f

      SHA512

      55e1f34c232f16189d3116f2a26acfda1f24904aae8b89aeb5dea568cfafd394a913ccd33588a071bb58e683c522e5b636418d2afc2cc8809aeca527189f0ea0

    • C:\Windows\MSVBVM60.DLL

      Filesize

      1.4MB

      MD5

      25f62c02619174b35851b0e0455b3d94

      SHA1

      4e8ee85157f1769f6e3f61c0acbe59072209da71

      SHA256

      898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

      SHA512

      f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

    • C:\Windows\SysWOW64\DamageControl.scr

      Filesize

      52KB

      MD5

      b8c023eb4324cc2a0d75306c59070be7

      SHA1

      ab5dd46a0d6321ee42c42233b51340ca8b55ff25

      SHA256

      45bddb65a7956f576111915d2c5de00c77dce2794af80027fda6ee18ba8ec99d

      SHA512

      0d1d2b113bed76a9dabb8e45236923265175ba28de925467ea100e3da357e97d09189d199ebf335ed136c1752925ad659a00d029889e3f7698a4e3a41d9d6804

    • C:\Windows\SysWOW64\DamageControl.scr

      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • C:\Windows\SysWOW64\JawsOfLife.exe

      Filesize

      52KB

      MD5

      6f9db960121110c8e09fc279321aaad7

      SHA1

      125313a9c8edad5fb078f072eb11b38a81fc8668

      SHA256

      b03f558d8ba22aba724af88e7a25ae6ceea535e0f1abf262380ad240159d9d53

      SHA512

      6a9b8e510dc92e84ccdca72ebebf43f7821292392ba17b7ea58457cb072d1acc39f45e83759409a5c06fa9c4862f21b5e39acae8740ecf5fe550414488940407

    • C:\Windows\SysWOW64\JawsOfLife.exe

      Filesize

      52KB

      MD5

      ad370af8753dac5e015d9a0b46f5c06e

      SHA1

      d16b4be587c8636c108056409c69b463daa6fc9a

      SHA256

      22d55366f8b1aec873542a9b8648efdd0b1f67af307ddc8e0cd9261c2d61a49c

      SHA512

      2b16b15a0e5f423ad7edbde8ea8c98e0dc0f158ab8560b44b05521cd1312d8f8729cbe957e6673a40b5ab0758b998ea28cc5c130274be6c7eed9349f75e7f6a1

    • C:\Windows\SysWOW64\WishfulThinking.exe

      Filesize

      52KB

      MD5

      d0a511810bc3099e62da6d24824a1a20

      SHA1

      79b84a606b13f82b0fbc63c13fee26ace6045d7c

      SHA256

      30249360ac063ced300bab8d5cbce89329b088c207e49b3cd4b3152efc85aea0

      SHA512

      6d042d54b2f4f9c2baf8b5ab87c7bc14f4d46dbcfc8ae6429e30d69446cdf54fff7f146f399b3fdc7e83176ab7a30c5b23606ac47b9abe3228b5db57620d41f7

    • C:\Windows\SysWOW64\WishfulThinking.exe

      Filesize

      52KB

      MD5

      b73b7113b21556372b16bbb7041b8c1e

      SHA1

      0702b0d59d30c13e7f6f9733ffa2c51b68bdccfe

      SHA256

      7b8dec0dd51f85889d84e2f6e37c6cdaa155f303aedfc0a46aa5d9f58385170a

      SHA512

      913316a0f33c35e8bd5761a33d8cd0dcdcf2f9c490feef63942f9eda6b2da89e382552c93d6107e7ec61c6c274fc04a9504ddad3cb113eee28f92e518f4a9e03

    • C:\Windows\SysWOW64\WishfulThinking.exe

      Filesize

      52KB

      MD5

      50f212da43ad32fe7504eef47811e2f0

      SHA1

      bac5412ee24fd94f00c0d27855851aca5f6a31bc

      SHA256

      7001597d4fa6b20a09ebbb2476555535d819d4d7c5f81b60318c9c626e70d72b

      SHA512

      ed83b4d8062723ff19de27b6af9f507285c27c8464cb25c8f144154bfb7fa464232c0025709aa4b82d06900a8dedf16f76268f0ba531e1f2cb58d8e45bc96fa0

    • C:\Windows\nEwb0Rn.exe

      Filesize

      52KB

      MD5

      bb794d21c592c7502d230b120375fa0f

      SHA1

      19892ccb7075ba40f1474ba25a8219d53ac9f9b3

      SHA256

      6f284a16c084db04d82a32e58b7e4dba17b6219460c35d98def8e50b393ea283

      SHA512

      9fd6f8745582f6ba99a3cc793540de5f1597a17d247f427f42bf20c566933ac1b6e9bce966604a2060418612622f5eb1781b43e6b30472d927299535e801b3b9

    • C:\Windows\nEwb0Rn.exe

      Filesize

      52KB

      MD5

      75db90e069619f5d00d9470d95ef4f54

      SHA1

      083ce4934390bfaf834432da2220dae2967fa054

      SHA256

      04742aafdf89d42be904ec4ce7e95e3bf8771b16650f374d794de5030642f653

      SHA512

      4ad9e83d8b8149f7ce1efc9810d96eb78b8c60170465b1b66833ef4106cb6385b425efca137467c105d040b554a50c64f95f38f5ffbcd3e5b7bc51b3dd912276

    • C:\about.htm

      Filesize

      2KB

      MD5

      94c0c5518c4f4bb044842a006d04932a

      SHA1

      23d9a914f6681d65e2b1faa171f4cf492562ebdb

      SHA256

      224c4e5cdc0e7495c5fb5d1f52d76807092b5cc2d0a7c95fa612ff7b1412706e

      SHA512

      79cb2cd9e19ac3cc8bd94f1a20369e61224f8db02bc04d1f5768d62163b68467a3d317808a942bc7cca6ca84c221bb54a76e097f543c88bb89f0a3c9534ff3bb

    • C:\nEwb0Rn.exe

      Filesize

      52KB

      MD5

      86f66c2a47b05f6d216ba7eafb67b0df

      SHA1

      dc5c349d53d353161b3d576a2d730ac2e0553738

      SHA256

      ea326f0b12f234bacc635e3215a8407277c3781496c771d501fe90186e7aae72

      SHA512

      5f3f27b6fbcd2cdc8cd97e60853c9c4001287516e95ab8de618868c96b8fbed4f0b27b27d217ea98c0b2eaa7568a1fa35162f3ebcd01c1d812e852292c831666

    • memory/220-318-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2260-385-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2392-430-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2392-424-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3092-444-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3092-438-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3120-171-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3120-47-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3544-282-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3544-292-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3556-235-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3556-450-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3556-389-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3588-0-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3588-293-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3588-336-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3604-416-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3604-297-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3604-452-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3668-311-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3864-417-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3864-428-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3972-178-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3972-55-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4020-409-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4020-173-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4020-156-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4020-421-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4028-373-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4028-62-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4072-419-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4072-403-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4328-402-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4328-451-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4328-283-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4356-433-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4356-441-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4360-372-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4488-294-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4488-303-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4552-448-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4556-320-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4592-405-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4592-390-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4764-167-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4764-41-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4800-437-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4924-401-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB