Analysis

  • max time kernel
    149s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 09:59

General

  • Target

    3e6c2d6b25eb536bd73cb64f8d6ce680_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    3e6c2d6b25eb536bd73cb64f8d6ce680

  • SHA1

    16cbe8d43783b6bc4ea377eef4547e46258b11c9

  • SHA256

    7c0a7a60063a9997c830905fd02791393f3a1500b1032c102a9d0d1c63a5d819

  • SHA512

    6f7687b076ed2c931c9424c563b98dabc55b00d1d38989305617ba6c5ab4d11e5c4988dbbd76bad58e85fbc5ac54a9d1a54c3555f85b07de00e3676bf2f4fd56

  • SSDEEP

    1536:yOcjUpkWb2TTgKwuoOcjUpkWb2TTgKwuq:yOcjWJu7toOcjWJu7tq

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 16 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 8 IoCs
  • Disables RegEdit via registry modification 16 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 56 IoCs
  • Loads dropped DLL 7 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 40 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 50 IoCs
  • Drops file in Windows directory 32 IoCs
  • Modifies Control Panel 32 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 7 IoCs
  • Suspicious use of SetWindowsHookEx 57 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e6c2d6b25eb536bd73cb64f8d6ce680_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3e6c2d6b25eb536bd73cb64f8d6ce680_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4928
    • C:\Windows\4k51k4.exe
      C:\Windows\4k51k4.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2064
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4596
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:3056
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3896
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2824
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3576
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:880
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2944
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3920
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2608
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:3124
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2256
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4636
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3616
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2752
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4920
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4196
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3588
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:3300
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3440
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4760
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3204
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4456
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2100
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1444
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4348
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:1044
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4432
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1856
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:464
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1640
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2856
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2840
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4352
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:3288
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:900
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2616
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3404
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3752
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2804
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1524
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1520
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:1036
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2128
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:5036
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1408
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3180
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:564
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1788
      • C:\Windows\4k51k4.exe
        C:\Windows\4k51k4.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4156
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2904
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4736
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3312
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1600
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:5084
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3056
  • C:\Windows\System32\WaaSMedicAgent.exe
    C:\Windows\System32\WaaSMedicAgent.exe d47963ee757b79d4ec5b0c67314c0254 gc/ucfYnJkKwjzddCXdJFw.0.1.0.0.0
    1⤵
      PID:3616

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\4k51k4.exe

      Filesize

      91KB

      MD5

      f363c13fb6bf8ab5c84f1289185fdca2

      SHA1

      5d9ebcd0e0199356512cf618c1c002a04a874f35

      SHA256

      9ab694428894a6792551ba58144ab6322350b4442175ba5b36dc4fd4d0fe1a4d

      SHA512

      31acc4c04e6595f987bc0b9f116fb181940906fd7f0728572b40fffa6c745f435ba39b189c4554fb332277dd9df8eca58e5b08b163068cb559df27007c580ba4

    • C:\4k51k4.exe

      Filesize

      91KB

      MD5

      dffc2a4b85d9a5ed0afa3a73705083bb

      SHA1

      8927d81f3b572d46f9ccfbfa10135d92df2fe35f

      SHA256

      4dbe0a65a92f91f7fbf2a7206005d92a62e95f3cff8c30ddadee8fc04e84fda7

      SHA512

      62320af083df6206e1763daaf86bf1cd83811def039d6fa2badddfc54d91ca33a5808c5e44261eddd0231cc8f0283c4b0859b0494c3aff0058907715e793591f

    • C:\4k51k4.exe

      Filesize

      91KB

      MD5

      1d535a5e34dc7dd93dd77f47ea8992c6

      SHA1

      dafecdc7f8d5f297e27640cca735b56b32416e11

      SHA256

      be1858d8eb5124f98322af40a32067892632d952ccc5cb5ca40da9cff0953b4d

      SHA512

      948f87769ea2edae3b2e351f603a81479eab1e5a57c1bba3c0902fd666f43ea023e8cb8810e7531d4ce4ca77384f54e16aa23799c93ab2d0f2a0a148ae422ae0

    • C:\Puisi.txt

      Filesize

      442B

      MD5

      001424d7974b9a3995af292f6fcfe171

      SHA1

      f8201d49d594d712c8450679c856c2e8307d2337

      SHA256

      660ecfcd91ba19959d0c348724da95d7fd6dd57359898e6e3bcce600ff3c797d

      SHA512

      66ec4330b9a9961a2926516ec96d71e3311f67a61e6ac3070303453d26fa4fdc9524296f583c0e2179414f1a0d795cedbd094a83f5ecd3f1faa0cccfe4276657

    • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

      Filesize

      91KB

      MD5

      151d099da49819e29f41cd45e48e1611

      SHA1

      7f12207e5072b8ee22484c91c6c1876c2a02e461

      SHA256

      8e70a6cc10d4ba90877f7ce313068552447b561557ce0c7c292184fda04a49bd

      SHA512

      1e97f02a522553ee6157c35885623a3ac8655129b5de2d973f4a2300e33cf8356ab64aa679e946e568af167701848aecc393b7cc303fe3839e04d30ed4f05315

    • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

      Filesize

      91KB

      MD5

      a361b89ea694a5490c35c6f9f16557c1

      SHA1

      6a45fe8d180758d282746ea4373f317e04b01927

      SHA256

      b24e4ae50487cc29ff0352ac103bbfcbf4c9c5982a9195e0d7f561d1a2c7c69c

      SHA512

      054c51826023a12285f948925f4eef5b62249b0ca14ab0aba92f479de8d38357e7db5e32795685429ed04efe18336870945bb050aa9c3227922ace8c2f771a22

    • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

      Filesize

      91KB

      MD5

      4223ba4cfcd9348cdb81163c3ddc9fa1

      SHA1

      0c664a5445ef497433b3ab3ca9de7b5d5caec48f

      SHA256

      e52a846f796e820dff85595e5b2f7a3c8df3a4a2297d726bfe2f2375527df955

      SHA512

      acf3ef9894aa7eebb4526670f49964ec0b65c5e70e43aeee8caed286f5a24f588fb931aeced1818e4a4b2c06168ebe3257ee3b6f2350918b25d9132a759964b9

    • C:\Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

      Filesize

      91KB

      MD5

      f3bb868f04132f368b732017807e823f

      SHA1

      618403d7b60e6d4cf748aa0e1186f8a2098c23e0

      SHA256

      252a590dad44e8ff37ead30e0f5207cbdb7d2053396e1e7494ad91cb3886f623

      SHA512

      22ada195ac5b472de9ce3707336b6da6de0d943e2b10f8f1364d1c156b2049740901e7293ed7402036f578d541ce5eb73d53e83887cfabb3df2e38d87c0a08a2

    • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

      Filesize

      91KB

      MD5

      ec8ab90dc102f0fcebf6950b9616dba8

      SHA1

      e5a704c7b681871f938c315d93bed3cba7c16a0c

      SHA256

      515970073a1f0bcdedba6e64781e3e21f4fcfc69abd0434ce02b9a063091edb8

      SHA512

      5e4c7c1624aa9f42393168c5a31c7c67ea7caf04cd5a4d126bc549d9c260c3ae9c04e0a93d1ac7f6e8a42d6072b8bf3028949e4bff59cc2105321ad812493cd5

    • C:\Users\Admin\AppData\Local\winlogon.exe

      Filesize

      91KB

      MD5

      3e6c2d6b25eb536bd73cb64f8d6ce680

      SHA1

      16cbe8d43783b6bc4ea377eef4547e46258b11c9

      SHA256

      7c0a7a60063a9997c830905fd02791393f3a1500b1032c102a9d0d1c63a5d819

      SHA512

      6f7687b076ed2c931c9424c563b98dabc55b00d1d38989305617ba6c5ab4d11e5c4988dbbd76bad58e85fbc5ac54a9d1a54c3555f85b07de00e3676bf2f4fd56

    • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

      Filesize

      91KB

      MD5

      62a4553a7bc672aa9efa566a315ed6f8

      SHA1

      a28444c5118d023fea3fe03bbce443f7ccb96946

      SHA256

      ae89db70b60c2eec6a485e69b0080469338638eea2a33050b1e3fa4577ff3de0

      SHA512

      275148d0a3eecfc337bed084a433325771c21c019845998ac00d50c6931b783ac79a3a3b793ae753836d2c2af0e6a3f8310a55495a00c45ed056a37e5f7ff08c

    • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

      Filesize

      91KB

      MD5

      e9052576f72f0e51a9c4b7dbf7d8024f

      SHA1

      c750301113c77bd928a19b70b1c114d77daffb52

      SHA256

      78a4a519bd830bfc237b2669afa3f71fd6bd9d02070acf4bf122088dc771ff3e

      SHA512

      9d8ae9a515f262f84760a3cadc838b213d8fec67013a9541b6f9f57b9fa5a52ac6338d6f7a0260bd890fcb0d9caa87293149e0163738ec5613579145b84099e1

    • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

      Filesize

      91KB

      MD5

      c5ab611b5a227e2362ece9210900c378

      SHA1

      7ab04481251782744bb058a3b0dc8fd39fb0362c

      SHA256

      c07d23c92e4dacc0ba19e3c36b516b01eed96dfc61220ff4a054fb2fdbdec55e

      SHA512

      04590b31b724679c829f89d4f2a893a10da43f93ec709385bb0486c9c048ca2d14c5420224aa07dbe5bd59aab2b818f137a9321cc00fb068ab1f48b2acc915db

    • C:\Windows\4k51k4.exe

      Filesize

      91KB

      MD5

      4a3bf01cfe8a9fcd2bf2ba9be750c1cd

      SHA1

      a7a28840fab564431c8cdb4cb9fdd03b716dd7cd

      SHA256

      a165c64b3cc588da25977ab7df6ddf97236836f68fefb56823aaf15636ed910c

      SHA512

      5edb3d6b2a9840734a40344e38f709de05afa148e2119b84b2eb3aade5aec248a4bb4e15551eff53a2e1cefd84f8f7c6259cd278333d442704bb48ef755c435a

    • C:\Windows\MSVBVM60.DLL

      Filesize

      1.4MB

      MD5

      25f62c02619174b35851b0e0455b3d94

      SHA1

      4e8ee85157f1769f6e3f61c0acbe59072209da71

      SHA256

      898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

      SHA512

      f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

    • C:\Windows\SysWOW64\IExplorer.exe

      Filesize

      91KB

      MD5

      57053cea96785fc7cf2e86e334e87098

      SHA1

      44a58f43cc904ab02238ffb67127c690224d021e

      SHA256

      04c44bcbc797a85321a430f5cc455c3599c939443ffd6c6599f9cb4aa5cc65ab

      SHA512

      07aa3b60eeb51219d19e9529f77a748e85dfcc1361ffa35b6bfc0092a0c44adbbe1e51cbd8b5b44e654065a054f1f14024295722ef4310e805b8f90daad62650

    • C:\Windows\SysWOW64\MrHelloween.scr

      Filesize

      91KB

      MD5

      8969f0bf100bdda9eb256ac0ed37dabd

      SHA1

      a9722e7b399a638965ccb6d237a4431a2e3bf4e7

      SHA256

      a314c6b4da6ca6fba78771ff66975fcf4a65521f336ff84b912e8c297778290e

      SHA512

      0eb7c25b655294b1f7418efa909e927c674c633439c36222046c5f7e295fce15a7db319ec96bc96ef19d431967f57214a165e225349ea9bcf1a378ccf88a4833

    • C:\Windows\SysWOW64\MrHelloween.scr

      Filesize

      91KB

      MD5

      da9f8ad1f0198e71db98e30d69d31257

      SHA1

      9395e6869ae6f4fcafef9272e388c790488c1d87

      SHA256

      1a4889ca900972b5cfa9f9b61cd27e7dccacf0197d99c315c5891a34673f7ebf

      SHA512

      b902d4c3b1277f7cf2ab0ae0d0d9e87a78c7f0a4ec9bd28a80a9694d399cfa3153fcca163edd2888078539f00b2b2673b94cfd083b613a452f1b04774b3414ff

    • C:\Windows\SysWOW64\MrHelloween.scr

      Filesize

      91KB

      MD5

      ed4e13952e0821b8c9f2e595eacd514a

      SHA1

      57374c091eb2a5f287ac4aa5ef290b25ea5d7c74

      SHA256

      d8790f80bed13f433a5c8a48c9999b879893265414571211ef643d08ff3fde65

      SHA512

      1a89e5e536e4eb53d7fbb433d893fe1a3f4ef812a901d2fcb9c7a2e8088e52380101250cfe560e09d59c9741d2f72c273125429d1b75251c1453cfd7d5fdcdec

    • C:\Windows\SysWOW64\MrHelloween.scr

      Filesize

      91KB

      MD5

      856b485a3d22c0fe1478175a69848a8b

      SHA1

      fc70ded738268052a705b6bda5ffec0bf21b7be5

      SHA256

      670e29280fa629df8e34c238e42164898e798348b42c7faf2c683727e8f15cd3

      SHA512

      bf4bb4da0f876ef892a3416fe8be15e4ca34b17e8443bdf1922091b3437b533175104a6bcfe3a9024f6b69ee8b184a37335acaeca9672631d2aa47907e5cadb4

    • C:\Windows\SysWOW64\shell.exe

      Filesize

      91KB

      MD5

      befd9fb3b58beeef5562409b0e35769d

      SHA1

      5c3305a461f4b4d2ea504dc0773119c9a5b5f9a1

      SHA256

      3b1d970fcb22ca2438a23e2021cbaf9b8ba6733ab937d3f02be31d784646bdcf

      SHA512

      d3de8e04fa4caf5078ddf2a5d8f1c738ea499a43463322097e44c410a2a04bc0c692fccb4646c5f53d4e939cc20d5bdb7fde9fe8dce6f295b489ff380d539b20

    • C:\Windows\SysWOW64\shell.exe

      Filesize

      91KB

      MD5

      b2beb3c21ff090b8e9fdeb8dc3f49c20

      SHA1

      809ad2a6a081044241d3ec939e85dd711ec139cd

      SHA256

      8a6a7c4e3351c803e0e1842559c978333cf2780dd7e7379b94a61f0e351d7f65

      SHA512

      355bba46389fd82624a865b5c5ea76c957e100d1198cbcc9c29a7f9de51bf2bc0a39aa670a7e1674f4b01d47ed3a76f1a5abd83c3db78f79631ae55ad08269b7

    • C:\Windows\SysWOW64\shell.exe

      Filesize

      91KB

      MD5

      9e9cd2e0c02e09bcd885c66b49eebe10

      SHA1

      505aa1f30483d95d952569888a23ed846824c39c

      SHA256

      91766d9b6e874886bd73bf4ee0cb650cb8812eb4f4f256a4f9f5791a24c1c558

      SHA512

      94d62716eeed0ec7ef9bfb81035724800f7d031c4ac0d9d94444c0c4c24670c95469a3c546acfbe6ddfe9d538a98f8a821dcbede80c0d0f23dd4344e3f02189e

    • memory/564-479-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/880-453-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/900-386-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/1036-355-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/1044-357-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/1044-333-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/1408-454-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/1444-509-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/1444-313-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/1520-336-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/1524-350-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/1524-511-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/1788-512-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/1788-362-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/1856-429-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/2064-239-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/2064-506-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/2128-388-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/2256-238-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/2608-202-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/2752-331-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/2824-406-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/2840-330-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/2840-135-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/2840-510-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/2904-471-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/2944-474-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3056-505-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3056-310-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3124-205-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3204-425-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3288-360-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3300-337-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3312-494-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3404-430-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3440-353-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3440-351-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3576-411-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3588-270-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3588-312-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3616-314-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3752-457-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3896-332-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3920-507-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/3920-262-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4156-459-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4196-508-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4196-269-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4348-329-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4352-339-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4432-384-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4596-236-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4636-264-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4636-306-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4736-484-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4920-371-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4928-148-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/4928-0-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/5036-427-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB

    • memory/5084-501-0x0000000000400000-0x0000000000423000-memory.dmp

      Filesize

      140KB