Analysis Overview
SHA256
e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8
Threat Level: Known bad
The file e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8 was found to be: Known bad.
Malicious Activity Summary
Windows security bypass
UAC bypass
Modifies WinLogon for persistence
Modifies firewall policy service
Sality
Modifies visiblity of hidden/system files in Explorer
Modifies visibility of file extensions in Explorer
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
UPX dump on OEP (original entry point)
Sets file execution options in registry
Disables RegEdit via registry modification
Loads dropped DLL
Windows security modification
Drops startup file
Reads user/profile data of web browsers
Executes dropped EXE
Checks computer location settings
UPX packed file
ACProtect 1.3x - 1.4x DLL software
Deletes itself
Checks whether UAC is enabled
Adds Run key to start application
Enumerates connected drives
Drops file in System32 directory
Drops file in Windows directory
Drops file in Program Files directory
Unsigned PE
Enumerates physical storage devices
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
System policy modification
Modifies registry class
Suspicious behavior: EnumeratesProcesses
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-16 03:41
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-16 03:41
Reported
2024-06-16 03:44
Platform
win10v2004-20240508-en
Max time kernel
22s
Max time network
101s
Command Line
Signatures
Modifies WinLogon for persistence
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe , \"C:\\Windows\\M02405\\Ja523486bLay.com\"" | C:\Windows\M02405\EmangEloh.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\O20303Z\\TuxO20303Z.exe\"" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe , \"C:\\Windows\\M02405\\Ja523486bLay.com\"" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\O20303Z\\TuxO20303Z.exe\"" | C:\Windows\M02405\smss.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe , \"C:\\Windows\\M02405\\Ja523486bLay.com\"" | C:\Windows\M02405\smss.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\O20303Z\\TuxO20303Z.exe\"" | C:\Windows\M02405\EmangEloh.exe | N/A |
Modifies firewall policy service
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
Modifies visibility of file extensions in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" | C:\Windows\M02405\smss.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" | C:\Windows\M02405\EmangEloh.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
Modifies visiblity of hidden/system files in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Windows\M02405\smss.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Windows\M02405\EmangEloh.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
Sality
UAC bypass
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
Windows security bypass
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
UPX dump on OEP (original entry point)
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Disables RegEdit via registry modification
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" | C:\Windows\M02405\smss.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" | C:\Windows\M02405\EmangEloh.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
Sets file execution options in registry
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe | C:\Windows\M02405\EmangEloh.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\debugger = "C:\\Windows\\notepad.exe" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\debugger = "C:\\Windows\\notepad.exe" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\debugger = "C:\\Windows\\notepad.exe" | C:\Windows\M02405\smss.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe | C:\Windows\M02405\smss.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\debugger = "C:\\Windows\\notepad.exe" | C:\Windows\M02405\smss.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\debugger = "C:\\Windows\\notepad.exe" | C:\Windows\M02405\EmangEloh.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe | C:\Windows\M02405\smss.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe | C:\Windows\M02405\EmangEloh.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\debugger = "C:\\Windows\\notepad.exe" | C:\Windows\M02405\EmangEloh.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
ACProtect 1.3x - 1.4x DLL software
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\sql.cmd | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\sql.cmd | C:\Windows\M02405\smss.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\sql.cmd | C:\Windows\M02405\EmangEloh.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\sql.cmd | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\sql.cmd | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| N/A | N/A | C:\Windows\M02405\smss.exe | N/A |
| N/A | N/A | C:\Windows\M02405\EmangEloh.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
Reads user/profile data of web browsers
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Windows security modification
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\T1024844TT4 = "C:\\Windows\\system32\\773043211538l.exe" | C:\Windows\M02405\smss.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\T03Z730 = "C:\\Windows\\sa-421844.exe" | C:\Windows\M02405\smss.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\T1024844TT4 = "C:\\Windows\\system32\\773043211538l.exe" | C:\Windows\M02405\EmangEloh.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\T03Z730 = "C:\\Windows\\sa-421844.exe" | C:\Windows\M02405\EmangEloh.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\T1024844TT4 = "C:\\Windows\\system32\\773043211538l.exe" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\T03Z730 = "C:\\Windows\\sa-421844.exe" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
Enumerates connected drives
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File created | \??\c:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\Norman virus Control 5.18 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | C:\Windows\SysWOW64\773043211538l.exe | C:\Windows\M02405\EmangEloh.exe | N/A |
| File created | \??\c:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\Blink 182 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | \??\c:\Windows\SysWOW64\IME\SHARED\Love Song .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\msvbvm60.dll | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\X26001go\Z773043cie.cmd | C:\Windows\M02405\EmangEloh.exe | N/A |
| File created | C:\Windows\SysWOW64\773043211538l.exe | C:\Windows\M02405\smss.exe | N/A |
| File created | \??\c:\Windows\SysWOW64\IME\SHARED\Norman virus Control 5.18 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\X26001go\Z773043cie.cmd | C:\Windows\M02405\smss.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\773043211538l.exe | C:\Windows\M02405\EmangEloh.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\773043211538l.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
| File created | \??\c:\Windows\SysWOW64\IME\SHARED\Love Song .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | C:\Windows\SysWOW64\X26001go\Z773043cie.cmd | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\773043211538l.exe | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File created | \??\c:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\Lagu - Server .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\msvbvm60.dll | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File opened for modification | \??\c:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\RaHasIA .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | \??\c:\Windows\SysWOW64\IME\SHARED\Norman virus Control 5.18 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\773043211538l.exe | C:\Windows\M02405\smss.exe | N/A |
| File created | \??\c:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\RaHasIA .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\msvbvm60.dll | C:\Windows\M02405\smss.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\msvbvm60.dll | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
| File created | C:\Windows\SysWOW64\773043211538l.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\773043211538l.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\msvbvm60.dll | C:\Windows\M02405\EmangEloh.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\X26001go\Z773043cie.cmd | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
| File created | C:\Windows\SysWOW64\773043211538l.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
| File opened for modification | \??\c:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\Lagu - Server .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | \??\c:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\Blink 182 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | \??\c:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\Norman virus Control 5.18 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | C:\Windows\SysWOW64\773043211538l.exe | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\X26001go\Z773043cie.cmd | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File created | \??\c:\Program Files (x86)\Google\Update\Download\THe Best Ungu .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Love Song .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Program Files\Common Files\microsoft shared\Lagu - Server .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Program Files\dotnet\shared\Blink 182 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TutoriaL HAcking .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\Norman virus Control 5.18 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\Gallery .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\THe Best Ungu .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\Titip Folder Jangan DiHapus .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\TutoriaL HAcking .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Program Files\Windows Sidebar\Shared Gadgets\Blink 182 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\TutoriaL HAcking .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files\Microsoft Office\Updates\Download\Windows Vista setup .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\Norman virus Control 5.18 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Program Files\Microsoft Office\Updates\Download\Windows Vista setup .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files\Windows Sidebar\Shared Gadgets\Blink 182 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\Titip Folder Jangan DiHapus .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files\Common Files\microsoft shared\Lagu - Server .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files\dotnet\shared\Blink 182 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\Gallery .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\Gallery .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | C:\Program Files\Common Files\System\symsrv.dll | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File opened for modification | \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\Gallery .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Program Files (x86)\Common Files\Microsoft Shared\Titip Folder Jangan DiHapus .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files (x86)\Common Files\Microsoft Shared\Titip Folder Jangan DiHapus .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files (x86)\Google\Update\Download\THe Best Ungu .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\TutoriaL HAcking .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Program Files (x86)\Windows Sidebar\Shared Gadgets\Love Song .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\M02405\smss.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
| File created | \??\c:\Windows\InputMethod\SHARED\Blink 182 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | C:\Windows\M02405\Ja523486bLay.com | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\RaHasIA .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.1_none_24f622f1fc5a3f3c\Love Song .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | C:\Windows\M02405\EmangEloh.exe | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File opened for modification | C:\Windows\M02405\Ja523486bLay.com | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | C:\Windows\sa-421844.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\RaHasIA .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_en-us_64f5aaf4bb13ecef\RaHasIA .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.1151_none_025296d718a7b3a8\Blink 182 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | C:\Windows\M02405\EmangEloh.exe | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File opened for modification | \??\c:\Windows\SystemResources\Windows.ShellCommon.SharedResources\Gallery .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\RaHasIA .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\TutoriaL HAcking .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-u..tyvm-sysprep-shared_31bf3856ad364e35_10.0.19041.1_none_3ba048793ab5eb3f\Norman virus Control 5.18 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | C:\Windows\M02405\Ja523486bLay.com | C:\Windows\M02405\smss.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-s..mon-sharedresources_31bf3856ad364e35_10.0.19041.1_none_5417ea1f38dbb76b\Data DosenKu .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_6c6bd34f082a97f1\THe Best Ungu .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_a23e6a858fad9595\THe Best Ungu .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | C:\Windows\sa-421844.exe | C:\Windows\M02405\smss.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\Blink 182 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\Love Song .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\Gallery .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_2610450c30b37cc4\Norman virus Control 5.18 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | C:\Windows\sa-421844.exe | C:\Windows\M02405\smss.exe | N/A |
| File created | \??\c:\Windows\ServiceProfiles\NetworkService\Downloads\Blink 182 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\TutoriaL HAcking .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_5af076e0a3cb0fa7\Norman virus Control 5.18 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.1_none_813610a8a9b59e0a\Titip Folder Jangan DiHapus .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\wow64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_b6514808f7d87b1a\TutoriaL HAcking .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\THe Best Ungu .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\Data DosenKu .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_a06b29f6c4bab99e\RaHasIA .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\SoftwareDistribution\Download\SharedFileCache\Windows Vista setup .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\Love Song .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | C:\Windows\M02405\Ja523486bLay.com | C:\Windows\M02405\EmangEloh.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\TutoriaL HAcking .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.964_none_1c1a193f5bfcf136\Windows Vista setup .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_fd7349c396c417ae\THe Best Ungu .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondownloads_31bf3856ad364e35_10.0.19041.1_none_a914e3e3f19ceda1\Lagu - Server .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_netfx4-_dataoraclec.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_3b8d4dacc2ea6b71\THe Best Ungu .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\wow64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.746_none_b53f8b98f2b3a373\New mp3 BaraT !! .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | C:\Windows\sa-421844.exe | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_56c05939711f0938\Love Song .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | C:\Windows\Ti211538ta.exe | C:\Windows\M02405\EmangEloh.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\Gallery .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_d12f2a9a88909fc2\New mp3 BaraT !! .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | C:\Windows\M02405\Ja523486bLay.com | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
| File opened for modification | \??\c:\Windows\Downloaded Program Files\Love Song .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\SoftwareDistribution\Download\Blink 182 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\Lagu - Server .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\RaHasIA .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\Lagu - Server .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_netfx4-_dataperfcou.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_24ed4511dcc3019e\Data DosenKu .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File opened for modification | C:\Windows\Ti211538ta.exe | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File opened for modification | C:\Windows\M02405\Ja523486bLay.com | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File created | C:\Windows\M02405\EmangEloh.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\Data DosenKu .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\Windows Vista setup .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_it-it_f1a0741e853eda74\Blink 182 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | C:\Windows\Ti211538ta.exe | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File created | \??\c:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.746_none_0b33a1c93a22de1c\Lagu - Server .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| File created | \??\c:\Windows\WinSxS\wow64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.1_none_4a03fd12cb3f16c2\Norman virus Control 5.18 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "File Folder" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile | C:\Windows\M02405\smss.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "File Folder" | C:\Windows\M02405\smss.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile | C:\Windows\M02405\EmangEloh.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "File Folder" | C:\Windows\M02405\EmangEloh.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
| N/A | N/A | C:\Windows\M02405\smss.exe | N/A |
| N/A | N/A | C:\Windows\M02405\EmangEloh.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe | N/A |
Suspicious use of WriteProcessMemory
System policy modification
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe | N/A |
Processes
C:\Windows\system32\fontdrvhost.exe
"fontdrvhost.exe"
C:\Windows\system32\fontdrvhost.exe
"fontdrvhost.exe"
C:\Windows\system32\dwm.exe
"dwm.exe"
C:\Windows\system32\sihost.exe
sihost.exe
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
C:\Windows\system32\taskhostw.exe
taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
C:\Windows\System32\RuntimeBroker.exe
C:\Windows\System32\RuntimeBroker.exe -Embedding
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
C:\Windows\System32\RuntimeBroker.exe
C:\Windows\System32\RuntimeBroker.exe -Embedding
C:\Windows\System32\RuntimeBroker.exe
C:\Windows\System32\RuntimeBroker.exe -Embedding
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
C:\Windows\system32\backgroundTaskHost.exe
"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe
"C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe"
C:\Windows\SysWOW64\arp.exe
arp -a
C:\Windows\System32\Conhost.exe
\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\arp.exe
arp -s 10.127.0.1 e7-08-c9-1c-1f-87
C:\Windows\SysWOW64\arp.exe
arp -s 10.127.255.255 59-f5-e2-a6-d9-23
C:\Windows\SysWOW64\arp.exe
arp -s 136.243.76.173 ff-1e-cd-d7-7f-81
C:\Windows\SysWOW64\arp.exe
arp -s 224.0.0.22 e6-6a-7d-b9-26-91
C:\Windows\SysWOW64\arp.exe
arp -s 224.0.0.251 e1-30-84-53-2c-dc
C:\Windows\SysWOW64\arp.exe
arp -s 224.0.0.252 1d-83-d1-94-12-63
C:\Windows\SysWOW64\arp.exe
arp -s 239.255.255.250 89-3b-d5-6b-9b-6c
C:\Windows\SysWOW64\arp.exe
arp -s 255.255.255.255 c5-cf-12-75-6d-cd
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe
"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe"
C:\Windows\M02405\smss.exe
"C:\Windows\M02405\smss.exe"
C:\Windows\M02405\EmangEloh.exe
"C:\Windows\M02405\EmangEloh.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe
"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\winlogon.exe"
C:\Windows\System32\RuntimeBroker.exe
C:\Windows\System32\RuntimeBroker.exe -Embedding
Network
| Country | Destination | Domain | Proto |
| US | 52.111.229.48:443 | tcp |
Files
memory/3740-0-0x0000000000400000-0x0000000000430000-memory.dmp
C:\Program Files\Common Files\System\symsrv.dll
| MD5 | 4fcd7574537cebec8e75b4e646996643 |
| SHA1 | efa59bb9050fb656b90d5d40c942fb2a304f2a8b |
| SHA256 | 8ea3b17e4b783ffc0bc387b81b823bf87af0d57da74541d88ba85314bb232a5d |
| SHA512 | 7f1a7ef64d332a735db82506b47d84853af870785066d29ccaf4fdeab114079a9f0db400e01ba574776a0d652a248658fe1e8f9659cdced19ad6eea09644ea3e |
memory/3740-5-0x0000000010000000-0x0000000010033000-memory.dmp
memory/3740-7-0x00000000028E0000-0x000000000396E000-memory.dmp
memory/3740-13-0x00000000028E0000-0x000000000396E000-memory.dmp
memory/3740-11-0x00000000028E0000-0x000000000396E000-memory.dmp
memory/3740-10-0x00000000028E0000-0x000000000396E000-memory.dmp
memory/3740-9-0x00000000028E0000-0x000000000396E000-memory.dmp
memory/3740-14-0x00000000028E0000-0x000000000396E000-memory.dmp
memory/3740-12-0x00000000028E0000-0x000000000396E000-memory.dmp
memory/3740-16-0x00000000028E0000-0x000000000396E000-memory.dmp
memory/3740-67-0x0000000000400000-0x0000000000430000-memory.dmp
memory/3740-24-0x00000000028E0000-0x000000000396E000-memory.dmp
memory/3740-66-0x0000000000400000-0x0000000000430000-memory.dmp
memory/3740-59-0x0000000003D10000-0x0000000003D12000-memory.dmp
memory/3740-15-0x00000000028E0000-0x000000000396E000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O20303Z\service.exe
| MD5 | 33c124ea157d4b4d0908771222b64382 |
| SHA1 | 2118218f888c9ec1c84573ea08a3206adc3b0ca2 |
| SHA256 | 6622fb695321c3c4f92f4a92e1b4ab7bb1f58bdcca3b3385b883ad8ed7ae39f2 |
| SHA512 | 59aa85775c166a5fe080e2d9399bdd47a8a4d0f20a5ec714a9447f6be357a58dbc506fed55dd2e1d6c23358f2115e29b13b4e774a53ce73a31a9de4b2e219451 |
memory/3740-28-0x0000000000402000-0x0000000000405000-memory.dmp
memory/3740-27-0x0000000004C20000-0x0000000004C21000-memory.dmp
memory/3740-26-0x0000000003D10000-0x0000000003D12000-memory.dmp
memory/3304-81-0x0000000000400000-0x0000000000430000-memory.dmp
memory/4104-110-0x0000000000400000-0x0000000000430000-memory.dmp
memory/3740-106-0x00000000028E0000-0x000000000396E000-memory.dmp
C:\Windows\system\msvbvm60.dll
| MD5 | 25f62c02619174b35851b0e0455b3d94 |
| SHA1 | 4e8ee85157f1769f6e3f61c0acbe59072209da71 |
| SHA256 | 898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2 |
| SHA512 | f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a |
memory/3740-105-0x00000000028E0000-0x000000000396E000-memory.dmp
memory/4124-143-0x0000000000400000-0x0000000000430000-memory.dmp
C:\Windows\[TheMoonlight].txt
| MD5 | 68c7836c8ff19e87ca33a7959a2bdff5 |
| SHA1 | cc5d0205bb71c10bbed22fe47e59b1f6817daab7 |
| SHA256 | 883b19ec550f7ddb1e274a83d58d66c771ab10fefd136bab79483f2eb84e7fec |
| SHA512 | 3656005148788ed7ac8f5b5f8f6f4736c2dc4a94771291170e61666beb81e63be2a1a0f2913233b0e3f12ddfa7f1e89da9cd8323306413395ee78b2ece7fbfe8 |
memory/3740-160-0x0000000003D10000-0x0000000003D12000-memory.dmp
memory/3740-174-0x0000000010000000-0x0000000010033000-memory.dmp
memory/3740-177-0x00000000028E0000-0x000000000396E000-memory.dmp
memory/3740-173-0x0000000000400000-0x0000000000430000-memory.dmp
memory/4120-157-0x0000000000400000-0x0000000000430000-memory.dmp
memory/3740-25-0x0000000000570000-0x0000000000572000-memory.dmp
C:\Windows\SYSTEM.INI
| MD5 | 17543c552682708dbb26a37d32b9c838 |
| SHA1 | b4093a7f6a90c092596967ea5b378c8e4d9c4e18 |
| SHA256 | 34ab2124b1b5518af4bda4e99eeada62a58fb3aa9e2829fa7b6c0c2d5485c835 |
| SHA512 | 384bcb11a9a6d594d42ff6f146118d16f29097023fe80aa2318c7a09cd8d865636e70977e8ba1ec63ca9df6c103efd9aedcb88e31f9716f343fc308fe8564cb8 |
memory/3304-262-0x0000000002F90000-0x000000000401E000-memory.dmp
memory/4104-273-0x00000000033E0000-0x00000000033E1000-memory.dmp
memory/3304-271-0x0000000002B70000-0x0000000002B71000-memory.dmp
memory/3304-267-0x0000000002F90000-0x000000000401E000-memory.dmp
memory/3304-266-0x0000000002F90000-0x000000000401E000-memory.dmp
memory/4120-277-0x0000000002210000-0x0000000002211000-memory.dmp
memory/4120-281-0x00000000020A0000-0x00000000020A2000-memory.dmp
memory/4124-280-0x00000000020D0000-0x00000000020D2000-memory.dmp
memory/4104-279-0x0000000002DC0000-0x0000000002DC2000-memory.dmp
memory/3304-278-0x0000000002290000-0x0000000002292000-memory.dmp
memory/3304-268-0x0000000002F90000-0x000000000401E000-memory.dmp
memory/3304-269-0x0000000002F90000-0x000000000401E000-memory.dmp
memory/4124-275-0x00000000029F0000-0x00000000029F1000-memory.dmp
memory/3304-282-0x0000000002F90000-0x000000000401E000-memory.dmp
memory/3304-285-0x0000000002F90000-0x000000000401E000-memory.dmp
memory/3304-265-0x0000000002F90000-0x000000000401E000-memory.dmp
memory/3304-264-0x0000000002F90000-0x000000000401E000-memory.dmp
memory/3304-289-0x0000000002F90000-0x000000000401E000-memory.dmp
memory/3304-288-0x0000000002F90000-0x000000000401E000-memory.dmp
memory/3304-296-0x0000000000400000-0x0000000000430000-memory.dmp
memory/4124-298-0x0000000000400000-0x0000000000430000-memory.dmp
memory/4104-297-0x0000000000400000-0x0000000000430000-memory.dmp
memory/4120-299-0x0000000000400000-0x0000000000430000-memory.dmp
memory/3304-300-0x0000000002F90000-0x000000000401E000-memory.dmp
memory/3304-301-0x0000000002F90000-0x000000000401E000-memory.dmp
memory/3304-302-0x0000000002F90000-0x000000000401E000-memory.dmp
memory/3304-304-0x0000000002F90000-0x000000000401E000-memory.dmp
memory/3304-305-0x0000000002F90000-0x000000000401E000-memory.dmp
memory/3304-306-0x0000000002F90000-0x000000000401E000-memory.dmp
C:\cpupqe.pif
| MD5 | bdaf6e3e63aea6337f3a21dcb79df73c |
| SHA1 | 1cd60dce9d2a6ad66c4d67f305ac64f31d2f3f4b |
| SHA256 | 12c1adf1a85dff7b9b2298d9e93cf0effac286f7a266c2f1d7a68f4bcdbf952a |
| SHA512 | 1c01f8a8eacd29cf9c4e77976179a6407d970c63c0b09d332fb18c6baedff43fa4f0a4bde72304355032db8016f9c2f4068d5ea8e910e3acb8a8d5876e3abcb6 |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-16 03:41
Reported
2024-06-16 03:44
Platform
win7-20240611-en
Max time kernel
15s
Max time network
119s
Command Line
Signatures
Modifies WinLogon for persistence
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\O41524Z\\TuxO41524Z.exe\"" | C:\Windows\M13616\smss.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe , \"C:\\Windows\\M13616\\Ja280153bLay.com\"" | C:\Windows\M13616\smss.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\O41524Z\\TuxO41524Z.exe\"" | C:\Windows\M13616\EmangEloh.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe , \"C:\\Windows\\M13616\\Ja280153bLay.com\"" | C:\Windows\M13616\EmangEloh.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\O41524Z\\TuxO41524Z.exe\"" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe , \"C:\\Windows\\M13616\\Ja280153bLay.com\"" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
Modifies firewall policy service
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
Modifies visibility of file extensions in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" | C:\Windows\M13616\smss.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" | C:\Windows\M13616\EmangEloh.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
Modifies visiblity of hidden/system files in Explorer
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Windows\M13616\smss.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Windows\M13616\EmangEloh.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
Sality
UAC bypass
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
Windows security bypass
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
UPX dump on OEP (original entry point)
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Disables RegEdit via registry modification
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" | C:\Windows\M13616\smss.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" | C:\Windows\M13616\EmangEloh.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
Sets file execution options in registry
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe | C:\Windows\M13616\smss.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\debugger = "C:\\Windows\\notepad.exe" | C:\Windows\M13616\EmangEloh.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe | C:\Windows\M13616\EmangEloh.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\debugger = "C:\\Windows\\notepad.exe" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\debugger = "C:\\Windows\\notepad.exe" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\debugger = "C:\\Windows\\notepad.exe" | C:\Windows\M13616\smss.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe | C:\Windows\M13616\smss.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\debugger = "C:\\Windows\\notepad.exe" | C:\Windows\M13616\smss.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe | C:\Windows\M13616\EmangEloh.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\debugger = "C:\\Windows\\notepad.exe" | C:\Windows\M13616\EmangEloh.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
ACProtect 1.3x - 1.4x DLL software
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\sql.cmd | C:\Windows\M13616\smss.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\sql.cmd | C:\Windows\M13616\EmangEloh.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\sql.cmd | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\sql.cmd | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\sql.cmd | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| N/A | N/A | C:\Windows\M13616\smss.exe | N/A |
| N/A | N/A | C:\Windows\M13616\EmangEloh.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
Loads dropped DLL
Reads user/profile data of web browsers
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Windows security modification
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\T1136511TT4 = "C:\\Windows\\system32\\440610878205l.exe" | C:\Windows\M13616\EmangEloh.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\T24Z406 = "C:\\Windows\\sa-188511.exe" | C:\Windows\M13616\EmangEloh.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\T1136511TT4 = "C:\\Windows\\system32\\440610878205l.exe" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\T24Z406 = "C:\\Windows\\sa-188511.exe" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Run\T1136511TT4 = "C:\\Windows\\system32\\440610878205l.exe" | C:\Windows\M13616\smss.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\T24Z406 = "C:\\Windows\\sa-188511.exe" | C:\Windows\M13616\smss.exe | N/A |
Checks whether UAC is enabled
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
Enumerates connected drives
Drops file in System32 directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Windows\SysWOW64\440610878205l.exe | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\msvbvm60.dll | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\440610878205l.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\msvbvm60.dll | C:\Windows\M13616\smss.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\X84667go\Z440610cie.cmd | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\msvbvm60.dll | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File created | C:\Windows\SysWOW64\X84667go\Z440610cie.cmd | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\X84667go\Z440610cie.cmd | C:\Windows\M13616\smss.exe | N/A |
| File created | C:\Windows\SysWOW64\440610878205l.exe | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File created | C:\Windows\SysWOW64\440610878205l.exe | C:\Windows\M13616\smss.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\msvbvm60.dll | C:\Windows\M13616\EmangEloh.exe | N/A |
| File created | C:\Windows\SysWOW64\440610878205l.exe | C:\Windows\M13616\EmangEloh.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\msvbvm60.dll | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\440610878205l.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\X84667go\Z440610cie.cmd | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File created | C:\Windows\SysWOW64\440610878205l.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\440610878205l.exe | C:\Windows\M13616\smss.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\X84667go\Z440610cie.cmd | C:\Windows\M13616\EmangEloh.exe | N/A |
| File opened for modification | C:\Windows\SysWOW64\440610878205l.exe | C:\Windows\M13616\EmangEloh.exe | N/A |
| File created | C:\Windows\SysWOW64\440610878205l.exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | \??\c:\Program Files (x86)\Common Files\microsoft shared\Data DosenKu .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File created | \??\c:\Program Files (x86)\Google\Update\Download\Titip Folder Jangan DiHapus .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\Titip Folder Jangan DiHapus .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files\DVD Maker\Shared\Windows Vista setup .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File created | C:\Program Files\Common Files\System\symsrv.dll | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| File created | \??\c:\Program Files\Common Files\Microsoft Shared\Blink 182 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files\Common Files\Microsoft Shared\Blink 182 .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File created | \??\c:\Program Files\Windows Sidebar\Shared Gadgets\Lagu - Server .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files\Windows Sidebar\Shared Gadgets\Lagu - Server .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File created | \??\c:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\Titip Folder Jangan DiHapus .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File created | \??\c:\Program Files\DVD Maker\Shared\Windows Vista setup .scr | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File created | \??\c:\Program Files (x86)\Common Files\microsoft shared\Data DosenKu .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files (x86)\Google\Update\Download\Titip Folder Jangan DiHapus .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File created | \??\c:\Program Files (x86)\Windows Sidebar\Shared Gadgets\New mp3 BaraT !! .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| File opened for modification | \??\c:\Program Files (x86)\Windows Sidebar\Shared Gadgets\New mp3 BaraT !! .exe | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
Drops file in Windows directory
Enumerates physical storage devices
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile | C:\Windows\M13616\EmangEloh.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "File Folder" | C:\Windows\M13616\EmangEloh.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "File Folder" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile | C:\Windows\M13616\smss.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "File Folder" | C:\Windows\M13616\smss.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
Suspicious behavior: LoadsDriver
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\M13616\smss.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\M13616\EmangEloh.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe | N/A |
| N/A | N/A | C:\Windows\M13616\smss.exe | N/A |
| N/A | N/A | C:\Windows\M13616\EmangEloh.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
Suspicious use of WriteProcessMemory
System policy modification
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe | N/A |
| Set value (int) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe | N/A |
Processes
C:\Windows\system32\taskhost.exe
"taskhost.exe"
C:\Windows\system32\Dwm.exe
"C:\Windows\system32\Dwm.exe"
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Windows\system32\DllHost.exe
C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe
"C:\Users\Admin\AppData\Local\Temp\e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8.exe"
C:\Windows\SysWOW64\arp.exe
arp -a
C:\Windows\SysWOW64\arp.exe
arp -s 10.127.0.1 be-b2-7e-1d-57-8b
C:\Windows\SysWOW64\arp.exe
arp -s 10.127.255.255 de-c9-76-aa-59-92
C:\Windows\SysWOW64\arp.exe
arp -s 37.27.61.184 d9-24-0b-1c-ce-df
C:\Windows\SysWOW64\arp.exe
arp -s 224.0.0.22 db-03-d6-40-8e-ad
C:\Windows\SysWOW64\arp.exe
arp -s 224.0.0.251 28-8f-7b-f8-f0-a9
C:\Windows\SysWOW64\arp.exe
arp -s 224.0.0.252 15-b0-8f-1c-a7-d2
C:\Windows\SysWOW64\arp.exe
arp -s 239.255.255.250 6d-17-12-28-b8-fb
C:\Windows\SysWOW64\arp.exe
arp -s 255.255.255.255 03-37-a1-a5-d1-2e
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "-14732478342046142248744744302076204450-2074029076955283456-1868120462-1528491443"
C:\Windows\system32\conhost.exe
\??\C:\Windows\system32\conhost.exe "507591753-1761185055283889539-79021206-145429128517316022161442077844-1198980199"
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe
"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\service.exe"
C:\Windows\M13616\smss.exe
"C:\Windows\M13616\smss.exe"
C:\Windows\M13616\EmangEloh.exe
"C:\Windows\M13616\EmangEloh.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe
"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\O41524Z\winlogon.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 5isohu.com | udp |
| US | 8.8.8.8:53 | www.aieov.com | udp |
| US | 72.14.178.174:80 | www.aieov.com | tcp |
Files
\Program Files\Common Files\System\symsrv.dll
| MD5 | 4fcd7574537cebec8e75b4e646996643 |
| SHA1 | efa59bb9050fb656b90d5d40c942fb2a304f2a8b |
| SHA256 | 8ea3b17e4b783ffc0bc387b81b823bf87af0d57da74541d88ba85314bb232a5d |
| SHA512 | 7f1a7ef64d332a735db82506b47d84853af870785066d29ccaf4fdeab114079a9f0db400e01ba574776a0d652a248658fe1e8f9659cdced19ad6eea09644ea3e |
memory/2652-4-0x0000000010000000-0x0000000010033000-memory.dmp
memory/2652-3-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2652-6-0x00000000028F0000-0x000000000397E000-memory.dmp
memory/2652-9-0x00000000028F0000-0x000000000397E000-memory.dmp
memory/2652-10-0x00000000003F0000-0x00000000003F2000-memory.dmp
memory/2652-43-0x0000000000402000-0x0000000000405000-memory.dmp
memory/1248-14-0x0000000001F10000-0x0000000001F12000-memory.dmp
C:\Windows\M13616\EmangEloh.exe
| MD5 | ec953ec76ac11945eac9411f9a9e236f |
| SHA1 | f07b89285cb1b6e5eb30dcd91e0bb15148d56299 |
| SHA256 | e1b1283697a715c4503814487483090f5ec3462a3926340200ada9894a5145d8 |
| SHA512 | e4fe63e4290a4d7a5d12aabe606e02989b707a725e6e0db069fd23c6aa4144300cefd5a8290c80cc664e072f3cae59927a8087a2e9e3e904e8f568b542578a28 |
memory/2652-13-0x00000000028F0000-0x000000000397E000-memory.dmp
memory/2816-41-0x0000000000180000-0x0000000000182000-memory.dmp
memory/2652-45-0x00000000028F0000-0x000000000397E000-memory.dmp
memory/2652-42-0x00000000028F0000-0x000000000397E000-memory.dmp
memory/2816-34-0x0000000000190000-0x0000000000191000-memory.dmp
memory/2652-47-0x00000000028F0000-0x000000000397E000-memory.dmp
memory/2652-70-0x00000000028F0000-0x000000000397E000-memory.dmp
memory/2652-44-0x00000000028F0000-0x000000000397E000-memory.dmp
memory/2652-31-0x0000000002830000-0x0000000002832000-memory.dmp
memory/2652-27-0x00000000028A0000-0x00000000028A1000-memory.dmp
memory/2652-25-0x00000000028A0000-0x00000000028A1000-memory.dmp
memory/2652-24-0x0000000002830000-0x0000000002832000-memory.dmp
memory/2652-12-0x00000000028F0000-0x000000000397E000-memory.dmp
memory/2652-46-0x00000000028F0000-0x000000000397E000-memory.dmp
memory/2652-99-0x0000000005EC0000-0x0000000005EF0000-memory.dmp
memory/2652-87-0x0000000005EC0000-0x0000000005ED0000-memory.dmp
\Users\Admin\AppData\Local\Temp\A1D26E2\906ABCA5C.tmp
| MD5 | 33c124ea157d4b4d0908771222b64382 |
| SHA1 | 2118218f888c9ec1c84573ea08a3206adc3b0ca2 |
| SHA256 | 6622fb695321c3c4f92f4a92e1b4ab7bb1f58bdcca3b3385b883ad8ed7ae39f2 |
| SHA512 | 59aa85775c166a5fe080e2d9399bdd47a8a4d0f20a5ec714a9447f6be357a58dbc506fed55dd2e1d6c23358f2115e29b13b4e774a53ce73a31a9de4b2e219451 |
memory/2816-79-0x0000000000180000-0x0000000000182000-memory.dmp
memory/1948-125-0x0000000010000000-0x0000000010033000-memory.dmp
C:\Windows\system\msvbvm60.dll
| MD5 | 5343a19c618bc515ceb1695586c6c137 |
| SHA1 | 4dedae8cbde066f31c8e6b52c0baa3f8b1117742 |
| SHA256 | 2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce |
| SHA512 | 708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606 |
memory/2652-147-0x00000000028F0000-0x000000000397E000-memory.dmp
memory/596-156-0x0000000010000000-0x0000000010033000-memory.dmp
memory/596-155-0x0000000000400000-0x0000000000430000-memory.dmp
memory/2652-154-0x0000000006A50000-0x0000000006A80000-memory.dmp
memory/2652-153-0x0000000006A50000-0x0000000006A80000-memory.dmp
memory/2652-165-0x0000000002830000-0x0000000002832000-memory.dmp
memory/2652-148-0x00000000028F0000-0x000000000397E000-memory.dmp
memory/2652-190-0x0000000010000000-0x0000000010033000-memory.dmp
memory/2652-163-0x0000000010000000-0x0000000010033000-memory.dmp
memory/2652-189-0x0000000000400000-0x0000000000430000-memory.dmp
C:\Windows\[TheMoonlight].txt
| MD5 | 68c7836c8ff19e87ca33a7959a2bdff5 |
| SHA1 | cc5d0205bb71c10bbed22fe47e59b1f6817daab7 |
| SHA256 | 883b19ec550f7ddb1e274a83d58d66c771ab10fefd136bab79483f2eb84e7fec |
| SHA512 | 3656005148788ed7ac8f5b5f8f6f4736c2dc4a94771291170e61666beb81e63be2a1a0f2913233b0e3f12ddfa7f1e89da9cd8323306413395ee78b2ece7fbfe8 |
memory/2652-191-0x00000000028F0000-0x000000000397E000-memory.dmp
C:\Windows\SYSTEM.INI
| MD5 | d513148ed9eaacae662e6cccf3e7d5e2 |
| SHA1 | 19dfca46fdcd4f47c2ba4f8149815570e0784b7c |
| SHA256 | 5807c86cdf21d5c95684301f41540834509b277323016e2105909eb32ed1dcdc |
| SHA512 | d666d63bdaa8001fe4b4b968540ba28f08d6f9f0f59100550a5afc6facee69ba1b0c48b7cca2af654c48b247f9b11071e3a3e42d049825773156eb009f24752b |
memory/1120-192-0x0000000002960000-0x00000000039EE000-memory.dmp
memory/1120-194-0x0000000002960000-0x00000000039EE000-memory.dmp
memory/1120-195-0x0000000002960000-0x00000000039EE000-memory.dmp
memory/2380-364-0x0000000010000000-0x0000000010033000-memory.dmp
memory/1948-394-0x0000000010000000-0x0000000010033000-memory.dmp
memory/596-434-0x0000000010000000-0x0000000010033000-memory.dmp
memory/1120-491-0x0000000010000000-0x0000000010033000-memory.dmp