Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 04:21

General

  • Target

    cb8375f07cd275040eeb2987f477f973e32310fbe96001e250581bc82e37af6e.exe

  • Size

    91KB

  • MD5

    65c451983d571e652f41a07f80045799

  • SHA1

    4d83f8e91ac8e730819afe89606112ca3f7daa2d

  • SHA256

    cb8375f07cd275040eeb2987f477f973e32310fbe96001e250581bc82e37af6e

  • SHA512

    336b11f744f6860070a64f4d8d5d784327ec5dc8a1a9350a441deb0d76517b07cb753d9090da32221a49456fbc0058827621035a2da59916705121fabb74ac07

  • SSDEEP

    1536:9a8jroAbRB+XWCQLZeIdSwkqa8jroAbRB+XWCQLZeIdSwkS4:LFRBLJSkFRBLJSB

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • ASPack v2.12-2.42 14 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 38 IoCs
  • Drops file in Windows directory 24 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 31 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb8375f07cd275040eeb2987f477f973e32310fbe96001e250581bc82e37af6e.exe
    "C:\Users\Admin\AppData\Local\Temp\cb8375f07cd275040eeb2987f477f973e32310fbe96001e250581bc82e37af6e.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3404
    • C:\Windows\babon.exe
      C:\Windows\babon.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4468
      • C:\Windows\babon.exe
        C:\Windows\babon.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4324
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1860
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:392
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1352
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:872
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3316
      • C:\Windows\babon.exe
        C:\Windows\babon.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2236
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1708
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2432
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4568
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1664
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3924
      • C:\Windows\babon.exe
        C:\Windows\babon.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1528
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:208
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4048
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2988
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2400
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1168
      • C:\Windows\babon.exe
        C:\Windows\babon.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3640
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4032
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4824
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3700
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:548
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3408
      • C:\Windows\babon.exe
        C:\Windows\babon.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5016
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:552
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2008
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\csrss.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1908
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\csrss.exe

    Filesize

    91KB

    MD5

    2012b4173b28400bbc5af8acfcd9ff28

    SHA1

    e2b3970bbba7338e974380245c2a27e305e0c708

    SHA256

    21ee0e18b0d6a77af91fb35cc21dce5c756c81dd69fe7072eb092be77fc9ad0b

    SHA512

    960e1077aa1e25ff30e1ea51519ccc42f5ecd250fbfdd6a455c167e98366323d8e3fa4146af06bd670440884c5733104de3b5de77790e6d97159a0bef0222143

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    91KB

    MD5

    c5f242a318cc08b34a1414a374274f47

    SHA1

    f90c79feaf23509becefb2e7f5e8456501c3778a

    SHA256

    7d76b4fdd5e0af12c97e9a55126f2664f1b13f0180c73e3b15cc98bd573a99bd

    SHA512

    3839c72f79e4f68bd062b2ac607042d6648ba5af985b2614b95e7961987390fe30d8c234f58874537ca5adb49a0d9513d58df2e7ec466216dc04313ced030aee

  • C:\Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    91KB

    MD5

    ce7f75f105de44e22c7b017d3a301e78

    SHA1

    7bee636c9b99f07febb0ddfe22db4436fae37b60

    SHA256

    5fb7ba4a65401828f90ab8c0ef593d4b5f3234231843211f40208fc410d0d42f

    SHA512

    2d85413909855c2d15de4591c76e3df84fa3f460ccb960824433a7afec089afff021af9bba505c491121e8c0c1910a417dc9a2172e75ca5758eae100dcd0ac3f

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    65c451983d571e652f41a07f80045799

    SHA1

    4d83f8e91ac8e730819afe89606112ca3f7daa2d

    SHA256

    cb8375f07cd275040eeb2987f477f973e32310fbe96001e250581bc82e37af6e

    SHA512

    336b11f744f6860070a64f4d8d5d784327ec5dc8a1a9350a441deb0d76517b07cb753d9090da32221a49456fbc0058827621035a2da59916705121fabb74ac07

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\smss.exe

    Filesize

    91KB

    MD5

    6e8ac732a37cc8dde79c5c72af980771

    SHA1

    0ecd1bb3509ad1d1a27a58f51338bd990ab75587

    SHA256

    6d5fd630fb26bba05c47ba720764473ba283d5717378d4907e95aa07fcb13f10

    SHA512

    1d847447d542c14a8f6228c4ed4cb15b815066a57e9c0734b3ed7798b7b9be36aab22ab65b754621fec3e20b310c4ef6fa58695c5cfbb7b17901afd6132c4b29

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\smss.exe

    Filesize

    91KB

    MD5

    aafc3f24296f1e17c8365eb299ffe44e

    SHA1

    59f0283e1858ab743afe450e9a8c26e60f677bb6

    SHA256

    312bfc8c3ba1f7227d9e6d1d33dbee0c356d4eb3ce06895e4cccb8a72f153993

    SHA512

    2e2b3162cc04f176761411ca24542a7ad24a89c34921bca39a4499bb604998693a678d9d8e7057a9d7d94b245b2d82f5133ff0792de77448cbe2177511bcd123

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\smss.exe

    Filesize

    91KB

    MD5

    fc7ef1e0c0468273db4bb9f25ad48265

    SHA1

    79e601bf88ebb2031f193cffeab15337ccda58cb

    SHA256

    7f64969f8d18c7b30aeedc29bda2dd7d53c3e32cfa9da783f7f996f63779ccd3

    SHA512

    9532bb640942928a3735f76a5dc7fe165a59534bc7b58cfb8b82e843e2e67e00e9feea1dcef690aa58f34678d82d088f2e7bbfd020a1217c7c2404197002b84e

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\smss.exe

    Filesize

    91KB

    MD5

    80d81efa87b1968de736fb29b4aff322

    SHA1

    e95e9494c4e8119b82aa54965e6a273b5e5782e9

    SHA256

    f2a36385109be75b81d5154c2cb6126b823a5546a66432289beb46bb02605e85

    SHA512

    6a5419a251cfca183de4cd58f1f1c0e75d175c898a80c19c58c7fd96d0a5cd25902c4a8e1ede6e6c19d5810303c509bd7647dd947b0414bd00b7f6ae244da33d

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    64KB

    MD5

    5a15e3aa444598893506158f94155cf5

    SHA1

    cba7649b499811c9a33d4ae16013542caa6827c1

    SHA256

    8c20a3a0c4e44dc8e5b3a233ec0ea9596fd0f7df39223669fa9c668188bcc01d

    SHA512

    c747fe64a00d45b0f3233dacb3851adb9498800389cebb2e5219943bf8772d316dcc99ad621e22afcb8a3587102c641109214cdcbf01dc5cf22bc8f2a34f8267

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    91KB

    MD5

    6db58c31380755b1042c31908775c0cf

    SHA1

    5f0c970e9a11a60e048124fc555bc838e03a2647

    SHA256

    5715fd7cd3d1e6093de11ee21760c9511549cfe3610eb516e7cb8e34c31895c6

    SHA512

    7153264c67c90c98b874f254e42e044b5483535bb6115c053f11df4ac7d15843d3accf4dbcf3a3ae0e7930f40a4dd287d9acd222c4cc119d40584ff6ddd7a7d5

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    05832f7666ca84084c11c1e451d01f4d

    SHA1

    d61cdee27b71c2dbdb07ba7a4d0aa49218be5104

    SHA256

    0d0d832f5af09f89485098ee12c0215d2c71f8577b1bef6d1790d00a6ae95da2

    SHA512

    760bb420c20e12e9d364d320eff4a7c5615a8c36eecb37e836d2c7806d22916702c81c0a14afa0e49b5d3f5675db635cefc9e5d9fabc33a24f24fcd9acb0b834

  • C:\Windows\SysWOW64\babon.scr

    Filesize

    91KB

    MD5

    f11a8b7ca0b7829b44083ed431d538e8

    SHA1

    bf3a5859f92f2844a7f13f628021bbc01f501011

    SHA256

    e48cc5fc1e6d00f3a60d4c3916124b5ad056f1c92da0fc24fbcaa19d957d45a2

    SHA512

    0761257144779cbd763aadc81881fc3ce6d045bf63105829964e5eb54b00d2736515b393896868a8dc6d5cf464bb44f72b2c04218943ff1d7c3a65a320dd535e

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    91KB

    MD5

    ac907ed469382baa1a717ff4c39fbb9f

    SHA1

    103442627a79630b1ded24cabffe504760a717b1

    SHA256

    2fc89d06009b26575af5c64f6af1acd16b9d751dcec688ed7b4f6b436eaab9ae

    SHA512

    4654ddbde99278e9c936c46d1721e76df546e593b5d74d7f55e12309cbf27907007663637f3585dbe946356bcd15cca439af90526d6175d3c2c96bad0784cc7a

  • C:\Windows\babon.exe

    Filesize

    91KB

    MD5

    81b65a7b444cd2f13e366a4c98ca2b83

    SHA1

    55731bad2325ccacbf9b0545d38449be9134536e

    SHA256

    d7f2c53075a9b70c144fe20b97270e0d4b73ab4c3b646a869a41aad8bd945762

    SHA512

    4dc0664d5d47ca438a3dd06dbf4d30ac4572e6a5140b811f569b2f942ae021b4f25343c7edf5913172a16e0bb91d964b59187136cbd8bf296b04979195e21da0

  • C:\Windows\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\wangsit.txt

    Filesize

    416B

    MD5

    8c460e27a1949370d14f20942ef964c3

    SHA1

    fb1f75839903c83911b45b49956792d27db56185

    SHA256

    2c001b5c9684baf861870ffbaf0bec9df22560cdf3cd5a719a78a882e3122f8d

    SHA512

    ad4299385bd91f7157f4d4b01025664333423f15f796a9a70e3f5df251842cdef3ad8f1158dc3c8b51c8ea4d082d62d56a6b57fade7b563fb953f8b511a17bcd

  • F:\autorun.inf

    Filesize

    41B

    MD5

    097661e74e667ec2329bc274acb87b0d

    SHA1

    91c68a6089af2f61035e2e5f2a8da8c908dc93ed

    SHA256

    aab4cf640f2520966a0aac31af8d1b819eea28736c6b103db16b07c3188ec6c0

    SHA512

    e90e678526270cd9388538246793534411c478b082ab914bfe2756b18771229f146c731c0f9c94ed59d8689b2ef77d25f7b22d3d6b8c2d439e5b3437f8dc649e

  • memory/208-320-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/208-341-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/392-193-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/392-195-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/548-383-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/552-342-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/872-218-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/872-238-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1168-390-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1168-121-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1352-197-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1352-203-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1528-316-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1528-322-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1664-374-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1708-326-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/1860-189-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2008-357-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2008-347-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2236-256-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2400-386-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2432-344-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/2432-335-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3316-107-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3316-388-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3404-132-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3404-0-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3408-127-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3408-391-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3640-327-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3924-115-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/3924-389-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4032-338-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4032-324-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4048-353-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4324-167-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4452-384-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4468-101-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4468-387-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4568-361-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/4824-355-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/5016-319-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB

  • memory/5016-308-0x0000000000400000-0x0000000000423000-memory.dmp

    Filesize

    140KB