Analysis
-
max time kernel
141s -
max time network
190s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26-07-2021 13:00
Static task
static1
Behavioral task
behavioral1
Sample
e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe
Resource
win10v20210410
General
-
Target
e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe
-
Size
348KB
-
MD5
d0d3086cd72eb31385bf6406042cc404
-
SHA1
11f9bb5c17fe32b48d44575a29e94dd082d38483
-
SHA256
e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37
-
SHA512
153dce24258abfc3440208b100c26a847c2396fe7893844ba8d8e66659e4cd567d2ab8ac9d9d19e7cdc80b6dc89080b1966bf5f2d82ef76bfc814902beae071e
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2513283230-931923277-594887482-1000\how_recover+ndo.txt
http://vr6g2curb2kcidou.encpayment23.com/1B6F7FE222C32030
http://vr6g2curb2kcidou.expay34.com/1B6F7FE222C32030
http://psbc532jm8c.hsh73cu37n1.net/1B6F7FE222C32030
https://vr6g2curb2kcidou.onion.to/1B6F7FE222C32030
http://vr6g2curb2kcidou.onion/1B6F7FE222C32030
Extracted
C:\Users\Admin\Desktop\Howto_RESTORE_FILES.html
http://vr6g2curb2kcidou.onion/1B6F7FE222C32030
http://vr6g2curb2kcidou.encpayment23.com/1B6F7FE222C32030
http://vr6g2curb2kcidou.expay34.com/1B6F7FE222C32030
http://psbc532jm8c.hsh73cu37n1.net/1B6F7FE222C32030
https://vr6g2curb2kcidou.onion.to/1B6F7FE222C32030
Signatures
-
suricata: ET MALWARE AlphaCrypt CnC Beacon 5
-
suricata: ET MALWARE AlphaCrypt CnC Beacon 6
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 5 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 552 bcdedit.exe 1076 bcdedit.exe 1956 bcdedit.exe 1856 bcdedit.exe 864 bcdedit.exe -
Executes dropped EXE 2 IoCs
Processes:
daixqacroic.exedaixqacroic.exepid process 268 daixqacroic.exe 1840 daixqacroic.exe -
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
daixqacroic.exedescription ioc process File renamed C:\Users\Admin\Pictures\InitializeExport.raw => C:\Users\Admin\Pictures\InitializeExport.raw.vvv daixqacroic.exe File renamed C:\Users\Admin\Pictures\ProtectNew.crw => C:\Users\Admin\Pictures\ProtectNew.crw.vvv daixqacroic.exe File renamed C:\Users\Admin\Pictures\StepCompare.png => C:\Users\Admin\Pictures\StepCompare.png.vvv daixqacroic.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1156 cmd.exe -
Drops startup file 2 IoCs
Processes:
daixqacroic.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\how_recover+ndo.txt daixqacroic.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\how_recover+ndo.html daixqacroic.exe -
Loads dropped DLL 2 IoCs
Processes:
e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exepid process 1532 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe 1532 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
daixqacroic.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run daixqacroic.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\Acrndtd = "C:\\Users\\Admin\\AppData\\Roaming\\daixqacroic.exe" daixqacroic.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 myexternalip.com 7 myexternalip.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exedaixqacroic.exedescription pid process target process PID 1856 set thread context of 1532 1856 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe PID 268 set thread context of 1840 268 daixqacroic.exe daixqacroic.exe -
Drops file in Program Files directory 64 IoCs
Processes:
daixqacroic.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt daixqacroic.exe File opened for modification C:\Program Files\Common Files\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_100_eeeeee_1x100.png daixqacroic.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\images\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\flower_m.png daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_right_mousedown.png daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\hint_over.png daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waxing-gibbous_partly-cloudy.png daixqacroic.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pl\how_recover+ndo.txt daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\css\how_recover+ndo.txt daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_blue_sun.png daixqacroic.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\management\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\META-INF\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\cronometer.png daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waning-crescent.png daixqacroic.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\how_recover+ndo.txt daixqacroic.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\how_recover+ndo.txt daixqacroic.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationRight_ButtonGraphic.png daixqacroic.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\how_recover+ndo.txt daixqacroic.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\how_recover+ndo.txt daixqacroic.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\en-US\how_recover+ndo.txt daixqacroic.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\how_recover+ndo.txt daixqacroic.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\et.pak daixqacroic.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_SelectionSubpictureA.png daixqacroic.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\sports_disc_mask.png daixqacroic.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\passport.png daixqacroic.exe File opened for modification C:\Program Files\Windows Media Player\Visualizations\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_classic_win7.css daixqacroic.exe File opened for modification C:\Program Files\Java\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\how_recover+ndo.txt daixqacroic.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_splitter\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\1.png daixqacroic.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_VideoInset.png daixqacroic.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-back-over-select.png daixqacroic.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\DMR_120.png daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\bg-dock.png daixqacroic.exe File opened for modification C:\Program Files\Mozilla Firefox\how_recover+ndo.txt daixqacroic.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ky\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_single_bkg_orange.png daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-waxing-crescent.png daixqacroic.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\LC_MESSAGES\how_recover+ndo.txt daixqacroic.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\how_recover+ndo.txt daixqacroic.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\icon.png daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_box_divider_right.png daixqacroic.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\how_recover+ndo.txt daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\trad_h.png daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\32.png daixqacroic.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationUp_ButtonGraphic.png daixqacroic.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ms.pak daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\system_m.png daixqacroic.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\how_recover+ndo.txt daixqacroic.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\how_recover+ndo.txt daixqacroic.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\how_recover+ndo.html daixqacroic.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\images\rss_headline_glow_docked.png daixqacroic.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt daixqacroic.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 336 vssadmin.exe 1196 vssadmin.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3C4F8101-EE19-11EB-8DF3-6AD422E6A34B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507098112682d701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "334072747" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005a5f1b9bf2eeef4a8cdc3b1f7106367900000000020000000000106600000001000020000000c35eaf20dbaf983b862974ea5618683597718576560df80bb8dfe03271796b00000000000e800000000200002000000005c366ff3ce45d7371c7645182eaf46c55a0db5e931dd27eafaf3425737cf1ac20000000f2e3894d2a19f92be18db6d8ba2bee529a8b4215df3a6e173213ee1fae40374d40000000b60f562c164ce081afb9726e8b540b3c38c7c02ab967a44ded6bdd76fef39f11cecd6b0e85e84b877ee723a95e041b1d5dcbd2c3372a436fc6d8f2b944a410e9 iexplore.exe -
Processes:
daixqacroic.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 daixqacroic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C daixqacroic.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 daixqacroic.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 daixqacroic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 daixqacroic.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 212 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
daixqacroic.exepid process 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe 1840 daixqacroic.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exedaixqacroic.exevssvc.exedescription pid process Token: SeDebugPrivilege 1532 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe Token: SeDebugPrivilege 1840 daixqacroic.exe Token: SeBackupPrivilege 1092 vssvc.exe Token: SeRestorePrivilege 1092 vssvc.exe Token: SeAuditPrivilege 1092 vssvc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exeDllHost.exepid process 744 iexplore.exe 1640 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 744 iexplore.exe 744 iexplore.exe 1228 IEXPLORE.EXE 1228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exee272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exedaixqacroic.exedaixqacroic.exeiexplore.exedescription pid process target process PID 1856 wrote to memory of 1532 1856 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe PID 1856 wrote to memory of 1532 1856 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe PID 1856 wrote to memory of 1532 1856 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe PID 1856 wrote to memory of 1532 1856 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe PID 1856 wrote to memory of 1532 1856 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe PID 1856 wrote to memory of 1532 1856 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe PID 1856 wrote to memory of 1532 1856 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe PID 1856 wrote to memory of 1532 1856 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe PID 1856 wrote to memory of 1532 1856 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe PID 1856 wrote to memory of 1532 1856 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe PID 1856 wrote to memory of 1532 1856 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe PID 1532 wrote to memory of 268 1532 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe daixqacroic.exe PID 1532 wrote to memory of 268 1532 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe daixqacroic.exe PID 1532 wrote to memory of 268 1532 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe daixqacroic.exe PID 1532 wrote to memory of 268 1532 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe daixqacroic.exe PID 1532 wrote to memory of 1156 1532 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe cmd.exe PID 1532 wrote to memory of 1156 1532 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe cmd.exe PID 1532 wrote to memory of 1156 1532 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe cmd.exe PID 1532 wrote to memory of 1156 1532 e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe cmd.exe PID 268 wrote to memory of 1840 268 daixqacroic.exe daixqacroic.exe PID 268 wrote to memory of 1840 268 daixqacroic.exe daixqacroic.exe PID 268 wrote to memory of 1840 268 daixqacroic.exe daixqacroic.exe PID 268 wrote to memory of 1840 268 daixqacroic.exe daixqacroic.exe PID 268 wrote to memory of 1840 268 daixqacroic.exe daixqacroic.exe PID 268 wrote to memory of 1840 268 daixqacroic.exe daixqacroic.exe PID 268 wrote to memory of 1840 268 daixqacroic.exe daixqacroic.exe PID 268 wrote to memory of 1840 268 daixqacroic.exe daixqacroic.exe PID 268 wrote to memory of 1840 268 daixqacroic.exe daixqacroic.exe PID 268 wrote to memory of 1840 268 daixqacroic.exe daixqacroic.exe PID 268 wrote to memory of 1840 268 daixqacroic.exe daixqacroic.exe PID 1840 wrote to memory of 552 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 552 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 552 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 552 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 336 1840 daixqacroic.exe vssadmin.exe PID 1840 wrote to memory of 336 1840 daixqacroic.exe vssadmin.exe PID 1840 wrote to memory of 336 1840 daixqacroic.exe vssadmin.exe PID 1840 wrote to memory of 336 1840 daixqacroic.exe vssadmin.exe PID 1840 wrote to memory of 1076 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 1076 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 1076 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 1076 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 1956 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 1956 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 1956 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 1956 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 1856 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 1856 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 1856 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 1856 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 864 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 864 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 864 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 864 1840 daixqacroic.exe bcdedit.exe PID 1840 wrote to memory of 212 1840 daixqacroic.exe NOTEPAD.EXE PID 1840 wrote to memory of 212 1840 daixqacroic.exe NOTEPAD.EXE PID 1840 wrote to memory of 212 1840 daixqacroic.exe NOTEPAD.EXE PID 1840 wrote to memory of 212 1840 daixqacroic.exe NOTEPAD.EXE PID 1840 wrote to memory of 744 1840 daixqacroic.exe iexplore.exe PID 1840 wrote to memory of 744 1840 daixqacroic.exe iexplore.exe PID 1840 wrote to memory of 744 1840 daixqacroic.exe iexplore.exe PID 1840 wrote to memory of 744 1840 daixqacroic.exe iexplore.exe PID 744 wrote to memory of 1228 744 iexplore.exe IEXPLORE.EXE PID 744 wrote to memory of 1228 744 iexplore.exe IEXPLORE.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
daixqacroic.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" daixqacroic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System daixqacroic.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe"C:\Users\Admin\AppData\Local\Temp\e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe"C:\Users\Admin\AppData\Local\Temp\e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37.sample.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\daixqacroic.exeC:\Users\Admin\AppData\Roaming\daixqacroic.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\daixqacroic.exeC:\Users\Admin\AppData\Roaming\daixqacroic.exe4⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} bootems off5⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet5⤵
- Interacts with shadow copies
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} advancedoptions off5⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} optionsedit off5⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} bootstatuspolicy IgnoreAllFailures5⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {current} recoveryenabled off5⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Howto_RESTORE_FILES.txt5⤵
- Opens file in notepad (likely ransom note)
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\Howto_RESTORE_FILES.html5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:744 CREDAT:275457 /prefetch:26⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet5⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Roaming\DAIXQA~1.EXE5⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\E272F3~1.EXE3⤵
- Deletes itself
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
2902de11e30dcc620b184e3bb0f0c1cb
SHA15d11d14a2558801a2688dc2d6dfad39ac294f222
SHA256e6a7f1f8810e46a736e80ee5ac6187690f28f4d5d35d130d410e20084b2c1544
SHA512efd415cde25b827ac2a7ca4d6486ce3a43cdcc1c31d3a94fd7944681aa3e83a4966625bf2e6770581c4b59d05e35ff9318d9adaddade9070f131076892af2fa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357MD5
a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
d30330823d44aab84b5be0230da445f7
SHA1c37dae721f260a30cca6d1c1c1b8b7818283bc62
SHA2563c749684734a2243786c0963b4ed815e828d67cfdbe0285744a5b39ddc15a553
SHA512801ba071cf5a59ed76af2d7250db9f9ba4ef4de6a40bfa8885efd2e7d0801f2f16970b2529a78372dc0082f008e1d396d370c947fd82dca93393534c5d8498a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357MD5
9ac36b50cf31c43c90275c13ec71dfe7
SHA155399deb7a7a9991b1ab7f016c01447b8226739b
SHA25663237685a49ced73f6d1008db1f801317d9756b9568e7df8022a652166919357
SHA5127de1a30cf4fdce8b7e6b422833831f3804dd23cd4e15acf17ab08b803fbed72821a067346e25e02f24269618ea42fa32cb4ca6848fb57aa6712a1c2d0f09c546
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\how_recover+ndo.htmlMD5
9a2dce2db3da74baccffca3c963a0e3f
SHA1a12c03535ecfb8b0857cb000711f789b238b61f6
SHA2565a555c2413b4c2b9304f22e3569d089caf04ab58e6268439f48a88ff865662c1
SHA512b6371e8a5ad95b88aa2ba4360d248c7250199959f203748833b46b6ea39d8f5c2bc9fb7fa3fbe3c31eb970ca8b079b0759d6886b5c191ad9b1b6d4ca49416812
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\how_recover+ndo.txtMD5
0e9ec414f0f038bc74a2cc0e524ce151
SHA166992fdf0229e7d6dc879c252c829c4bae6f59d5
SHA2567d47e0da4de3ba8b0c2177e9d2935149fb56afbc5b7525633f89530ce4486b68
SHA512d5587fed0bf908eb88f73b3e00b2d58d153e19cad25e8043e98cb2f016f7bc90e28597fc9a3fac338cfe580e36a3653800ae6366b8483c90ab75a67825e34fd9
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\how_recover+ndo.htmlMD5
9a2dce2db3da74baccffca3c963a0e3f
SHA1a12c03535ecfb8b0857cb000711f789b238b61f6
SHA2565a555c2413b4c2b9304f22e3569d089caf04ab58e6268439f48a88ff865662c1
SHA512b6371e8a5ad95b88aa2ba4360d248c7250199959f203748833b46b6ea39d8f5c2bc9fb7fa3fbe3c31eb970ca8b079b0759d6886b5c191ad9b1b6d4ca49416812
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CTLs\how_recover+ndo.txtMD5
0e9ec414f0f038bc74a2cc0e524ce151
SHA166992fdf0229e7d6dc879c252c829c4bae6f59d5
SHA2567d47e0da4de3ba8b0c2177e9d2935149fb56afbc5b7525633f89530ce4486b68
SHA512d5587fed0bf908eb88f73b3e00b2d58d153e19cad25e8043e98cb2f016f7bc90e28597fc9a3fac338cfe580e36a3653800ae6366b8483c90ab75a67825e34fd9
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\how_recover+ndo.htmlMD5
9a2dce2db3da74baccffca3c963a0e3f
SHA1a12c03535ecfb8b0857cb000711f789b238b61f6
SHA2565a555c2413b4c2b9304f22e3569d089caf04ab58e6268439f48a88ff865662c1
SHA512b6371e8a5ad95b88aa2ba4360d248c7250199959f203748833b46b6ea39d8f5c2bc9fb7fa3fbe3c31eb970ca8b079b0759d6886b5c191ad9b1b6d4ca49416812
-
C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\how_recover+ndo.txtMD5
0e9ec414f0f038bc74a2cc0e524ce151
SHA166992fdf0229e7d6dc879c252c829c4bae6f59d5
SHA2567d47e0da4de3ba8b0c2177e9d2935149fb56afbc5b7525633f89530ce4486b68
SHA512d5587fed0bf908eb88f73b3e00b2d58d153e19cad25e8043e98cb2f016f7bc90e28597fc9a3fac338cfe580e36a3653800ae6366b8483c90ab75a67825e34fd9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\F1PJG6WB.txtMD5
2480235b2e897c0478817789ae86540b
SHA1a39b748db846cdf9349171a1a8a7de4f47b5e419
SHA2567fcbd7b2935089400cb7526ae35b8118b5e263371de1fa13256546dd972201e7
SHA51296e817db44eed9a137cff0a1ba99ab013e3f20d967ec1b580b689abafb879efd402e431a141de9fe7f227b4894fb3b77ab7eb1a95e4bf18ee1cfea4de8b45c96
-
C:\Users\Admin\AppData\Roaming\daixqacroic.exeMD5
d0d3086cd72eb31385bf6406042cc404
SHA111f9bb5c17fe32b48d44575a29e94dd082d38483
SHA256e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37
SHA512153dce24258abfc3440208b100c26a847c2396fe7893844ba8d8e66659e4cd567d2ab8ac9d9d19e7cdc80b6dc89080b1966bf5f2d82ef76bfc814902beae071e
-
C:\Users\Admin\AppData\Roaming\daixqacroic.exeMD5
d0d3086cd72eb31385bf6406042cc404
SHA111f9bb5c17fe32b48d44575a29e94dd082d38483
SHA256e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37
SHA512153dce24258abfc3440208b100c26a847c2396fe7893844ba8d8e66659e4cd567d2ab8ac9d9d19e7cdc80b6dc89080b1966bf5f2d82ef76bfc814902beae071e
-
C:\Users\Admin\AppData\Roaming\daixqacroic.exeMD5
d0d3086cd72eb31385bf6406042cc404
SHA111f9bb5c17fe32b48d44575a29e94dd082d38483
SHA256e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37
SHA512153dce24258abfc3440208b100c26a847c2396fe7893844ba8d8e66659e4cd567d2ab8ac9d9d19e7cdc80b6dc89080b1966bf5f2d82ef76bfc814902beae071e
-
C:\Users\Admin\Desktop\Howto_RESTORE_FILES.bmpMD5
2fa01c9d90881df6193e15b28c4656fc
SHA1d69fc28400175ce679f0f8704fe4256863d6fea8
SHA25628e7f0465a3d05b42bc33b5fb4da53ef338b46b33d14a3098ef4249d6e28690f
SHA51286de590bc87c99e62ca1ed75c923c2de39d9356346f5f9626fa9c6648920753b551c272143183fe62824a8019fa1e6bf72983399a0cd5a6d0ca4ee1777771b0c
-
C:\Users\Admin\Desktop\Howto_RESTORE_FILES.htmlMD5
9a2dce2db3da74baccffca3c963a0e3f
SHA1a12c03535ecfb8b0857cb000711f789b238b61f6
SHA2565a555c2413b4c2b9304f22e3569d089caf04ab58e6268439f48a88ff865662c1
SHA512b6371e8a5ad95b88aa2ba4360d248c7250199959f203748833b46b6ea39d8f5c2bc9fb7fa3fbe3c31eb970ca8b079b0759d6886b5c191ad9b1b6d4ca49416812
-
C:\Users\Admin\Desktop\Howto_RESTORE_FILES.txtMD5
0e9ec414f0f038bc74a2cc0e524ce151
SHA166992fdf0229e7d6dc879c252c829c4bae6f59d5
SHA2567d47e0da4de3ba8b0c2177e9d2935149fb56afbc5b7525633f89530ce4486b68
SHA512d5587fed0bf908eb88f73b3e00b2d58d153e19cad25e8043e98cb2f016f7bc90e28597fc9a3fac338cfe580e36a3653800ae6366b8483c90ab75a67825e34fd9
-
\Users\Admin\AppData\Roaming\daixqacroic.exeMD5
d0d3086cd72eb31385bf6406042cc404
SHA111f9bb5c17fe32b48d44575a29e94dd082d38483
SHA256e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37
SHA512153dce24258abfc3440208b100c26a847c2396fe7893844ba8d8e66659e4cd567d2ab8ac9d9d19e7cdc80b6dc89080b1966bf5f2d82ef76bfc814902beae071e
-
\Users\Admin\AppData\Roaming\daixqacroic.exeMD5
d0d3086cd72eb31385bf6406042cc404
SHA111f9bb5c17fe32b48d44575a29e94dd082d38483
SHA256e272f32a45aa342b823aaf26687357f45f39d4f836d3529169340e4893c08c37
SHA512153dce24258abfc3440208b100c26a847c2396fe7893844ba8d8e66659e4cd567d2ab8ac9d9d19e7cdc80b6dc89080b1966bf5f2d82ef76bfc814902beae071e
-
memory/212-82-0x0000000000000000-mapping.dmp
-
memory/268-67-0x0000000000000000-mapping.dmp
-
memory/336-77-0x0000000000000000-mapping.dmp
-
memory/552-76-0x0000000000000000-mapping.dmp
-
memory/744-84-0x0000000000000000-mapping.dmp
-
memory/864-81-0x0000000000000000-mapping.dmp
-
memory/1076-78-0x0000000000000000-mapping.dmp
-
memory/1156-69-0x0000000000000000-mapping.dmp
-
memory/1196-89-0x0000000000000000-mapping.dmp
-
memory/1228-87-0x0000000000000000-mapping.dmp
-
memory/1256-93-0x0000000000000000-mapping.dmp
-
memory/1532-63-0x00000000752B1000-0x00000000752B3000-memory.dmpFilesize
8KB
-
memory/1532-64-0x0000000000400000-0x0000000000485000-memory.dmpFilesize
532KB
-
memory/1532-62-0x0000000000409350-mapping.dmp
-
memory/1532-61-0x0000000000400000-0x0000000000485000-memory.dmpFilesize
532KB
-
memory/1640-88-0x00000000001A0000-0x00000000001A2000-memory.dmpFilesize
8KB
-
memory/1640-90-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1840-75-0x0000000000400000-0x0000000000485000-memory.dmpFilesize
532KB
-
memory/1840-72-0x0000000000409350-mapping.dmp
-
memory/1856-60-0x00000000003C0000-0x00000000003C3000-memory.dmpFilesize
12KB
-
memory/1856-80-0x0000000000000000-mapping.dmp
-
memory/1956-79-0x0000000000000000-mapping.dmp