Analysis
-
max time kernel
207s -
max time network
212s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
18-10-2021 09:09
Static task
static1
General
-
Target
ReanimatorStart.exe
-
Size
34.7MB
-
MD5
1bd6eb351472b421365999b9a4cb32b0
-
SHA1
8d37b3629ac0571b5ca83c9a298eb52e13c1f70a
-
SHA256
67f4bbfec24361fe4894094571feace68cf4282b080276c835363d8bd11a6672
-
SHA512
01d468943245799a03f2faa3f49a674fca57467f6c44458e9ace7fe71d7a30904cc8bd157446f86ef591b77aa70e30ec8a5247f72ebf7dd60ede33d5ae80b8dc
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
ReanimatorStart.tmpreanimator.exeReanimator.exewu.exepid process 1776 ReanimatorStart.tmp 1012 reanimator.exe 1276 Reanimator.exe 1500 wu.exe -
Modifies Shared Task Scheduler registry keys 2 TTPs
-
Loads dropped DLL 16 IoCs
Processes:
ReanimatorStart.exeReanimatorStart.tmpreanimator.exeReanimator.exepid process 968 ReanimatorStart.exe 1776 ReanimatorStart.tmp 1776 ReanimatorStart.tmp 1776 ReanimatorStart.tmp 1776 ReanimatorStart.tmp 1776 ReanimatorStart.tmp 1776 ReanimatorStart.tmp 1776 ReanimatorStart.tmp 1776 ReanimatorStart.tmp 1012 reanimator.exe 1276 Reanimator.exe 1276 Reanimator.exe 1276 Reanimator.exe 1276 Reanimator.exe 1276 Reanimator.exe 1276 Reanimator.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
Reanimator.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce Reanimator.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnceEx Reanimator.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run Reanimator.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run Reanimator.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run Reanimator.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce Reanimator.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce Reanimator.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs
BHOs are DLL modules which act as plugins for Internet Explorer.
-
Drops file in System32 directory 5 IoCs
Processes:
ReanimatorStart.tmpReanimator.exedescription ioc process File opened for modification C:\Windows\system32\partizan.exe ReanimatorStart.tmp File created C:\Windows\system32\is-VIJKM.tmp ReanimatorStart.tmp File opened for modification C:\Windows\System32\CatRoot2\dberr.txt Reanimator.exe File created C:\WINDOWS\Syswow64\Partizan.RRI Reanimator.exe File opened for modification C:\WINDOWS\Syswow64\Partizan.RRI Reanimator.exe -
Drops file in Program Files directory 64 IoCs
Processes:
ReanimatorStart.tmpwu.exedescription ioc process File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Dutch\is-OA3LR.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\French\is-E0ORI.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Spanish\is-TDHOI.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\vt\is-7OG0C.tmp ReanimatorStart.tmp File opened for modification C:\Program Files (x86)\Greatis\Reanimator\parser.dll ReanimatorStart.tmp File opened for modification C:\Program Files (x86)\Greatis\Reanimator\partizan.exe ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Dutch\is-NVTAN.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Italian\is-V2N33.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Italian\is-2M51K.tmp ReanimatorStart.tmp File created C:\PROGRA~2\Greatis\REANIM~1\dbsnew.db wu.exe File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Italian\is-GSBPR.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Turkish\is-5AMTL.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Ukrainian\is-ONV9Q.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Ukrainian\is-G4GNF.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\dbs.zip wu.exe File opened for modification C:\Program Files (x86)\Greatis\Reanimator\wu.exe ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\is-7RIMT.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\French\is-POC5R.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\German\is-99CIN.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Turkish\is-8QQIM.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Turkish\is-4TAA5.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Ukrainian\is-4J6OA.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\vt\is-1DFSR.tmp ReanimatorStart.tmp File opened for modification C:\Program Files (x86)\Greatis\Reanimator\regrun2.chm ReanimatorStart.tmp File opened for modification C:\Program Files (x86)\Greatis\Reanimator\vt\libEGL.dll ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Dutch\is-282OF.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Dutch\is-51OFH.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\French\is-2CTNP.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Italian\is-U0UAS.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Italian\is-30U9L.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Ukrainian\is-F3IPK.tmp ReanimatorStart.tmp File opened for modification C:\PROGRA~2\Greatis\REANIM~1\dbswww.ini wu.exe File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Dutch2\is-9GBAH.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\vt\is-14S4O.tmp ReanimatorStart.tmp File opened for modification C:\Program Files (x86)\Greatis\Reanimator\unins000.dat ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\is-BK400.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Dutch\is-5C0U9.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Dutch2\is-MKHQL.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Spanish\is-535CV.tmp ReanimatorStart.tmp File opened for modification C:\Program Files (x86)\Greatis\Reanimator\vt\widevinecdmadapter.dll ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\is-FSMT4.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Dutch2\is-TSJ2N.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\German\is-EQIIV.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Spanish\is-JPB5B.tmp ReanimatorStart.tmp File opened for modification C:\Program Files (x86)\Greatis\Reanimator\vt\vt.exe ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Dutch\is-DJG2K.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\German\is-RS427.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Russian\is-JH496.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\vt\is-P22OR.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\vt\is-VQ45I.tmp ReanimatorStart.tmp File opened for modification C:\Program Files (x86)\Greatis\Reanimator\vt\d3dcompiler_47.dll ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\is-MNN3M.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Dutch\is-C35NH.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Dutch2\is-T2EH9.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\French\is-VMSQB.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\German\is-UP1O7.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Spanish\is-792PA.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\is-60ETR.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\German\is-21F7S.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Italian\is-C4GJJ.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Italian\is-CM1C6.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Russian\is-5SHLE.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Turkish\is-VTGCG.tmp ReanimatorStart.tmp File created C:\Program Files (x86)\Greatis\Reanimator\Lang\Turkish\is-LUD15.tmp ReanimatorStart.tmp -
Drops file in Windows directory 3 IoCs
Processes:
DrvInst.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 1 IoCs
Processes:
Reanimator.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\Desktop Reanimator.exe -
Processes:
Reanimator.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Main Reanimator.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\AboutURLs Reanimator.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Styles Reanimator.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\URLSearchHooks Reanimator.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Toolbar Reanimator.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main Reanimator.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main Reanimator.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Extensions Reanimator.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Plugins\Extension Reanimator.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Search Reanimator.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\SearchUrl Reanimator.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Internet Explorer\Search Reanimator.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Toolbar Reanimator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Explorer Bars Reanimator.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Extensions Reanimator.exe -
Modifies data under HKEY_USERS 43 IoCs
Processes:
DrvInst.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\25\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe -
Processes:
Reanimator.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5 Reanimator.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 0f0000000100000014000000e91e1e972b8f467ab4e0598fa92285387dee94c909000000010000002a000000302806082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030353000000010000002500000030233021060b6086480186f8450107170630123010060a2b0601040182373c0101030200c01400000001000000140000007fd365a7c2ddecbbf03009f34339fa02af3331330b000000010000001200000056006500720069005300690067006e0000001d0000000100000010000000c6cbcafa17955c4cfd41eca0c654c3610300000001000000140000004eb6d578499b1ccf5f581ead56be3d9b6744a5e52000000001000000d7040000308204d3308203bba003020102021018dad19e267de8bb4a2158cdcc6b3b4a300d06092a864886f70d01010505003081ca310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e311f301d060355040b1316566572695369676e205472757374204e6574776f726b313a3038060355040b1331286329203230303620566572695369676e2c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79314530430603550403133c566572695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d204735301e170d3036313130383030303030305a170d3336303731363233353935395a3081ca310b300906035504061302555331173015060355040a130e566572695369676e2c20496e632e311f301d060355040b1316566572695369676e205472757374204e6574776f726b313a3038060355040b1331286329203230303620566572695369676e2c20496e632e202d20466f7220617574686f72697a656420757365206f6e6c79314530430603550403133c566572695369676e20436c6173732033205075626c6963205072696d6172792043657274696669636174696f6e20417574686f72697479202d20473530820122300d06092a864886f70d01010105000382010f003082010a0282010100af240808297a359e600caae74b3b4edc7cbc3c451cbb2be0fe2902f95708a364851527f5f1adc831895d22e82aaaa642b38ff8b955b7b1b74bb3fe8f7e0757ecef43db66621561cf600da4d8def8e0c362083d5413eb49ca59548526e52b8f1b9febf5a191c23349d843636a524bd28fe870514dd189697bc770f6b3dc1274db7b5d4b56d396bf1577a1b0f4a225f2af1c926718e5f40604ef90b9e400e4dd3ab519ff02baf43ceee08beb378becf4d7acf2f6f03dafdd759133191d1c40cb7424192193d914feac2a52c78fd50449e48d6347883c6983cbfe47bd2b7e4fc595ae0e9dd4d143c06773e314087ee53f9f73b8330acf5d3f3487968aee53e825150203010001a381b23081af300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106306d06082b0601050507010c0461305fa15da05b3059305730551609696d6167652f6769663021301f300706052b0e03021a04148fe5d31a86ac8d8e6bc3cf806ad448182c7b192e30251623687474703a2f2f6c6f676f2e766572697369676e2e636f6d2f76736c6f676f2e676966301d0603551d0e041604147fd365a7c2ddecbbf03009f34339fa02af333133300d06092a864886f70d0101050500038201010093244a305f62cfd81a982f3deadc992dbd77f6a5792238ecc4a7a07812ad620e457064c5e797662d98097e5fafd6cc2865f201aa081a47def9f97c925a0869200dd93e6d6e3c0d6ed8e606914018b9f8c1eddfdb41aae09620c9cd64153881c994eea284290b136f8edb0cdd2502dba48b1944d2417a05694a584f60ca7e826a0b02aa251739b5db7fe784652a958abd86de5e8116832d10ccdefda8822a6d281f0d0bc4e5e71a2619e1f4116f10b595fce7420532dbce9d515e28b69e85d35befa57d4540728eb70e6b0e06fb33354871b89d278bc4655f0d86769c447af6955cf65d320833a454b6183f685cf2424a853854835fd1e82cf2ac11d6a8ed636a Reanimator.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 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 Reanimator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 Reanimator.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Reanimator.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Reanimator.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 Reanimator.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\4EB6D578499B1CCF5F581EAD56BE3D9B6744A5E5\Blob = 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 Reanimator.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ReanimatorStart.tmppid process 1776 ReanimatorStart.tmp 1776 ReanimatorStart.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Reanimator.exepid process 1276 Reanimator.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
Reanimator.exevssvc.exeDrvInst.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 1276 Reanimator.exe Token: SeBackupPrivilege 1276 Reanimator.exe Token: SeBackupPrivilege 1068 vssvc.exe Token: SeRestorePrivilege 1068 vssvc.exe Token: SeAuditPrivilege 1068 vssvc.exe Token: SeRestorePrivilege 1440 DrvInst.exe Token: SeRestorePrivilege 1440 DrvInst.exe Token: SeRestorePrivilege 1440 DrvInst.exe Token: SeRestorePrivilege 1440 DrvInst.exe Token: SeRestorePrivilege 1440 DrvInst.exe Token: SeRestorePrivilege 1440 DrvInst.exe Token: SeRestorePrivilege 1440 DrvInst.exe Token: SeLoadDriverPrivilege 1440 DrvInst.exe Token: SeLoadDriverPrivilege 1440 DrvInst.exe Token: SeLoadDriverPrivilege 1440 DrvInst.exe Token: SeBackupPrivilege 1276 Reanimator.exe Token: SeShutdownPrivilege 1276 Reanimator.exe Token: 33 1792 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1792 AUDIODG.EXE Token: 33 1792 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1792 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
ReanimatorStart.tmppid process 1776 ReanimatorStart.tmp -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
reanimator.exeReanimator.exewu.exepid process 1012 reanimator.exe 1012 reanimator.exe 1276 Reanimator.exe 1276 Reanimator.exe 1500 wu.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
ReanimatorStart.exeReanimatorStart.tmpReanimator.exedescription pid process target process PID 968 wrote to memory of 1776 968 ReanimatorStart.exe ReanimatorStart.tmp PID 968 wrote to memory of 1776 968 ReanimatorStart.exe ReanimatorStart.tmp PID 968 wrote to memory of 1776 968 ReanimatorStart.exe ReanimatorStart.tmp PID 968 wrote to memory of 1776 968 ReanimatorStart.exe ReanimatorStart.tmp PID 968 wrote to memory of 1776 968 ReanimatorStart.exe ReanimatorStart.tmp PID 968 wrote to memory of 1776 968 ReanimatorStart.exe ReanimatorStart.tmp PID 968 wrote to memory of 1776 968 ReanimatorStart.exe ReanimatorStart.tmp PID 1776 wrote to memory of 1012 1776 ReanimatorStart.tmp reanimator.exe PID 1776 wrote to memory of 1012 1776 ReanimatorStart.tmp reanimator.exe PID 1776 wrote to memory of 1012 1776 ReanimatorStart.tmp reanimator.exe PID 1776 wrote to memory of 1012 1776 ReanimatorStart.tmp reanimator.exe PID 1776 wrote to memory of 1276 1776 ReanimatorStart.tmp Reanimator.exe PID 1776 wrote to memory of 1276 1776 ReanimatorStart.tmp Reanimator.exe PID 1776 wrote to memory of 1276 1776 ReanimatorStart.tmp Reanimator.exe PID 1776 wrote to memory of 1276 1776 ReanimatorStart.tmp Reanimator.exe PID 1276 wrote to memory of 1500 1276 Reanimator.exe wu.exe PID 1276 wrote to memory of 1500 1276 Reanimator.exe wu.exe PID 1276 wrote to memory of 1500 1276 Reanimator.exe wu.exe PID 1276 wrote to memory of 1500 1276 Reanimator.exe wu.exe PID 1276 wrote to memory of 1500 1276 Reanimator.exe wu.exe PID 1276 wrote to memory of 1500 1276 Reanimator.exe wu.exe PID 1276 wrote to memory of 1500 1276 Reanimator.exe wu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ReanimatorStart.exe"C:\Users\Admin\AppData\Local\Temp\ReanimatorStart.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-2TOE4.tmp\ReanimatorStart.tmp"C:\Users\Admin\AppData\Local\Temp\is-2TOE4.tmp\ReanimatorStart.tmp" /SL5="$5011A,36099437,56832,C:\Users\Admin\AppData\Local\Temp\ReanimatorStart.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Greatis\Reanimator\reanimator.exe"C:\Program Files (x86)\Greatis\Reanimator\reanimator.exe" /c3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Greatis\Reanimator\Reanimator.exe"C:\Program Files (x86)\Greatis\Reanimator\Reanimator.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Greatis\Reanimator\wu.exe"C:\Program Files (x86)\Greatis\Reanimator\wu.exe" http://greatis.com/dbs.ini /r /i4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot13" "" "" "66d15495b" "0000000000000000" "0000000000000598" "0000000000000594"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5801⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRAM FILES (X86)\GREATIS\REANIMATOR\REANIMATOR.EXEMD5
09bd7d58c5ddd56ffdf8bd106cff519a
SHA1b4a287cb09b78b288e20edc359916871aef97391
SHA256608ef9009bf7180c77c61950375949cf108c5e0b2832c3abee878a6829208ec9
SHA512cc8477e234ff93c97a00f042f37e45f3d0fbb98abd1b571d8608a42608fd203b54d97932694cc1de94141060544ba5080b77bcdda8b77ffbc53e8a6784453820
-
C:\Program Files (x86)\Greatis\Reanimator\database.rdbMD5
77695150cb84089f6d991fb3952e9269
SHA135abde16f636844f552af5cead083b1357ccdb69
SHA2560ef941cdc4171d3cad5bff3bd4dd974450c6394eb87a494558c87aa95ffedeeb
SHA5128cf438baacbd70d25c14a96ab8af0f58a2a48bdfcfb9347944fe0cf325bfb9ee2728360ee5ca2406f0f57f1895105fa1edd11e84bda1966359baa282dfba0ee0
-
C:\Program Files (x86)\Greatis\Reanimator\dbs.dbMD5
e1f374dc1570faf344641ef2eaa0864a
SHA13b2ede2d7632936fc4f788065e248921fbe2bf21
SHA2560f93fb3ff56c20b10edcfe2625a4cadf8e26b7df4b3f2600e18b96ff7d9b0ff5
SHA512e461039281add02c896350d5edddb52d402031aff43830fb096a130fc63f71a492b14f1734b1309d403ad621a161fc592290cfe141fa5c8b448f4709c94e39d8
-
C:\Program Files (x86)\Greatis\Reanimator\dbs.dbMD5
8614d3dfbb4bd44b1be59fc008be40d6
SHA1841442ef3540c569bbacf16b9f64d5fb2da30d0f
SHA256b534f8dd411a32fd7aad516a1cd7ea90d243f4f139c33d9467d1ef1675629c4c
SHA51257be3479810ddb20bfa701a08f281b0de20bb5e5eb191a12fbb0f4cfca69a18505d1adfc68072b9d4ec71df3fcc82039dee0fc4dfd96fa84e7d57c75cfe4bdf3
-
C:\Program Files (x86)\Greatis\Reanimator\dbs.iniMD5
00544df93afd13c00647fb093d598c13
SHA17f78e35dd340756fe8a4c3c95f0c1885007a0394
SHA256ea9b955c0e36ae90994dc2050e79ad35b4e602eb9301f3212b666cdb2aee795c
SHA512395aa14a6b4052582572846a6d960afce3348ebdca4604e5ee958a64f6d371a4d866b9f255492a0e1845aa83dec03f03b57d6a00dd676bd53a8d65843629ee2e
-
C:\Program Files (x86)\Greatis\Reanimator\dbsnew.dbMD5
2856998e7ed1dc32db8146a5abd92669
SHA1f912e5919e61333c5c3f65d754af425de766e488
SHA2561f6a708fd09e70b50d153e92624bba96df9ba741b5ec72388adc8c0bd30df4ea
SHA51219992be519b5393442b760776209d911bd09bf22730ae8ead45c13da9cc6f112072f6242928aaac3499f805ab81a8182a9c2c17bc9c75a983b01722254ca898a
-
C:\Program Files (x86)\Greatis\Reanimator\dbswww.iniMD5
9b3bb0449e4a7e95eaf61d5277b0afc0
SHA18e5707375cabcb8a6f01f73d9a4a86eb4e3bbdf7
SHA256e511b2dce67118ad46b632c8883921b9cccf23f60aff28eed86c8067337dfc83
SHA5121b6a7d0a92f6bd2d25999d9246dd40866a286c6a38d01d119cb90565ae36b88ea6183207f5bc536f2965a69395c122e25702ee03bf8dccd1054bc1658b537803
-
C:\Program Files (x86)\Greatis\Reanimator\jsonfast.dllMD5
58b2892e3401961495609d56ede12679
SHA19bbbef9d778a08286d1b86794d62cdef7dc05741
SHA2561e98bc2baaecfaff424c50729593b6ccdee20e9f8834591305e752f69b731b2f
SHA512382a07a24288059dbaa86e472df832c8afcf526793e7a03c9fc5c9605eabbdc7800a930b7bb42ab8b35690aa47d1f5d655db23725fcc2b9a75642fe50feface7
-
C:\Program Files (x86)\Greatis\Reanimator\parser.dllMD5
333961bb8ab2055af0d69a3d812d1d21
SHA156e3d2dbb2cce5102cf40667bce7f2897c2fac62
SHA256bb96edc20c2868d5a180634c74f7bd0188fb95f5bfcf2b5dfaeb758ce439388c
SHA5122bb302ab9d25fb83c3af65bc45ca6d7e2e5f8d293e4415ff7db5c733ad0814c8df7e4100f6febd43830963c84b4c5de840150ab7cdd40a0c5b7b17581313189e
-
C:\Program Files (x86)\Greatis\Reanimator\reanimator.exeMD5
09bd7d58c5ddd56ffdf8bd106cff519a
SHA1b4a287cb09b78b288e20edc359916871aef97391
SHA256608ef9009bf7180c77c61950375949cf108c5e0b2832c3abee878a6829208ec9
SHA512cc8477e234ff93c97a00f042f37e45f3d0fbb98abd1b571d8608a42608fd203b54d97932694cc1de94141060544ba5080b77bcdda8b77ffbc53e8a6784453820
-
C:\Program Files (x86)\Greatis\Reanimator\reanimator.exeMD5
09bd7d58c5ddd56ffdf8bd106cff519a
SHA1b4a287cb09b78b288e20edc359916871aef97391
SHA256608ef9009bf7180c77c61950375949cf108c5e0b2832c3abee878a6829208ec9
SHA512cc8477e234ff93c97a00f042f37e45f3d0fbb98abd1b571d8608a42608fd203b54d97932694cc1de94141060544ba5080b77bcdda8b77ffbc53e8a6784453820
-
C:\Program Files (x86)\Greatis\Reanimator\wu.exeMD5
7235423d9fcf8d744d0e451dbbafd39f
SHA17a1600a959b5df137d2abdb5e60814f46e95a356
SHA256986f392f538ba550388f600195b3d0060208fdb9f31407ed701b6bfed166b4ad
SHA512bf80b651e6bd1a19a85ee4aecc0a686f0dbb1ac46d5ea6286e1e33f2cd026687320f1102947e26dc561a69506986d174b611960e5d2f5bd8a31de9a143eacf8b
-
C:\Program Files (x86)\Greatis\Reanimator\wu.exeMD5
7235423d9fcf8d744d0e451dbbafd39f
SHA17a1600a959b5df137d2abdb5e60814f46e95a356
SHA256986f392f538ba550388f600195b3d0060208fdb9f31407ed701b6bfed166b4ad
SHA512bf80b651e6bd1a19a85ee4aecc0a686f0dbb1ac46d5ea6286e1e33f2cd026687320f1102947e26dc561a69506986d174b611960e5d2f5bd8a31de9a143eacf8b
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Reanimator\Detailed System Report.lnkMD5
a204067962a58b34239494dc76f8b2e2
SHA12fcaa81e9cbec607f572fdd9a8e656b3b8cd364b
SHA256b33e7b84d9fbe1699c169add848cc6f6a0be97e0fceb3ebe17d2710fdcc48f43
SHA5124781c938b91175eaa3dcff88627ee3c8bde254984dbdb11144e6e3ac4cc46ac68cd4b4076fda43ed674bcd8d1c0616167f7c3b5559f006d074f08467b0743c48
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Reanimator\Reanimator.lnkMD5
aa0471c201a5e1b97ee389ec3f0d29ce
SHA116e0cee3c3bb0540393966604028a93bb3c4d50e
SHA256dbd9e952577605a11a8f212d79d2ad3b2cfe3d62786c89ce4328ab96e2452230
SHA512a9e78b099b67176ffa556792158bf018daf86a961f11ebfdc91359f5b7105e2b3756b4c408c21b8937403be50e3b786356a6ef7809f33d1ec55f8ceb6e7835b2
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Reanimator\Uninstall Reanimator.lnkMD5
6dfc169ee2fb42d8aa1e0c6c9e34801f
SHA199d3dca965f98e1ec81abc7233b112e23145a3cd
SHA2569391292a0640b5b30d42ef8433c9b672ba2fe09f428eed13a451004630976c42
SHA51277bcf6a7613ad7be6e0e33e4e77281a1ca181fb5e75d1080cf3cc76c19f142f64d3f61b777f79dfd2a52b0da7e28574083039b45a7e511dbd0528137be8c197f
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Reanimator\Update Reanimator.lnkMD5
810c6bbd65075ee0213965bf367f4fbe
SHA17a7e856cfba16b468c904a438afbed9b1c3f0ea9
SHA256007043ddae8e5047eb8faedd893f417bfbfb19dcfeccfe80671693a33338942e
SHA5128c8605741065d9c884cf3e0cf4d4a3f22d41d6404fc681baf05fe4ac3226718ca4d9c62527a27d2bbf76467d799e7d7290f6e950d0fc9a67986d826a80408b45
-
C:\USERS\ADMIN\APPDATA\LOCAL\UNHACKME\REGRUN2.RR2MD5
c905c03aab3b257f223705e4e88b065e
SHA1112cf7dbed41b2a0e5514de23c5c7329051308cc
SHA2565230fec57b28d1fc5b47a926ca71682165f46906b14fff070c5322b58ac919ba
SHA5124c4ec9fc91df9dabb2fb0142e686ecd3b0d9981664dc93c1ad4d873686c81e7aabf02a8cc9af192e1b16808f31b8395ffa4012fc21d9d3eb0b3617df19408fd8
-
C:\Users\Admin\AppData\Local\Temp\is-2TOE4.tmp\ReanimatorStart.tmpMD5
1305181de520f125aeabf85dc24a89d6
SHA198b7548fede3f1468ccbdee405abdc4e5d2ec671
SHA2560e19765b89a1a29afee09810dcb3ec5cc7c66053947be8f1aebdbb7c801dfeaf
SHA512b0bfa9749a6a5a18c1926e6c5ebb4cdb156df1652cb822f067422a1cd21583340f32e4a1fc2f4c21a09343d73a55651972edbd2dec98ce44641a1097c16bc793
-
C:\Users\Admin\AppData\Local\Temp\is-2TOE4.tmp\ReanimatorStart.tmpMD5
1305181de520f125aeabf85dc24a89d6
SHA198b7548fede3f1468ccbdee405abdc4e5d2ec671
SHA2560e19765b89a1a29afee09810dcb3ec5cc7c66053947be8f1aebdbb7c801dfeaf
SHA512b0bfa9749a6a5a18c1926e6c5ebb4cdb156df1652cb822f067422a1cd21583340f32e4a1fc2f4c21a09343d73a55651972edbd2dec98ce44641a1097c16bc793
-
C:\Users\Admin\Desktop\Reanimator.lnkMD5
c132120dfbf2e87b606c05d99e805778
SHA1a1fc9686d2f6c92e647aadabd7c24ec4005cd1aa
SHA256a36a149b42d66c850868d7d1d4a7678ec2eff7c97485fc1dd029c9c3378ace6d
SHA5120f6e1c752a9f2ca7052decc4ab71eb8ef3874c2ee006b26ccfc1a68b9c3d41fd3da95d0be1f42b340f6764fac06828729df9d356ff95125eabc6bf205617c6ca
-
\Program Files (x86)\Greatis\Reanimator\jsonfast.dllMD5
58b2892e3401961495609d56ede12679
SHA19bbbef9d778a08286d1b86794d62cdef7dc05741
SHA2561e98bc2baaecfaff424c50729593b6ccdee20e9f8834591305e752f69b731b2f
SHA512382a07a24288059dbaa86e472df832c8afcf526793e7a03c9fc5c9605eabbdc7800a930b7bb42ab8b35690aa47d1f5d655db23725fcc2b9a75642fe50feface7
-
\Program Files (x86)\Greatis\Reanimator\parser.dllMD5
333961bb8ab2055af0d69a3d812d1d21
SHA156e3d2dbb2cce5102cf40667bce7f2897c2fac62
SHA256bb96edc20c2868d5a180634c74f7bd0188fb95f5bfcf2b5dfaeb758ce439388c
SHA5122bb302ab9d25fb83c3af65bc45ca6d7e2e5f8d293e4415ff7db5c733ad0814c8df7e4100f6febd43830963c84b4c5de840150ab7cdd40a0c5b7b17581313189e
-
\Program Files (x86)\Greatis\Reanimator\parser.dllMD5
333961bb8ab2055af0d69a3d812d1d21
SHA156e3d2dbb2cce5102cf40667bce7f2897c2fac62
SHA256bb96edc20c2868d5a180634c74f7bd0188fb95f5bfcf2b5dfaeb758ce439388c
SHA5122bb302ab9d25fb83c3af65bc45ca6d7e2e5f8d293e4415ff7db5c733ad0814c8df7e4100f6febd43830963c84b4c5de840150ab7cdd40a0c5b7b17581313189e
-
\Program Files (x86)\Greatis\Reanimator\reanimator.exeMD5
09bd7d58c5ddd56ffdf8bd106cff519a
SHA1b4a287cb09b78b288e20edc359916871aef97391
SHA256608ef9009bf7180c77c61950375949cf108c5e0b2832c3abee878a6829208ec9
SHA512cc8477e234ff93c97a00f042f37e45f3d0fbb98abd1b571d8608a42608fd203b54d97932694cc1de94141060544ba5080b77bcdda8b77ffbc53e8a6784453820
-
\Program Files (x86)\Greatis\Reanimator\reanimator.exeMD5
09bd7d58c5ddd56ffdf8bd106cff519a
SHA1b4a287cb09b78b288e20edc359916871aef97391
SHA256608ef9009bf7180c77c61950375949cf108c5e0b2832c3abee878a6829208ec9
SHA512cc8477e234ff93c97a00f042f37e45f3d0fbb98abd1b571d8608a42608fd203b54d97932694cc1de94141060544ba5080b77bcdda8b77ffbc53e8a6784453820
-
\Program Files (x86)\Greatis\Reanimator\reanimator.exeMD5
09bd7d58c5ddd56ffdf8bd106cff519a
SHA1b4a287cb09b78b288e20edc359916871aef97391
SHA256608ef9009bf7180c77c61950375949cf108c5e0b2832c3abee878a6829208ec9
SHA512cc8477e234ff93c97a00f042f37e45f3d0fbb98abd1b571d8608a42608fd203b54d97932694cc1de94141060544ba5080b77bcdda8b77ffbc53e8a6784453820
-
\Program Files (x86)\Greatis\Reanimator\reanimator.exeMD5
09bd7d58c5ddd56ffdf8bd106cff519a
SHA1b4a287cb09b78b288e20edc359916871aef97391
SHA256608ef9009bf7180c77c61950375949cf108c5e0b2832c3abee878a6829208ec9
SHA512cc8477e234ff93c97a00f042f37e45f3d0fbb98abd1b571d8608a42608fd203b54d97932694cc1de94141060544ba5080b77bcdda8b77ffbc53e8a6784453820
-
\Program Files (x86)\Greatis\Reanimator\unins000.exeMD5
2f9485634aeb7a1d00e59a2a94c40025
SHA1700a044225a2b40299ff71e109e4f0f28c55daf7
SHA25629aef3257c020beb9ad5d0e9652e7e84d889343466e7e6ba2772516fd1038531
SHA512b0102d4699544cc801f95e3920d4cea2a1f151716fe5066f98436935888a72c9d221f0f4c688e0e45353f97e4805066680004338cdb39a626ccd89a00cd98ddf
-
\Program Files (x86)\Greatis\Reanimator\wu.exeMD5
7235423d9fcf8d744d0e451dbbafd39f
SHA17a1600a959b5df137d2abdb5e60814f46e95a356
SHA256986f392f538ba550388f600195b3d0060208fdb9f31407ed701b6bfed166b4ad
SHA512bf80b651e6bd1a19a85ee4aecc0a686f0dbb1ac46d5ea6286e1e33f2cd026687320f1102947e26dc561a69506986d174b611960e5d2f5bd8a31de9a143eacf8b
-
\Program Files (x86)\Greatis\Reanimator\wu.exeMD5
7235423d9fcf8d744d0e451dbbafd39f
SHA17a1600a959b5df137d2abdb5e60814f46e95a356
SHA256986f392f538ba550388f600195b3d0060208fdb9f31407ed701b6bfed166b4ad
SHA512bf80b651e6bd1a19a85ee4aecc0a686f0dbb1ac46d5ea6286e1e33f2cd026687320f1102947e26dc561a69506986d174b611960e5d2f5bd8a31de9a143eacf8b
-
\Program Files (x86)\Greatis\Reanimator\wu.exeMD5
7235423d9fcf8d744d0e451dbbafd39f
SHA17a1600a959b5df137d2abdb5e60814f46e95a356
SHA256986f392f538ba550388f600195b3d0060208fdb9f31407ed701b6bfed166b4ad
SHA512bf80b651e6bd1a19a85ee4aecc0a686f0dbb1ac46d5ea6286e1e33f2cd026687320f1102947e26dc561a69506986d174b611960e5d2f5bd8a31de9a143eacf8b
-
\Program Files (x86)\Greatis\Reanimator\wu.exeMD5
7235423d9fcf8d744d0e451dbbafd39f
SHA17a1600a959b5df137d2abdb5e60814f46e95a356
SHA256986f392f538ba550388f600195b3d0060208fdb9f31407ed701b6bfed166b4ad
SHA512bf80b651e6bd1a19a85ee4aecc0a686f0dbb1ac46d5ea6286e1e33f2cd026687320f1102947e26dc561a69506986d174b611960e5d2f5bd8a31de9a143eacf8b
-
\Program Files (x86)\Greatis\Reanimator\wu.exeMD5
7235423d9fcf8d744d0e451dbbafd39f
SHA17a1600a959b5df137d2abdb5e60814f46e95a356
SHA256986f392f538ba550388f600195b3d0060208fdb9f31407ed701b6bfed166b4ad
SHA512bf80b651e6bd1a19a85ee4aecc0a686f0dbb1ac46d5ea6286e1e33f2cd026687320f1102947e26dc561a69506986d174b611960e5d2f5bd8a31de9a143eacf8b
-
\Users\Admin\AppData\Local\Temp\is-2TOE4.tmp\ReanimatorStart.tmpMD5
1305181de520f125aeabf85dc24a89d6
SHA198b7548fede3f1468ccbdee405abdc4e5d2ec671
SHA2560e19765b89a1a29afee09810dcb3ec5cc7c66053947be8f1aebdbb7c801dfeaf
SHA512b0bfa9749a6a5a18c1926e6c5ebb4cdb156df1652cb822f067422a1cd21583340f32e4a1fc2f4c21a09343d73a55651972edbd2dec98ce44641a1097c16bc793
-
\Users\Admin\AppData\Local\Temp\is-80BFE.tmp\_isetup\_shfoldr.dllMD5
92dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
\Users\Admin\AppData\Local\Temp\is-80BFE.tmp\_isetup\_shfoldr.dllMD5
92dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
memory/968-54-0x0000000076B61000-0x0000000076B63000-memory.dmpFilesize
8KB
-
memory/968-62-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/1012-72-0x0000000000000000-mapping.dmp
-
memory/1012-79-0x0000000004510000-0x000000000454D000-memory.dmpFilesize
244KB
-
memory/1012-75-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/1276-84-0x0000000000330000-0x0000000000331000-memory.dmpFilesize
4KB
-
memory/1276-81-0x0000000000000000-mapping.dmp
-
memory/1276-103-0x0000000007570000-0x0000000007639000-memory.dmpFilesize
804KB
-
memory/1276-111-0x0000000007640000-0x0000000007641000-memory.dmpFilesize
4KB
-
memory/1276-86-0x00000000044F0000-0x000000000452D000-memory.dmpFilesize
244KB
-
memory/1276-99-0x0000000006B50000-0x0000000006B51000-memory.dmpFilesize
4KB
-
memory/1500-95-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/1500-92-0x0000000000000000-mapping.dmp
-
memory/1548-112-0x000007FEFC4F1000-0x000007FEFC4F3000-memory.dmpFilesize
8KB
-
memory/1548-113-0x00000000027C0000-0x00000000027C1000-memory.dmpFilesize
4KB
-
memory/1776-63-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/1776-57-0x0000000000000000-mapping.dmp
-
memory/1776-64-0x0000000074F01000-0x0000000074F03000-memory.dmpFilesize
8KB
-
memory/1932-115-0x0000000002760000-0x0000000002761000-memory.dmpFilesize
4KB