Analysis
-
max time kernel
148s -
max time network
180s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-01-2022 00:54
Static task
static1
Behavioral task
behavioral1
Sample
dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe
Resource
win10-en-20211208
General
-
Target
dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe
-
Size
219KB
-
MD5
690dc6b8d42452a29a81edfaa6328e3e
-
SHA1
93610bbead3ee07c406365915cbd716a27b6abdb
-
SHA256
dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b
-
SHA512
1101bfdbc0bf37ee1b80bee53f6af63879561b2dfa1eed64c9d2e2627c4a48fcd1d9b5a066f4280e4b1242fd018bdfa748076fd36103f7f12bffc7683425f77e
Malware Config
Extracted
C:\80n19xw1-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/A46222B19DB0ABF3
http://decryptor.top/A46222B19DB0ABF3
Extracted
sodinokibi
19
96
floweringsun.org
imajyuku-sozoku.com
eatyoveges.com
groovedealers.ru
mneti.ru
hostastay.com
mind2muscle.nl
pinkxgayvideoawards.com
ya-elka.ru
iron-mine.ru
c-sprop.com
theatre-embellie.fr
explora.nl
thesilkroadny.com
avisioninthedesert.com
test-teleachat.fr
marmarabasin.com
xn--80abehgab4ak0ddz.xn--p1ai
neonodi.be
lesyeuxbleus.net
professionetata.com
shortsalemap.com
mundo-pieces-auto.fr
k-v-f.de
mgimalta.com
aquacheck.co.za
condormobile.fr
cotton-avenue.co.il
fixx-repair.com
schlagbohrmaschinetests.com
endstarvation.com
rvside.com
tilldeeke.de
subquercy.fr
sweetz.fr
cmascd.com
apmollerpension.com
datatri.be
kvetymichalovce.sk
drbrianhweeks.com
hotelturbo.de
martha-frets-ceramics.nl
leansupremegarcinia.net
supercarhire.co.uk
nutriwell.com.sg
shrinkingplanet.com
gsconcretecoatings.com
rapid5kloan.org
lapponiasafaris.com
xn--billigafrgpatroner-stb.se
rubyaudiology.com
k-zubki.ru
redpebblephotography.com
markseymourphotography.co.uk
walterman.es
rattanwarehouse.co.uk
natturestaurante.com.br
atelierkomon.com
biketruck.de
mariamalmahdi.com
brisbaneosteopathic.com.au
andrealuchesi.it
m2graph.fr
publicompserver.de
reygroup.pt
factoriareloj.com
letterscan.de
linearete.com
pourlabretagne.bzh
kemtron.fr
mazzaropi.com.br
innovationgames-brabant.nl
cops4causes.org
magnetvisual.com
biodentify.ai
liepertgrafikweb.at
saint-malo-developpement.fr
lovcase.com
suonenjoen.fi
lisa-poncon.fr
wineandgo.hu
the-beauty-guides.com
phukienbepthanhdat.com
mondolandscapes.com
stoneridgemontessori.com
apogeeconseils.fr
maryairbnb.wordpress.com
opt4cdi.com
strauchs-wanderlust.info
schulz-moelln.de
alisodentalcare.com
penumbuhrambutkeiskei.com
eastgrinsteadwingchun.com
adabible.org
bg.szczecin.pl
sharonalbrightdds.com
agora-collectivites.com
chorusconsulting.net
stanleyqualitysystems.com
cac2040.com
zinnystar.com
agrifarm.dk
kuriero.pro
hiddensee-buhne11.de
wyreforest.net
edrickennedymacfoy.com
leijstrom.com
stage-infirmier.fr
parentsandkids.com
mesajjongeren.nl
site.markkit.com.br
sycamoregreenapts.com
johnstonmingmanning.com
wordpress.idium.no
slideevents.be
teamsegeln.ch
frameshift.it
simpleitsolutions.ch
bodymindchallenger.com
daveystownhouse.com
vvego.com
ncjc.ca
creohn.de
artcase.pl
frankgoll.com
guohedd.com
rino-gmbh.com
signamedia.de
pro-gamer.pl
ruggestar.ch
reizenmetkinderen.be
entdoctor-durban.com
loparnille.se
aceroprime.com
fotoslubna.com
studionumerik.fr
banksrl.co.za
shortysspices.com
smartmind.net
speakaudible.com
autoteamlast.de
jalkapuu.net
grancanariaregional.com
proffteplo.com
reputation-medical.online
so-sage.fr
dreamvoiceclub.org
jaaphoekzema.nl
artvark.nl
anchelor.com
fsbforsale.com
eshop.design
juergenblaetz.de
betterce.com
kryddersnapsen.dk
annenymus.com
girlish.ae
belinda.af
drnelsonpediatrics.com
husetsanitas.dk
adedesign.com
eyedoctordallas.com
centuryvisionglobal.com
kdbrh.com
jglconsultancy.com
stringnosis.academy
ikadomus.com
amelielecompte.wordpress.com
riffenmattgarage.ch
andreaskildegaard.dk
cl0nazepamblog.com
dennisverschuur.com
poems-for-the-soul.ch
yourcosmicbeing.com
azerbaycanas.com
four-ways.com
prometeyagro.com.ua
uci-france.fr
loysonbryan.com
chomiksy.net
onlinemarketingsurgery.co.uk
vdolg24.online
agendatwentytwenty.com
janellrardon.com
epicjapanart.com
broccolisoep.nl
corporacionrr.com
fi-institutionalfunds.com
pedmanson.com
cesep2019.com
yuanshenghotel.com
frimec-international.es
mayprogulka.ru
nalliasmali.net
boomerslivinglively.com
zorgboerderijravensbosch.nl
endlessrealms.net
acb-gruppe.ch
stressreliefadvice.com
alpesiberie.com
bundan.com
thenalpa.com
patassociation.com
fluzfluzrewards.com
blucamp.com
the5thquestion.com
annida.it
zaczytana.com
kausette.com
zuerich-umzug.ch
wallflowersandrakes.com
watchsale.biz
indiebizadvocates.org
ikzoekgod.be
fbmagazine.ru
soncini.ch
internestdigital.com
o90.dk
oportowebdesign.com
espaciopolitica.com
global-migrate.com
direitapernambuco.com
aslog.fr
bcmets.info
fla.se
domilivefurniture.com
kelsigordon.com
narca.net
towelroot.co
solidhosting.nl
skinkeeper.li
nuohous.com
nationnewsroom.com
cormanmarketing.com
kroophold-sjaelland.dk
customroasts.com
michaelfiegel.com
5thactors.com
switch-made.com
go.labibini.ch
keyboardjournal.com
bridalcave.com
topautoinsurers.net
polynine.com
clemenfoto.dk
2020hindsight.info
bajova.sk
pilotgreen.com
malzomattalar.com
almamidwifery.com
awaitspain.com
bratek-immobilien.de
quitescorting.com
perfectgrin.com
limounie.com
efficiencyconsulting.es
julielusktherapy.com
agriturismocastagneto.it
o2o-academy.com
blueridgeheritage.com
billigeflybilletter.dk
arabianmice.com
theintellect.edu.pk
aberdeenartwalk.org
mrkluttz.com
brighthillgroup.com
mieleshopping.it
nykfdyrehospital.dk
teethinadaydentalimplants.com
craftron.com
silverbird.dk
cleanroomequipment.ie
peninggibadan.co.id
nexstagefinancial.com
cssp-mediation.org
domaine-des-pothiers.com
hartofurniture.com
lifeinbreaths.com
paprikapod.com
soundseeing.net
bavovrienden.nl
drbenveniste.com
ultimatelifesource.com
pharmeko-group.com
neolaiamedispa.com
hostaletdelsindians.es
auto-opel.ro
astrographic.com
scentedlair.com
secrets-clubs.co.uk
omnicademy.com
primemarineengineering.com
blavait.fr
cxcompany.com
hekecrm.com
diakonie-weitramsdorf-sesslach.de
schluesseldienste-hannover.de
cuadc.org
gta-jjb.fr
onesynergyinternational.com
redctei.co
hotjapaneselesbian.com
memphishealthandwellness.com
fta-media.com
evsynthacademy.org
campusescalade.com
leadforensics.com
teutoradio.de
putzen-reinigen.com
pokemonturkiye.com
angeleyezstripclub.com
tellthebell.website
metcalfe.ca
drvoip.com
eksperdanismanlik.com
tutvracks.com
innervisions-id.com
ziliak.com
ingresosextras.online
galaniuklaw.com
renehartman.nl
finsahome.co.uk
pansionatblago.ru
hm-com.com
glende-pflanzenparadies.de
ntinasfiloxenia.gr
aciscomputers.com
taulunkartano.fi
cap29010.it
thegrinningmanmusical.com
lyricalduniya.com
druktemakersheerenveen.nl
thisprettyhair.com
tieronechic.com
randyabrown.com
silkeight.com
abulanov.com
davedavisphotos.com
antesacademy.it
mazift.dk
ciga-france.fr
mslp.org
1deals.com
nepressurecleaning.com
lsngroupe.com
laylavalentine.com
graygreenbiomedservices.com
parseport.com
greatofficespaces.net
metallbau-hartmann.eu
tecleados.com
bruut.online
stathmoulis.gr
rsidesigns.com
globalskills.pt
vitoriaecoturismo.com.br
rolleepollee.com
acornishstudio.co.uk
descargandoprogramas.com
augen-praxisklinik-rostock.de
dantreranch.com
denverwynkoopdentist.com
ox-home.com
galatee-couture.com
elitkeramika-shop.com.ua
bumbipdeco.site
jeanmonti.com
hospitalitytrainingsolutions.co.uk
craftstone.co.nz
denhaagfoodie.nl
zwemofficial.nl
placermonticello.com
salonlamar.nl
bringmehope.org
clinic-beethovenstrasse-ag.ch
sjtpo.org
harleystreetspineclinic.com
advancedeyecare.com
weddingceremonieswithtim.com
premier-iowa.com
energosbit-rp.ru
geitoniatonaggelon.gr
stitch-n-bitch.com
lgiwines.com
alwaysdc.com
eventosvirtualesexitosos.com
gbk-tp1.de
buerocenter-butzbach-werbemittel.de
pajagus.fr
yourhappyevents.fr
rishigangoly.com
bertbutter.nl
startuplive.org
perceptdecor.com
relevantonline.eu
chinowarehousespace.com
khtrx.com
miscbo.it
hnkns.com
barbaramcfadyenjewelry.com
optigas.com
paardcentraal.nl
koncept-m.ru
advance-refle.com
jlwilsonbooks.com
lassocrm.com
boyfriendsgoal.site
chatterchatterchatter.com
mariajosediazdemera.com
amyandzac.com
jandhpest.com
devus.de
lookandseen.com
akcadagofis.com
mrmac.com
aoyama.ac
gazelle-du-web.com
myplaywin3.com
solutionshosting.co.uk
fanuli.com.au
thiagoperez.com
bulyginnikitav.000webhostapp.com
thestudio.academy
arthakapitalforvaltning.dk
andermattswisswatches.ch
gatlinburgcottage.com
buffdaddyblog.com
goddardleadership.org
zumrutkuyutemel.com
profibersan.com
slotenmakerszwijndrecht.nl
mursall.de
adaduga.info
jlgraphisme.fr
agenceassemble.fr
biblica.com
vitormmcosta.com
acumenconsultingcompany.com
subyard.com
otpusk.zp.ua
catalyseurdetransformation.com
hawaiisteelbuilding.com
jacquesgarcianoto.com
bluelakevision.com
craftingalegacy.com
gavelmasters.com
ebible.co
focuskontur.com
rentsportsequip.com
mollymccarthydesign.com
thepixelfairy.com
testitjavertailut.net
verbouwingsdouche.nl
metroton.ru
magrinya.net
birthplacemag.com
tages-geldvergleich.de
campusce.com
photographycreativity.co.uk
interlinkone.com
heimdalbygg.no
santastoy.store
tanatek.com
kickittickets.com
grupoexin10.com
ramirezprono.com
jdscenter.com
eafx.pro
olry-cloisons.fr
angelika-schwarz.com
omegamarbella.com
innersurrection.com
furland.ru
hawthornsretirement.co.uk
zdrowieszczecin.pl
triavlete.com
comoserescritor.com
triplettagaite.fr
egpu.fr
lovetzuchia.com
circuit-diagramz.com
nepal-pictures.com
factorywizuk.com
theater-lueneburg.de
cascinarosa33.it
oscommunity.de
framemyballs.com
smartworkplaza.com
bluemarinefoundation.com
albcleaner.fr
11.in.ua
afbudsrejserallinclusive.dk
ced-elec.com
kellengatton.com
unexplored.gr
hepishopping.com
sytzedevries.com
turing.academy
theboardroomafrica.com
dieetuniversiteit.nl
pxsrl.it
digitale-elite.de
alattekniksipil.com
fidelitytitleoregon.com
epsondriversforwindows.com
margaretmcshane.com
noda.com.ua
fridakids.com
awaisghauri.com
paradigmlandscape.com
ddmgen.com
cc-experts.de
satoblog.org
boloria.de
lexced.com
futurenetworking.com
skolaprome.eu
suitesartemis.gr
rarefoods.ro
colored-shelves.com
hom-frisor.dk
vedsegaard.dk
iexpert99.com
pvandambv.nl
wg-heiligenstadt.de
triplettabordeaux.fr
ijsselbeton.nl
apiarista.de
bjornvanvulpen.nl
devplus.be
profiz.com
sunsolutions.es
rozmata.com
purepreprod4.com
littlesaints.academy
geoweb.software
block-optic.com
mbuildinghomes.com
benchbiz.com
alltagsrassismus-entknoten.de
sochi-okna23.ru
golfclublandgoednieuwkerk.nl
enactusnhlstenden.com
dierenambulancealkmaar.nl
universelle.fr
bonitabeachassociation.com
richardkershawwines.co.za
docarefoundation.org
arearugcleaningnyc.com
bodet150ans.com
cookinn.nl
beauty-traveller.com
cainlaw-okc.com
bookingwheel.com
rechtenplicht.be
handyman-silkeborg.dk
letsstopsmoking.co.uk
skooppi.fi
spacebel.be
muni.pe
eos-horlogerie.com
saberconcrete.com
lollachiro.com
forextimes.ru
cardsandloyalty.com
ivancacu.com
ketomealprep.academy
spectamarketingdigital.com.br
min-virksomhed.dk
patriotcleaning.net
ravage-webzine.nl
saboboxtel.uk
kombi-dress.com
netadultere.fr
wasnederland.nl
jameswilliamspainting.com
fitnessblenderstory.com
liverpoolabudhabi.ae
itheroes.dk
animation-pro.co.uk
charlesfrancis.photos
wademurray.com
yvesdoin-aquarelles.fr
axisoflove.org:443
zealcon.ae
successcolony.com.ng
jakubrybak.com
ygallerysalonsoho.com:443
sppdstats.com
protoplay.ca
georgemuncey.com
skidpiping.de
breakluckrecords.com
gosouldeep.com
martinipstudios.com
chainofhopeeurope.eu
rs-danmark.dk
uncensoredhentaigif.com
etgdogz.de
ronaldhendriks.nl
legundschiess.de
n-newmedia.de
qwikcoach.com
goodboyscustom.com
pixelhealth.net
jobkiwi.com.ng
alcye.com
smartercashsystem.com
brunoimmobilier.com
techybash.com
radishallgood.com
bakingismyyoga.com
ceocenters.com
napisat-pismo-gubernatoru.ru:443
tradenavigator.ch
brinkdoepke.eu
90nguyentuan.com
beandrivingschool.com.au
hutchstyle.co.uk
mensemetgesigte.co.za
azloans.com
nevadaruralhousingstudies.org
hvitfeldt.dk
sveneulberg.de
irizar.com
landgoedspica.nl
vapiano.fr
charlottelhanna.com
bubbalucious.com
holocine.de
cmeow.com
carmel-york.com
nvisionsigns.com
alene.co
mindsparkescape.com
goodherbalhealth.com
stralsund-ansichten.de
scotlandsroute66.co.uk
bmw-i-pure-impulse.com
stabilisateur.fr
donau-guides.eu
nbva.co.uk
crestgood.com
mamajenedesigns.com
makingmillionaires.net
sololibrerie.it
carsten.sparen-it.de
molade.nl
dentallabor-luenen.de
mangimirossana.it
claudiakilian.de
scietech.academy
bcabattoirs.org
glennverschueren.be
sambaglow.com
slotspinner.com
naukaip.ru
matthieupetel.fr
bescomedical.de
gratiocafeblog.wordpress.com
bendel-partner.de
ocduiblog.com
housesofwa.com
jollity.hu
skyboundnutrition.co.uk
linkbuilding.life
aidanpublishing.co.uk
log-barn.co.uk
globalcompliancenews.com
modamarfil.com
toranjtuition.org
masecologicos.com
kompresory-opravy.com
levencovka.ru
altocontatto.net
fazagostar.co
volta.plus
mustangmarketinggroup.com
computer-place.de
kookooo.com
ahgarage.com
concontactodirecto.com
promus.ca
thehovecounsellingpractice.co.uk
xtensifi.com
mediogiro.com.ar
bychowo.pl
hinotruckwreckers.com.au
delegationhub.com
airvapourbarrier.com
agencewho-aixenprovence.fr
kerstliedjeszingen.nl
die-immo-agentur.de
ledyoucan.com
5pointpt.com
kafkacare.com
leloupblanc.gr
yayasanprimaunggul.org
rename.kz
basindentistry.com
mrcar.nl
vipcarrental.ae
janmorgenstern.com
marcandy.com
ownidentity.com
fire-space.com
designimage.ae
molinum.pt
oththukaruva.com
cp-bap.de
rtc24.com
dr-vita.de
johnkoen.com
nicksrock.com
licensed-public-adjuster.com
catchup-mag.com
collegetennis.info
pays-saint-flour.fr
forskolinslimeffect.net
tramadolhealth.com
ilveshistoria.com
akwaba-safaris.com
worldproskitour.com
lagschools.ng
kosten-vochtbestrijding.be
tweedekansenloket.nl
deziplan.ru
smartspeak.com
glas-kuck.de
klapanvent.ru
berdonllp.com
advanced-removals.co.uk
ronielyn.com
coachpreneuracademy.com
nourella.com
oncarrot.com
bohrlochversicherung.info
morgansconsult.com
sshomme.com
brannbornfastigheter.se
parksideseniorliving.net
curtsdiscountguns.com
limmortelyouth.com
from02pro.com
ncn.nl
finnergo.eu
sachainchiuk.com
altitudeboise.com
thegetawaycollective.com
forumsittard.nl
insane.agency
pureelements.nl
livedeveloper.com
mike.matthies.de
fotoeditores.com
auberives-sur-vareze.fr
heuvelland-oaze.nl
easydental.ae
eurethicsport.eu
awag-blog.de
buonabitare.com
alharsunindo.com
3daywebs.com
nauticmarine.dk
pazarspor.org.tr
prodentalblue.com
belofloripa.be
invela.dk
gardenpartner.pl
encounter-p.net
luvinsburger.fr
adterium.com
sprintcoach.com
larchwoodmarketing.com
cyberpromote.de
oraweb.net
karelinjames.com
sbit.ag
ludoil.it
newonestop.com
xn--ziinoapte-6ld.ro
allinonecampaign.com
smarttourism.academy
scholarquotes.com
tastevirginia.com
baptistdistinctives.org
lashandbrowenvy.com
tzn.nu
tchernia-conseil.fr
katherinealy.com
keuken-prijs.nl
electricianul.com
logosindustries.com
rhino-turf.com
rokthetalk.com
mediabolmong.com
bluetenreich-brilon.de
jefersonalessandro.com
witraz.pl
pisofare.co
motocrossplace.co.uk
bilius.dk
lattalvor.com
jag.me
expohomes.com
citiscapes-art.com
haus-landliebe.de
muller.nl
ideamode.com
racefietsenblog.nl
matteoruzzaofficial.com
angelsmirrorus.com
operativadigital.com
buzzneakers.com
mindfuelers.com
metriplica.academy
michal-s.co.il
breathebettertolivebetter.com
greenrider.nl
alabamaroofingllc.com
kenmccallum.com
avtoboss163.ru:443
xn--80addfr4ahr.dp.ua
outstandingminialbums.com
skyscanner.ro
dogsunlimitedguide.com
hensleymarketing.com
liveyourheartout.co
airserviceunlimited.com
gaearoyals.com
voetbalhoogeveen.nl
anleggsregisteret.no
richardmaybury.co.uk
trainiumacademy.com
goeppinger-teppichreinigung.de
ufovidmag.com
opticahubertruiz.com
piestar.com
traitware.com
bellesiniacademy.org
billscars.net
valiant-voice.com
manzel.tn
baikalflot.ru
grafikstudio-visuell.de
rizplakatjaya.com
arazi.eus
dentalcircle.com
csaballoons.com
oro.ae
brownswoodblog.com
topvijesti.net
nieuwsindeklas.be
janasfokus.com
der-stempelking.de
dinecorp.com
aheadloftladders.co.uk
onlinetvgroup.com
humanviruses.org
inewsstar.com
greeneyetattoo.com
duthler.nl
welovecustomers.fr
palmenhaus-erfurt.de
myfbateam.com
pubcon.com
medicalsupportco.com
banukumbak.com
activeterroristwarningcompany.com
web865.com
dayenne-styling.nl
rhino-storage.co.uk
p-ride.live
texanscan.org
fskhjalmar.se
spirello.nl
victorvictoria.com
amorbellezaysalud.com
latableacrepes-meaux.fr
mercadodelrio.com
jayfurnitureco.com
sellthewrightway.com
dinedrinkdetroit.com
lmmont.sk
premiumweb.com.ua:443
happylublog.wordpress.com
kartuindonesia.com
monstarrsoccer.com
askstaffing.com
phoenixcrane.com
acibademmobil.com.tr
malevannye.ru
sealgrinderpt.com
whoopingcrane.com
nrgvalue.com
elliemaccreative.wordpress.com
deduktia.fi
wribrazil.com
hameghlim.com
peppergreenfarmcatering.com.au
fysiotherapierijnmond.nl
tesisatonarim.com
gurutechnologies.net
dibli.store
luvbec.com
foerderverein-vatterschule.de
funworx.de
mikegoodfellow.co.uk
initconf.com
citydogslife.com
stagefxinc.com
flossmoordental.com
leatherjees.com
fann.ru
motocrosshideout.com
a-zpaperwork.eu
utilisacteur.fr
selected-minds.de
skoczynski.eu
alexwenzel.de
werkzeugtrolley.net
diverfiestas.com.es
asiaartgallery.jp
therapybusinessacademy.com
sber-biznes.com
renderbox.ch
jimprattmediations.com
mahikuchen.com
oexebusiness.com
lunoluno.com
plbinsurance.com
bayshoreelite.com
bourchier.org
speiserei-hannover.de
richardiv.com
alnectus.com
dcc-eu.com
business-basic.de
lidkopingsnytt.nu
projektparkiet.pl
wirmuessenreden.com
krishnabrawijaya.com
elex.is
rossomattonecase.it
osn.ro
raeoflightmusic.com
sarahspics.co.uk
livelai.com
specialtyhomeservicesllc.com
aktivfriskcenter.se
hostingbangladesh.net
ykobbqchicken.ca
leopoldineroux.com
qrs-international.com
jobstomoveamerica.org
wrinstitute.org
happycatering.de
ilovefullcircle.com
kamin-somnium.de
louiedager.com
levelseven.be
production-stills.co.uk
parisschool.ru
the3-week-diet.net
cincinnatiphotocompany.org
jonnyhooley.com
maxcube24.com.ua
ninjaki.com
dnqa.co.uk
hoteltantra.com
rentingwell.com
casinodepositors.com
johnsonweekly.com
9nar.com
trivselsguide.dk
g2mediainc.com
precisetemp.com
baumfinancialservices.com
iactechnologies.net
justaroundthecornerpetsit.com
yournextshoes.com
animalfood-online.de
fascaonline.com
lumturo.academy
directique.com
achetrabalhos.com
veggienessa.com
envomask.com
affligemsehondenschool.be
distrifresh.com
burg-zelem.de
karmeliterviertel.com
billyoart.com
palmecophilippines.com
istantidigitali.com
transifer.fr
the-cupboard.co.uk
tetameble.pl
xrresources.com
webforsites.com
baita.ac
jmmartinezilustrador.com
imagine-entertainment.com
kiraribeaute-nani.com
moira-cristescu.com
dmlcpa.com
t3brothers.com
carolynfriedlander.com
alaskaremote.com
campinglaforetdetesse.com
singletonfinancial.com
photonag.com
amco.net.au
kristianboennelykke.dk
laaisterplakky.nl
unboxtherapy.site
nginx.com
queertube.net
hypogenforensic.com
haard-totaal.nl
christopherhannan.com
signededenroth.dk
dentourage.com
pinthelook.com
enews-qca.com
trevi-vl.ru
voice2biz.com
mac-computer-support-hamburg.de
atma.nl
atrgroup.it
schroederschoembs.com
cymru.futbol
christianscholz.de
powershell.su
catering.com
look.academy
tatyanakopieva.ru
pankiss.ru
midwestschool.org
avis.mantova.it
terraflair.de
tbalp.co.uk
palema.gr
springfieldplumbermo.com
b3b.ch
spartamovers.com
jax-interim-and-projectmanagement.com
mjk.digital
advesa.com
jobscore.com
orchardbrickwork.com
ayudaespiritualtamara.com
edvestors.org
111firstdelray.com
line-x.co.uk
internalresults.com
bagaholics.in
chris-anne.com
tothebackofthemoon.com
latteswithleslie.com
mediahub.co.nz
kryptos72.com
nxtstg.org
bd2fly.com
mariannelemenestrel.com
qandmmusiccenter.com
physio-lang.de
rivermusic.nl
imaginekithomes.co.nz
chatberlin.de
unislaw-narty.pl
circlecitydj.com
babysitting-hk.helpergo.co
-
net
true
-
pid
19
-
prc
winword
ocssd
excel
sqlservr
sqlbrowser
thunderbird
msaccess
sqlwriter
powerpnt
steam
infopath
mydesktopservice
dbeng50
sqbcoreservice
mspub
thebat
mydesktopqos
msftesql
mysqld
wordpad
mysqld_nt
oracle
outlook
xfssvccon
agntsvc
dbsnmp
isqlplussvc
firefoxconfig
ocautoupds
tbirdconfig
encsvc
mysqld_opt
onenote
ocomm
thebat64
visio
sqlagent
synctime
-
ransom_oneliner
All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions
-
ransom_template
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decryptor.top/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} Extension name: {EXT} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
-
sub
96
-
svc
vss
svc$
sql
mepocs
memtas
sophos
backup
veeam
Signatures
-
Detect Neshta Payload 35 IoCs
Processes:
resource yara_rule C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe family_neshta C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE family_neshta C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE family_neshta \PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE family_neshta \PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE family_neshta C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE family_neshta C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE family_neshta C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe family_neshta C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE family_neshta C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE family_neshta C:\PROGRA~2\MICROS~1\Office14\misc.exe family_neshta C:\PROGRA~2\MICROS~1\Office14\OIS.EXE family_neshta C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE family_neshta C:\PROGRA~2\MOZILL~1\UNINST~1.EXE family_neshta C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE family_neshta C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE family_neshta C:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXE family_neshta \PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi/Revil sample 5 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe family_sodinokobi \Users\Admin\AppData\Local\Temp\3582-490\dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe family_sodinokobi C:\Users\Admin\AppData\Local\Temp\3582-490\dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe family_sodinokobi \Users\Admin\AppData\Local\Temp\3582-490\dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe family_sodinokobi C:\Users\Admin\AppData\Local\Temp\3582-490\dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe family_sodinokobi -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exesvchost.compid process 700 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe 1984 svchost.com -
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exedescription ioc process File renamed C:\Users\Admin\Pictures\CheckpointResume.crw => \??\c:\users\admin\pictures\CheckpointResume.crw.80n19xw1 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File renamed C:\Users\Admin\Pictures\CompareImport.raw => \??\c:\users\admin\pictures\CompareImport.raw.80n19xw1 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File renamed C:\Users\Admin\Pictures\ConvertFromPing.crw => \??\c:\users\admin\pictures\ConvertFromPing.crw.80n19xw1 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File renamed C:\Users\Admin\Pictures\ConvertFromSet.raw => \??\c:\users\admin\pictures\ConvertFromSet.raw.80n19xw1 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File renamed C:\Users\Admin\Pictures\JoinAdd.raw => \??\c:\users\admin\pictures\JoinAdd.raw.80n19xw1 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File renamed C:\Users\Admin\Pictures\RevokeFind.crw => \??\c:\users\admin\pictures\RevokeFind.crw.80n19xw1 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File renamed C:\Users\Admin\Pictures\UndoNew.tif => \??\c:\users\admin\pictures\UndoNew.tif.80n19xw1 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File renamed C:\Users\Admin\Pictures\CheckpointOpen.png => \??\c:\users\admin\pictures\CheckpointOpen.png.80n19xw1 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File renamed C:\Users\Admin\Pictures\CopyUndo.crw => \??\c:\users\admin\pictures\CopyUndo.crw.80n19xw1 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File renamed C:\Users\Admin\Pictures\DisableSplit.crw => \??\c:\users\admin\pictures\DisableSplit.crw.80n19xw1 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File renamed C:\Users\Admin\Pictures\ReadWatch.raw => \??\c:\users\admin\pictures\ReadWatch.raw.80n19xw1 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File renamed C:\Users\Admin\Pictures\SearchMove.png => \??\c:\users\admin\pictures\SearchMove.png.80n19xw1 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe -
Loads dropped DLL 8 IoCs
Processes:
dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exedba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exesvchost.compid process 268 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe 268 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe 700 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe 268 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe 1984 svchost.com 1984 svchost.com 1984 svchost.com 1984 svchost.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 28 IoCs
Processes:
dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exedescription ioc process File opened for modification \??\c:\users\public\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\admin\favorites\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\admin\pictures\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\public\videos\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\public\music\sample music\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\admin\desktop\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\admin\music\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\public\documents\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\public\pictures\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\admin\contacts\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\admin\videos\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\public\desktop\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\public\libraries\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\program files (x86)\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\admin\documents\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\admin\favorites\links for united states\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\public\recorded tv\sample media\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\admin\favorites\links\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\public\pictures\sample pictures\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\program files\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\admin\links\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\admin\saved games\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\public\recorded tv\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\admin\downloads\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\public\downloads\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\public\videos\sample videos\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\admin\searches\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\users\public\music\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exedescription ioc process File opened (read-only) \??\I: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\J: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\Q: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\T: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\V: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\A: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\F: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\R: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\U: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\W: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\X: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\Z: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\K: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\O: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\S: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\D: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\G: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\N: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\H: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\L: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\M: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\P: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\Y: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\B: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened (read-only) \??\E: dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe -
Drops file in System32 directory 1 IoCs
Processes:
dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exedescription ioc process File opened for modification C:\Windows\System32\CatRoot2\dberr.txt dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\p8z3g.bmp" dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe -
Drops file in Program Files directory 64 IoCs
Processes:
dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exedba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exesvchost.comdescription ioc process File opened for modification \??\c:\program files\BlockRevoke.wma dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\program files\ConnectSend.asp dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe svchost.com File opened for modification \??\c:\program files\ConvertInstall.mpeg3 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\program files\TestWrite.7z dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE svchost.com File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE svchost.com File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe svchost.com File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE svchost.com File opened for modification \??\c:\program files\desktop.ini dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE svchost.com File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe svchost.com File opened for modification \??\c:\program files\EditInitialize.mov dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\80n19xw1-readme.txt dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe svchost.com File opened for modification \??\c:\program files\DenyCompress.M2T dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\80n19xw1-readme.txt dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE svchost.com File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\program files\AssertCheckpoint.ogg dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\program files\BlockGrant.dwfx dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\program files\ReceiveProtect.mp2 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification \??\c:\program files\RevokeSkip.snd dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE svchost.com File opened for modification \??\c:\program files\ConfirmSearch.rtf dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe svchost.com File created \??\c:\program files\80n19xw1-readme.txt dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe svchost.com -
Drops file in Windows directory 3 IoCs
Processes:
svchost.comdba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exedescription ioc process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1476 vssadmin.exe -
Modifies registry class 1 IoCs
Processes:
dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exepid process 700 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1016 vssvc.exe Token: SeRestorePrivilege 1016 vssvc.exe Token: SeAuditPrivilege 1016 vssvc.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exedba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exesvchost.comcmd.exedescription pid process target process PID 268 wrote to memory of 700 268 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe PID 268 wrote to memory of 700 268 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe PID 268 wrote to memory of 700 268 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe PID 268 wrote to memory of 700 268 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe PID 700 wrote to memory of 1984 700 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe svchost.com PID 700 wrote to memory of 1984 700 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe svchost.com PID 700 wrote to memory of 1984 700 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe svchost.com PID 700 wrote to memory of 1984 700 dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe svchost.com PID 1984 wrote to memory of 2004 1984 svchost.com cmd.exe PID 1984 wrote to memory of 2004 1984 svchost.com cmd.exe PID 1984 wrote to memory of 2004 1984 svchost.com cmd.exe PID 1984 wrote to memory of 2004 1984 svchost.com cmd.exe PID 2004 wrote to memory of 1476 2004 cmd.exe vssadmin.exe PID 2004 wrote to memory of 1476 2004 cmd.exe vssadmin.exe PID 2004 wrote to memory of 1476 2004 cmd.exe vssadmin.exe PID 2004 wrote to memory of 1476 2004 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe"C:\Users\Admin\AppData\Local\Temp\dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Loads dropped DLL
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\System32\cmd.exe /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet5⤵
- Interacts with shadow copies
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXEMD5
02ee6a3424782531461fb2f10713d3c1
SHA1b581a2c365d93ebb629e8363fd9f69afc673123f
SHA256ead58c483cb20bcd57464f8a4929079539d634f469b213054bf737d227c026dc
SHA5126c9272cb1b6bde3ee887e1463ab30ea76568cb1a285d11393337b78c4ad1c3b7e6ce47646a92ab6d70bff4b02ab9d699b84af9437b720e52dcd35579fe2693ec
-
C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exeMD5
cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
C:\MSOCache\ALLUSE~1\{9A861~1\ose.exeMD5
58b58875a50a0d8b5e7be7d6ac685164
SHA11e0b89c1b2585c76e758e9141b846ed4477b0662
SHA2562a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae
SHA512d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b
-
C:\MSOCache\ALLUSE~1\{9A861~1\setup.exeMD5
566ed4f62fdc96f175afedd811fa0370
SHA1d4b47adc40e0d5a9391d3f6f2942d1889dd2a451
SHA256e17cd94c08fc0e001a49f43a0801cea4625fb9aee211b6dfebebec446c21f460
SHA512cdf8f508d396a1a0d2e0fc25f2ae46398b25039a0dafa0919737cc44e3e926ebae4c3aa26f1a3441511430f1a36241f8e61c515a5d9bd98ad4740d4d0f7b8db7
-
C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXEMD5
8c4f4eb73490ca2445d8577cf4bb3c81
SHA10f7d1914b7aeabdb1f1e4caedd344878f48be075
SHA25685f7249bfac06b5ee9b20c7f520e3fdc905be7d64cfbefb7dcd82cd8d44686d5
SHA51265453075c71016b06430246c1ee2876b7762a03112caf13cff4699b7b40487616c88a1160d31e86697083e2992e0dd88ebf1721679981077799187efaa0a1769
-
C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exeMD5
e1833678885f02b5e3cf1b3953456557
SHA1c197e763500002bc76a8d503933f1f6082a8507a
SHA256bd9a16d8d7590a2ec827913db5173f8beb1d1ef44dab1920ef52a307f922bc14
SHA512fe107e1c8631ec6ac94f772e6a7be1fdc2a533fe3cfcf36b1ff018c8d01bd7f1f818f0a2448f736838c953cd516ea7327c416dea20706ed2420327af8ef01abe
-
C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXEMD5
c275134502929608464f4400dd4971ab
SHA1107b91a5249425c83700d64aff4b57652039699d
SHA256ca5263f340cc735ba279532bbd9fe505fcf05d81b52614e05aff31c14d18f831
SHA512913cadcb575519f924333c80588781caecd6cd5f176dc22ac7391f154ffc3b3f7302d010433c22c96fde3591cac79df3252798e52abf5706517493ef87a7ef7d
-
C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXEMD5
d4fdbb8de6a219f981ffda11aa2b2cc4
SHA1cca2cffd4cf39277cc56ebd050f313de15aabbf6
SHA256ba3dc87fca4641e5f5486c4d50c09d087e65264e6c5c885fa6866f6ccb23167b
SHA5127167e13dbcc8c96114fef5fc7ae19afa31173617db153dd283aa6d8256f6b8c09c8f906f5d418efe9f7f242cdfaef24b93c11c451701c4d56eb48d18de4e88bf
-
C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXEMD5
a24fbb149eddf7a0fe981bd06a4c5051
SHA1fce5bb381a0c449efad3d01bbd02c78743c45093
SHA2565d13230eae7cd9b4869145c3280f7208788a8e68c9930a5c9aa3e822684a963d
SHA5121c73b762c340a8d7ea580985ba034a404c859d814690390a6e0b6786575c219db9ca20880ea20313bb244560e36cf24e4dda90229b3084d770495f4ceedfd5de
-
C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXEMD5
28f7305b74e1d71409fec722d940d17a
SHA14c64e1ceb723f90da09e1a11e677d01fc8118677
SHA256706db4d832abdf4907a1386b917e553315660a59bfb4c180e38215b4a606d896
SHA512117de88d0bc437023ca2f1f54b1f2cf03b00c8cb52e4b728cabcb3140659c67cdb6d2c203d3ca13767312831c6308622dfa65d6c5361ec28aaf4ec0870f9ba6e
-
C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXEMD5
3f67da7e800cd5b4af2283a9d74d2808
SHA1f9288d052b20a9f4527e5a0f87f4249f5e4440f7
SHA25631c10320edb2de22f37faee36611558db83b78a9c3c71ea0ed13c8dce25bf711
SHA5126a40f4629ddae102d8737e921328e95717274cea16eb5f23bff6a6627c6047d7f27e7f6eb5cb52f53152e326e53b6ee44d9a9ee8eca7534a2f62fa457ac3d4e3
-
C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXEMD5
12a5d7cade13ae01baddf73609f8fbe9
SHA134e425f4a21db8d7902a78107d29aec1bde41e06
SHA25694e8ea2ed536484492d746f6f5808192cb81ae3c35f55d60826a2db64a254dd5
SHA512a240f5c59226749792cfb9fbd76b086d2544a493b834a72c0bfd8b076ed753ec8876ff056fc35f63f5497183d985f8f8c5c7b6abbcad70981f1ec83af1b3bd76
-
C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exeMD5
60f6a975a53a542fd1f6e617f3906d86
SHA12be1ae6fffb3045fd67ed028fe6b22e235a3d089
SHA256be23688697af7b859d62519807414565308e79a6ecac221350cd502d6bf54733
SHA512360872d256ef91ea3debfb9b3efa22ee80859af9df29e0687c8e1b3c386d88ff1dc5635b86e714fbf1a7d4d6bc3d791efa31a9d9d13e0f79547b631bddb5108d
-
C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exeMD5
034978c5262186b14fd7a2892e30b1cf
SHA1237397dd3b97c762522542c57c85c3ff96646ba8
SHA256159776d43dd2a8d843b82ece0faf469f9088a625d474ce4eea9db59d94a844e6
SHA512d216e757616121d9902b0db2669b6e2aa9eb2697427c9ea2804ebda9690abbf9219c6e603d63ff19dc6115a072985ca862499b5f8319ca057a16e81aec9ea949
-
C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exeMD5
da31170e6de3cf8bd6cf7346d9ef5235
SHA1e2c9602f5c7778f9614672884638efd5dd2aee92
SHA2567737ab500cbbd5d507881d481eef9bd91cf6650bf8d2b41b47b1a8c5f2789858
SHA5122759d938d6ad963e0bf63481a700f7c503d06011a60bcfc1071b511e38afa87d903deb36f9cbfa0b3fd08f1ecb88d2c0bddf0d3b5f2dea2a0cca1a80471669f3
-
C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXEMD5
58b58875a50a0d8b5e7be7d6ac685164
SHA11e0b89c1b2585c76e758e9141b846ed4477b0662
SHA2562a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae
SHA512d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b
-
C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exeMD5
467aee41a63b9936ce9c5cbb3fa502cd
SHA119403cac6a199f6cd77fc5ac4a6737a9a9782dc8
SHA25699e5bea5f632ef4af76e4e5108486d5e99386c3d451b983bcd3ad2a49cc04039
SHA51200c9ccdbbd6fd1be0c2dafd485d811be9bf2076d4efeabc256179befd92679b964e80edcb90ef21f3e874578fdb0003878227f560ca76498865770280f87113e
-
C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXEMD5
46e43f94482a27df61e1df44d764826b
SHA18b4eab017e85f8103c60932c5efe8dff12dc5429
SHA256dc6658dec5bf89f65f2d4b9bdb27634bac0bf5354c792bc8970a2b39f535facd
SHA512ce5bdd3f9a2394ffda83c93fc5604d972f90bd72e6aded357bdf27a2b21a0469f6ac71ce40d9fb4ed8c845468c4171a3c5b4501edbae79447c4f4e08342d4560
-
C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXEMD5
ea78ed9e7eb4cc64544163627476fe4b
SHA167aed91a59742a36c0ff635b15c692cde3eb3a9d
SHA256d5adfd6c8160892716ad5f2907cc66888aee97e1d296404503e1d42dd30ba562
SHA512eeee54e5ffbd243fe7ef6c93744c754bc238e5b05e85c7ca3b25edc02a8692cd10225edff40444fe2536608d0ed25578573e309503cb8f90f43d089d86f8710f
-
C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXEMD5
685db5d235444f435b5b47a5551e0204
SHA199689188f71829cc9c4542761a62ee4946c031ff
SHA256fde30bfdd34c7187d02eabe49f2386b4661321534b50032a838b179a21737411
SHA512a06d711574fbe32f07d20e1d82b7664addd664bf4a7ee07a8f98889172afe3653f324b5915968950b18e76bbfc5217a29704057fd0676611629aa9eb888af54a
-
C:\PROGRA~2\MICROS~1\Office14\BCSSync.exeMD5
b1e0da67a985533914394e6b8ac58205
SHA15a65e6076f592f9ea03af582d19d2407351ba6b6
SHA25667629b025fed676bd607094fa7f21550e18c861495ba664ee0d2b215a4717d7f
SHA512188ebb9a58565ca7ed81a46967a66d583f7dea43a2fc1fe8076a79ef4a83119ccaa22f948a944abae8f64b3a4b219f5184260eff7201eb660c321f6c0d1eba22
-
C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXEMD5
4f8fc8dc93d8171d0980edc8ad833b12
SHA1dc2493a4d3a7cb460baed69edec4a89365dc401f
SHA2561505f3721dd3d7062dadde1633d17e4ee80caf29fd5b6aa6e6a0c481324ffd4e
SHA512bdc3f83d7428418516daf23a9c2d00571cbaa3755391dfd8c500b6df7f621a67ad8e27775bcdaa20b159cd77d08bcdaf81a0cb7fffdd812978888d43512113a6
-
C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXEMD5
92ee5c55aca684cd07ed37b62348cd4e
SHA16534d1bc8552659f19bcc0faaa273af54a7ae54b
SHA256bee98e2150e02ad6259184a35e02e75df96291960032b3085535fb0f1f282531
SHA512fc9f4569a5f3de81d6a490f0fff4765698cdc891933979a3ce661a6291b606630a0c2b15647fc661109fcea466c7a78552b9cfbca6c5b2079ea1632a9f1b6e22
-
C:\PROGRA~2\MICROS~1\Office14\OIS.EXEMD5
5955547374aba2cf8b62eda85e5266c2
SHA1f388212b3f4bde2091176add95a17fb123622446
SHA256ff6cf8f06225e409688e69d710c52cb818d072d0472ce56528e45c0bbbaadd0d
SHA512819632f30057828262ed1850bf6903c9b88b1074fafd9f23c6797289d27bb62c0498a0190ad8a1a86e8c21dc877fc5de8840b459fafb88d4c0d75af408c02d66
-
C:\PROGRA~2\MICROS~1\Office14\misc.exeMD5
02e02577a83a1856dc838f9e2f24e8d2
SHA12ab44e2072a3598fc7092b2ccb9aff3a2c5d4ced
SHA2563b6ca9d9fcbb0c1677fe4caeef03e4db326f70166f030b5f9fa9f2856031d4fc
SHA512a95d454a4f9e5271bc52e6c245c7840a92b8331b84260b2556432ac66dd07bec1b2c3dcf41282d6d8ae581a152f3147e75dc673ce0c7ecbb653dcc61bc1d1bd8
-
C:\PROGRA~2\MOZILL~1\MAINTE~1.EXEMD5
f2056a3543ba9b6b6dde4346614b7f82
SHA1139129616c3a9025a5cb16f9ad69018246bd9e2d
SHA2562bab7d64d5327ca21ffd13df88b30431d0b8c0dd6cad8f4bb4db33eeb2b37d1e
SHA512e11d1c65e046a0a6817cec4d17df1b7f5849fdb5b95527fdef78f0c433294fd2186037116a581ec3a66b07f1ab75cd8e60e408005cd64bc5eacc61a582da0942
-
C:\PROGRA~2\MOZILL~1\UNINST~1.EXEMD5
e7d2d4bedb99f13e7be8338171e56dbf
SHA18dafd75ae2c13d99e5ef8c0e9362a445536c31b5
SHA256c8ef54853df3a3b64aa4b1ecfb91615d616c7ff998589e5a3434118611ad2a24
SHA5122017dea799cc03b02a17e3616fb6fbe8c86ab2450b1aaf147fce1e67cc472ded12befd686d395386ffdaa992145996eb421d61d3a922cea45e94ac40eef76adc
-
C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXEMD5
87f15006aea3b4433e226882a56f188d
SHA1e3ad6beb8229af62b0824151dbf546c0506d4f65
SHA2568d0045c74270281c705009d49441167c8a51ac70b720f84ff941b39fad220919
SHA512b01a8af6dc836044d2adc6828654fa7a187c3f7ffe2a4db4c73021be6d121f9c1c47b1643513c3f25c0e1b5123b8ce2dc78b2ca8ce638a09c2171f158762c7c1
-
C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXEMD5
07e194ce831b1846111eb6c8b176c86e
SHA1b9c83ec3b0949cb661878fb1a8b43a073e15baf1
SHA256d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac
SHA51255f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5
-
C:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXEMD5
fa982a173f9d3628c2b3ff62bd8a2f87
SHA12cfb18d542ae6b6cf5a1223f1a77defd9b91fa56
SHA256bc5d80d05a1bd474cb5160782765bf973ba34ea25dedf7e96dfaf932b9935032
SHA51295ca9066a2e5272494b8e234220b6028c14892679023ca70801475c38d341032363589375ec6ffc4cde3416dd88d0e3082d315f7beddccdf014122ddd0a90644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exeMD5
0c2c00d661dbee9e48902ce665cba5e0
SHA198651a57c28cf0a720b95f45c14f7af86212ea20
SHA256e405d4d827987638f2d8a60ebaca732dafaf9d6978187fcea12345fe24afaac7
SHA512d990c4f8fe0a7f92cb8a966062bf82f9aa7d7c4f70b50c66770d86bade3ded8377747ca4133d9d02bcb06230d9e7581869fbb42175e6b7a208c935fdfb9d77c4
-
C:\Users\Admin\AppData\Local\Temp\3582-490\dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exeMD5
0c2c00d661dbee9e48902ce665cba5e0
SHA198651a57c28cf0a720b95f45c14f7af86212ea20
SHA256e405d4d827987638f2d8a60ebaca732dafaf9d6978187fcea12345fe24afaac7
SHA512d990c4f8fe0a7f92cb8a966062bf82f9aa7d7c4f70b50c66770d86bade3ded8377747ca4133d9d02bcb06230d9e7581869fbb42175e6b7a208c935fdfb9d77c4
-
C:\Windows\svchost.comMD5
36fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
C:\Windows\svchost.comMD5
36fd5e09c417c767a952b4609d73a54b
SHA1299399c5a2403080a5bf67fb46faec210025b36d
SHA256980bac6c9afe8efc9c6fe459a5f77213b0d8524eb00de82437288eb96138b9a2
SHA5121813a6a5b47a9b2cd3958cf4556714ae240f2aa19d0a241b596830f0f2b89a33ec864d00ce6a791d323a58dfbff42a0fded65eefbf980c92685e25c0ec415d92
-
\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXEMD5
9e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXEMD5
9e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXEMD5
d4fdbb8de6a219f981ffda11aa2b2cc4
SHA1cca2cffd4cf39277cc56ebd050f313de15aabbf6
SHA256ba3dc87fca4641e5f5486c4d50c09d087e65264e6c5c885fa6866f6ccb23167b
SHA5127167e13dbcc8c96114fef5fc7ae19afa31173617db153dd283aa6d8256f6b8c09c8f906f5d418efe9f7f242cdfaef24b93c11c451701c4d56eb48d18de4e88bf
-
\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exeMD5
60f6a975a53a542fd1f6e617f3906d86
SHA12be1ae6fffb3045fd67ed028fe6b22e235a3d089
SHA256be23688697af7b859d62519807414565308e79a6ecac221350cd502d6bf54733
SHA512360872d256ef91ea3debfb9b3efa22ee80859af9df29e0687c8e1b3c386d88ff1dc5635b86e714fbf1a7d4d6bc3d791efa31a9d9d13e0f79547b631bddb5108d
-
\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXEMD5
07e194ce831b1846111eb6c8b176c86e
SHA1b9c83ec3b0949cb661878fb1a8b43a073e15baf1
SHA256d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac
SHA51255f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5
-
\Users\Admin\AppData\Local\Temp\3582-490\dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exeMD5
0c2c00d661dbee9e48902ce665cba5e0
SHA198651a57c28cf0a720b95f45c14f7af86212ea20
SHA256e405d4d827987638f2d8a60ebaca732dafaf9d6978187fcea12345fe24afaac7
SHA512d990c4f8fe0a7f92cb8a966062bf82f9aa7d7c4f70b50c66770d86bade3ded8377747ca4133d9d02bcb06230d9e7581869fbb42175e6b7a208c935fdfb9d77c4
-
\Users\Admin\AppData\Local\Temp\3582-490\dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exeMD5
0c2c00d661dbee9e48902ce665cba5e0
SHA198651a57c28cf0a720b95f45c14f7af86212ea20
SHA256e405d4d827987638f2d8a60ebaca732dafaf9d6978187fcea12345fe24afaac7
SHA512d990c4f8fe0a7f92cb8a966062bf82f9aa7d7c4f70b50c66770d86bade3ded8377747ca4133d9d02bcb06230d9e7581869fbb42175e6b7a208c935fdfb9d77c4
-
\Users\Admin\AppData\Local\Temp\3582-490\dba1c0701eb0f80623dcacf56ab0803353567a5144fd4a1475c34b960244e24b.exeMD5
0c2c00d661dbee9e48902ce665cba5e0
SHA198651a57c28cf0a720b95f45c14f7af86212ea20
SHA256e405d4d827987638f2d8a60ebaca732dafaf9d6978187fcea12345fe24afaac7
SHA512d990c4f8fe0a7f92cb8a966062bf82f9aa7d7c4f70b50c66770d86bade3ded8377747ca4133d9d02bcb06230d9e7581869fbb42175e6b7a208c935fdfb9d77c4
-
memory/268-54-0x00000000751B1000-0x00000000751B3000-memory.dmpFilesize
8KB