Analysis
-
max time kernel
153s -
max time network
135s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
12-02-2022 00:28
Static task
static1
Behavioral task
behavioral1
Sample
893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe
Resource
win10v2004-en-20220113
General
-
Target
893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe
-
Size
1.3MB
-
MD5
1dff6d9b042d47e9b040f8dffee2112a
-
SHA1
24c725042eb2a384814e8a4f2c1178be14f4c71f
-
SHA256
893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf
-
SHA512
243d0e03738bfa7b9013258fda08f7eee3bd2a3aa187b01c2808956467182f0bd93ab2415c73ba9b006e2baa0f319dbb83c14c616ceb2536df8800cc5e184162
Malware Config
Extracted
C:\Read-Me.txt
Signatures
-
Detect Neshta Payload 31 IoCs
Processes:
resource yara_rule C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe family_neshta C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe family_neshta C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe family_neshta C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe family_neshta C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe family_neshta C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe family_neshta C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe family_neshta C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exe family_neshta C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe family_neshta C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe family_neshta C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE family_neshta C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE family_neshta C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe family_neshta C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exe family_neshta C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE family_neshta C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE family_neshta C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE family_neshta C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXE family_neshta C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exe family_neshta C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\ODeploy.exe family_neshta C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe family_neshta C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe family_neshta C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE family_neshta C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe family_neshta C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateOnDemand.exe family_neshta C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateCore.exe family_neshta C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateComRegisterShell64.exe family_neshta C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateBroker.exe family_neshta C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdate.exe family_neshta C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler64.exe family_neshta C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler.exe family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 1 IoCs
Processes:
893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exepid process 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe -
Modifies Windows Firewall 1 TTPs
-
Loads dropped DLL 2 IoCs
Processes:
893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exepid process 1896 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe 1896 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe -
Drops desktop.ini file(s) 15 IoCs
Processes:
893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-3846991908-3261386348-1409841751-1000\desktop.ini 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File created C:\$Recycle.Bin\S-1-5-21-3846991908-3261386348-1409841751-1000\desktop.ini 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File created C:\Program Files\desktop.ini 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\desktop.ini 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\desktop.ini 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe -
Drops file in Program Files directory 64 IoCs
Processes:
893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exedescription ioc process File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libmono_plugin.dll 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\js\settings.js 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\invalid32x32.gif.[[email protected]][MJ-FS3864921057].sckmedady 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\full.png 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Maceio 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Almaty 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\Reunion 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\jfluid-server.jar.[[email protected]][MJ-FS3864921057].sckmedady 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2ssv.dll.[[email protected]][MJ-FS3864921057].sckmedady 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Bissau.[[email protected]][MJ-FS3864921057].sckmedady 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00241_.WMF 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0197979.WMF 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Chisinau 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\logo.png 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe.[[email protected]][MJ-FS3864921057].sckmedady 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105328.WMF 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\equalizer_window.html 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jre7\bin\javafx-iio.dll.[[email protected]][MJ-FS3864921057].sckmedady 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\ACER3X.DLL 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0090027.WMF 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA7\1033\VBOB6.CHM 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\1047x576_91n92.png 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.concurrent_1.1.0.v20130327-1442.jar 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-swing-tabcontrol.xml 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-core-execution.xml 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libcvdsub_plugin.dll 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\tipresx.dll.mui 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\Wks9Pxy.cnv 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RADIAL\THMBNAIL.PNG 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105244.WMF 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Common Files\System\ado\msadrh15.dll 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_filter\libinflate_plugin.dll 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jre7\lib\jfr.jar.[[email protected]][MJ-FS3864921057].sckmedady 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\sunmscapi.jar.[[email protected]][MJ-FS3864921057].sckmedady 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\de-DE\micaut.dll.mui 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\BRANDING.DLL 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CANYON\THMBNAIL.PNG 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Tell_City.[[email protected]][MJ-FS3864921057].sckmedady 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.controlpanel.ui_5.5.0.165303.jar 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Juneau 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Windows Media Player\en-US\WMPSideShowGadget.exe.mui 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\EXP_XPS.DLL 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSORES.DLL 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\scenesscroll.png 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\ja-JP\SpiderSolitaire.exe.mui 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\SmallLogoDev.png.[[email protected]][MJ-FS3864921057].sckmedady 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\tzmappings.[[email protected]][MJ-FS3864921057].sckmedady 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099168.JPG 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\org-openide-filesystems_ja.jar 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\pkeyconfig-office.xrm-ms 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File created C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOMessageProvider.dll.[[email protected]][MJ-FS3864921057].sckmedady 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_20_666666_40x40.png 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\DVD Maker\WMM2CLIP.dll 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Santo_Domingo.[[email protected]][MJ-FS3864921057].sckmedady 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105490.WMF 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH01015_.WMF 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\META-INF\MANIFEST.MF 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-options-api.xml 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libvoc_plugin.dll 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_cloudy.png 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\oledb32r.dll 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\libpacketizer_dirac_plugin.dll 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_es.jar.[[email protected]][MJ-FS3864921057].sckmedady 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099193.GIF 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe -
Drops file in Windows directory 1 IoCs
Processes:
893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exedescription ioc process File opened for modification C:\Windows\svchost.com 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe -
NTFS ADS 1 IoCs
Processes:
893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exedescription ioc process File opened for modification C:\Documents and Settings\S-1-5-21-3846991908-3261386348-1409841751-1000\desk\8:ʹ\ʹ\ ¢ʹ\ª¬ʹ\´¶\¾À\ÈÊ휔ʹ\ÒÔ퍰ʹ\ÜÞ쿌ʹ\æè차ʹ\ðò좄ʹ\úü쓠ʹ\ĄĆ센ʹ\ĎĐ붘ʹ\ĘĚ맴ʹ\ĢĤ뙐ʹ\ĬĮ늬ʹ\Ķĸ꼈ʹ\ŀłꭤʹ\ŊŌꟀʹ\ŔŖꐜʹ\ŞŠꁸʹ\ŨŪ鳔ʹ\ŲŴ餰ʹ\żž閌ʹ\Ɔƈ釨ʹ\Ɛƒ蹄ʹ\ƚƜ誠ʹ\ƤƦ蛼ʹ\Ʈư荘ʹ\Ƹƺ羴ʹ\ǂDŽ簐ʹ 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exepid process 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.execmd.exenet.execmd.exenet.execmd.exenet.execmd.exenet.exedescription pid process target process PID 1896 wrote to memory of 584 1896 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe PID 1896 wrote to memory of 584 1896 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe PID 1896 wrote to memory of 584 1896 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe PID 1896 wrote to memory of 584 1896 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe PID 584 wrote to memory of 1380 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1380 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1380 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1380 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 1380 wrote to memory of 984 1380 cmd.exe net.exe PID 1380 wrote to memory of 984 1380 cmd.exe net.exe PID 1380 wrote to memory of 984 1380 cmd.exe net.exe PID 1380 wrote to memory of 984 1380 cmd.exe net.exe PID 984 wrote to memory of 1368 984 net.exe net1.exe PID 984 wrote to memory of 1368 984 net.exe net1.exe PID 984 wrote to memory of 1368 984 net.exe net1.exe PID 984 wrote to memory of 1368 984 net.exe net1.exe PID 584 wrote to memory of 304 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 304 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 304 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 304 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1088 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1088 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1088 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1088 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 684 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 684 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 684 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 684 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1072 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1072 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1072 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1072 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 1072 wrote to memory of 1968 1072 cmd.exe net.exe PID 1072 wrote to memory of 1968 1072 cmd.exe net.exe PID 1072 wrote to memory of 1968 1072 cmd.exe net.exe PID 1072 wrote to memory of 1968 1072 cmd.exe net.exe PID 1968 wrote to memory of 1956 1968 net.exe net1.exe PID 1968 wrote to memory of 1956 1968 net.exe net1.exe PID 1968 wrote to memory of 1956 1968 net.exe net1.exe PID 1968 wrote to memory of 1956 1968 net.exe net1.exe PID 584 wrote to memory of 1960 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1960 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1960 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1960 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 1960 wrote to memory of 1280 1960 cmd.exe net.exe PID 1960 wrote to memory of 1280 1960 cmd.exe net.exe PID 1960 wrote to memory of 1280 1960 cmd.exe net.exe PID 1960 wrote to memory of 1280 1960 cmd.exe net.exe PID 1280 wrote to memory of 1504 1280 net.exe net1.exe PID 1280 wrote to memory of 1504 1280 net.exe net1.exe PID 1280 wrote to memory of 1504 1280 net.exe net1.exe PID 1280 wrote to memory of 1504 1280 net.exe net1.exe PID 584 wrote to memory of 1544 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1544 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1544 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 584 wrote to memory of 1544 584 893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe cmd.exe PID 1544 wrote to memory of 1592 1544 cmd.exe net.exe PID 1544 wrote to memory of 1592 1544 cmd.exe net.exe PID 1544 wrote to memory of 1592 1544 cmd.exe net.exe PID 1544 wrote to memory of 1592 1544 cmd.exe net.exe PID 1592 wrote to memory of 2004 1592 net.exe net1.exe PID 1592 wrote to memory of 2004 1592 net.exe net1.exe PID 1592 wrote to memory of 2004 1592 net.exe net1.exe PID 1592 wrote to memory of 2004 1592 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe"C:\Users\Admin\AppData\Local\Temp\893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\3582-490\893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exe"2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSDTC3⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\net.exenet stop MSDTC4⤵
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSDTC5⤵PID:1368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵PID:304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c bcdedit /set {default} recoveryenabled no3⤵PID:1088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wbadmin delete catalog -quiet3⤵PID:684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop SQLSERVERAGENT3⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\net.exenet stop SQLSERVERAGENT4⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSERVERAGENT5⤵PID:1956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSSQLSERVER3⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER4⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER5⤵PID:1504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop vds3⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\net.exenet stop vds4⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop vds5⤵PID:2004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh advfirewall set currentprofile state off3⤵PID:756
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set currentprofile state off4⤵PID:1632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall set opmode mode=disable3⤵PID:1496
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable4⤵PID:1784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop SQLWriter3⤵PID:1760
-
C:\Windows\SysWOW64\net.exenet stop SQLWriter4⤵PID:1920
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLWriter5⤵PID:868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop SQLBrowser3⤵PID:1984
-
C:\Windows\SysWOW64\net.exenet stop SQLBrowser4⤵PID:1536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLBrowser5⤵PID:1060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSSQLSERVER3⤵PID:1924
-
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER4⤵PID:1696
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER5⤵PID:1156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop MSSQL$CONTOSO13⤵PID:1528
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$CONTOSO14⤵PID:624
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$CONTOSO11⤵PID:1604
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exeMD5
58b58875a50a0d8b5e7be7d6ac685164
SHA11e0b89c1b2585c76e758e9141b846ed4477b0662
SHA2562a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae
SHA512d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b
-
C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exeMD5
281beb392b8722a3e6b2cea8e3c3936c
SHA1ea52ee35f1a633a0eba2bb7bf234cab7b3e61751
SHA2562dee7c99459d53e8661d21b4c81ffd6475b984564b6e62a5f5b28e79461358aa
SHA5127c860c7a1f57ccdf5a671001adbb707fec6570727a8c212b1a43ff6bbe6ef048f8831df101db8109e038511290ecea54512eecf9b25a31a21c55af37409b6404
-
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXEMD5
0417b6f1a34718ed6862f48bf9da491b
SHA111a838cee054729a380a4b95230d2d8794d8c8d7
SHA2560624d972332ebb0da00199e73e5625831b4e2541f964fc386d1890edbed70c15
SHA512eb539891c6abcb9d3c1ab8bf6e3e74351a8b3dd84350136e6e1d81d54c3f86e11c6e7a215b431ddcc8380157b2231383d5dac07fd59afbf6c843805fdf5321d7
-
C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exeMD5
2c9b60459d062ff94f05e2c60487d230
SHA18387d943f3c223f654ab86efc601b34d70773901
SHA256840d175ce61dfaa8822eb4b1db9fa3412b38e10466673c0d0c483312ba607fea
SHA512055d10340429d81827fa48e0d6ce7ea72e887869785ff9aa39365764b8b7377cf5d0aa0b4155b9592d84a355dead828b9a01db79ad631803de264547f27717d2
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exeMD5
831270ac3db358cdbef5535b0b3a44e6
SHA1c0423685c09bbe465f6bb7f8672c936e768f05a3
SHA256a8f78ac26c738b13564252f1048ca784bf152ef048b829d3d22650b7f62078f0
SHA512f64a00977d4b6f8c43f53cee7bb450f3c8cbef08525975055fde5d8c515db32d2bfad92e99313b3a10a72a50dd09b4ffe28e9af4c148c6480622ba486776e450
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exeMD5
9900dd69d93694618cb8a284dc36a771
SHA1f37b2b00100f678ee551d978556dac7a5b960762
SHA256b0a84a7248206c5c581aed8e787048842c0b7d71e5b3068c7fea63ddca262851
SHA512af7cf19e744ef8b67903ba61999e7ac167ca2c92eff51733ad08e2f969ecd959937fd8b07c7d532871d1464b2ec35434ccf02a412ce729ab4f3e665b7b1a0f68
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exeMD5
3ec4922dbca2d07815cf28144193ded9
SHA175cda36469743fbc292da2684e76a26473f04a6d
SHA2560587fd366ea7e94b3ae500874b1c5d684b5357fcc7389682d5a13c3301a28801
SHA512956c3a1f2689cb72600edd2e90d652b77592a8a81d319dce026e88f6c02231af06aebd57d68460eb406de00c113522173423cb1b339a41a3918f379c7dc311f7
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exeMD5
eef2f834c8d65585af63916d23b07c36
SHA18cb85449d2cdb21bd6def735e1833c8408b8a9c6
SHA2563cd34a88e3ae7bd3681a7e3c55832af026834055020add33e6bd6f552fc0aabd
SHA5122ee8766e56e5b1e71c86f7d1a1aa1882706d0bca8f84b2b2c54dd4c255e04f037a6eb265302449950e5f5937b0e57f17a6aa45e88a407ace4b3945e65043d9b7
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Eula.exeMD5
e1833678885f02b5e3cf1b3953456557
SHA1c197e763500002bc76a8d503933f1f6082a8507a
SHA256bd9a16d8d7590a2ec827913db5173f8beb1d1ef44dab1920ef52a307f922bc14
SHA512fe107e1c8631ec6ac94f772e6a7be1fdc2a533fe3cfcf36b1ff018c8d01bd7f1f818f0a2448f736838c953cd516ea7327c416dea20706ed2420327af8ef01abe
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exeMD5
4be6bd2569647196e8a4cbc34d3018b6
SHA1284865e9a86d68a98462772e080ec138ba5d1229
SHA2561aab5e650c32e1189a912f0010b4eee70483d8bd48b087b59178c33f1bbaec66
SHA512877d4bfbb2ba2d3fe611b3b1f2773f1ed68fef5db7a23879e70a7ebdd1fde1a58015f311d35e1824d077a8656a7dd33e5024c328d65b8835676a30e19e57eb91
-
C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exeMD5
6a091285d13370abb4536604b5f2a043
SHA18bb4aad8cadbd3894c889de85e7d186369cf6ff1
SHA256909205de592f50532f01b4ac7b573b891f7e6e596b44ff94187b1ba4bcc296bb
SHA5129696e4f60a5b1166535ca8ca3fb495d718086463d1a12fa1facc08219ad5b918208ddd2a102f7955e29153b081e05985c4ae6e4302ab36d548bb62991a47db18
-
C:\Program Files (x86)\Common Files\Adobe\Updater6\AdobeUpdaterInstallMgr.exeMD5
7ce8bcabb035b3de517229dbe7c5e67d
SHA18e43cd79a7539d240e7645f64fd7f6e9e0f90ab9
SHA25681a3a1dc3104973a100bf8d114b6be35da03767a0cbbaf925f970ffcbe5f217c
SHA512be7fcd50b4f71b458ca001b7c019bf1169ec089d7a1ce05355134b11cbe75a5a29811f9efec803877aeb1a1d576ea2628926e0131361db23214275af6e89e80c
-
C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exeMD5
74563fcd33a9b4caa398ae7f3103b601
SHA1d953dd7c98024ca92b4b3e5e5c8b410ee629bedb
SHA2565cb50de87dde6321f5bf038d2977c9d6b027112cfa430b55eee17aef52bd23b8
SHA512f1fa6ffc25bb8d999c8b77963c742bfab47129df7594a8822e1caa6083b321c1f14e5bb0ab14fc649e7be0ffe00f96b4c7ee3e5b987c5055a1df4d14032ec1cc
-
C:\Program Files (x86)\Common Files\microsoft shared\DW\DW20.EXEMD5
6f8ac70416982293421fb069eba91057
SHA1d853ecfd1ab27932cee207c5ec7ffa18b95ef948
SHA2568aeb14d14173b24749121dea285e24e1e7ce453440aaa79fd9bd1bf69e51cc30
SHA5128ae246c25b11aceda91069d1e21f6e833887d704f95225d2bdd0cba9939c20c9fb5f2f80dd2c380312ad015995c58d43f2a9fba41a6c0613784604aeb8e4751d
-
C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXEMD5
cf6c595d3e5e9667667af096762fd9c4
SHA19bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80
-
C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEMD5
d4fdbb8de6a219f981ffda11aa2b2cc4
SHA1cca2cffd4cf39277cc56ebd050f313de15aabbf6
SHA256ba3dc87fca4641e5f5486c4d50c09d087e65264e6c5c885fa6866f6ccb23167b
SHA5127167e13dbcc8c96114fef5fc7ae19afa31173617db153dd283aa6d8256f6b8c09c8f906f5d418efe9f7f242cdfaef24b93c11c451701c4d56eb48d18de4e88bf
-
C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\FLTLDR.EXEMD5
a24fbb149eddf7a0fe981bd06a4c5051
SHA1fce5bb381a0c449efad3d01bbd02c78743c45093
SHA2565d13230eae7cd9b4869145c3280f7208788a8e68c9930a5c9aa3e822684a963d
SHA5121c73b762c340a8d7ea580985ba034a404c859d814690390a6e0b6786575c219db9ca20880ea20313bb244560e36cf24e4dda90229b3084d770495f4ceedfd5de
-
C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXEMD5
28f7305b74e1d71409fec722d940d17a
SHA14c64e1ceb723f90da09e1a11e677d01fc8118677
SHA256706db4d832abdf4907a1386b917e553315660a59bfb4c180e38215b4a606d896
SHA512117de88d0bc437023ca2f1f54b1f2cf03b00c8cb52e4b728cabcb3140659c67cdb6d2c203d3ca13767312831c6308622dfa65d6c5361ec28aaf4ec0870f9ba6e
-
C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOICONS.EXEMD5
3f67da7e800cd5b4af2283a9d74d2808
SHA1f9288d052b20a9f4527e5a0f87f4249f5e4440f7
SHA25631c10320edb2de22f37faee36611558db83b78a9c3c71ea0ed13c8dce25bf711
SHA5126a40f4629ddae102d8737e921328e95717274cea16eb5f23bff6a6627c6047d7f27e7f6eb5cb52f53152e326e53b6ee44d9a9ee8eca7534a2f62fa457ac3d4e3
-
C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXEMD5
12a5d7cade13ae01baddf73609f8fbe9
SHA134e425f4a21db8d7902a78107d29aec1bde41e06
SHA25694e8ea2ed536484492d746f6f5808192cb81ae3c35f55d60826a2db64a254dd5
SHA512a240f5c59226749792cfb9fbd76b086d2544a493b834a72c0bfd8b076ed753ec8876ff056fc35f63f5497183d985f8f8c5c7b6abbcad70981f1ec83af1b3bd76
-
C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Oarpmany.exeMD5
da31170e6de3cf8bd6cf7346d9ef5235
SHA1e2c9602f5c7778f9614672884638efd5dd2aee92
SHA2567737ab500cbbd5d507881d481eef9bd91cf6650bf8d2b41b47b1a8c5f2789858
SHA5122759d938d6ad963e0bf63481a700f7c503d06011a60bcfc1071b511e38afa87d903deb36f9cbfa0b3fd08f1ecb88d2c0bddf0d3b5f2dea2a0cca1a80471669f3
-
C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\ODeploy.exeMD5
60f6a975a53a542fd1f6e617f3906d86
SHA12be1ae6fffb3045fd67ed028fe6b22e235a3d089
SHA256be23688697af7b859d62519807414565308e79a6ecac221350cd502d6bf54733
SHA512360872d256ef91ea3debfb9b3efa22ee80859af9df29e0687c8e1b3c386d88ff1dc5635b86e714fbf1a7d4d6bc3d791efa31a9d9d13e0f79547b631bddb5108d
-
C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exeMD5
034978c5262186b14fd7a2892e30b1cf
SHA1237397dd3b97c762522542c57c85c3ff96646ba8
SHA256159776d43dd2a8d843b82ece0faf469f9088a625d474ce4eea9db59d94a844e6
SHA512d216e757616121d9902b0db2669b6e2aa9eb2697427c9ea2804ebda9690abbf9219c6e603d63ff19dc6115a072985ca862499b5f8319ca057a16e81aec9ea949
-
C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXEMD5
b0736ba55e1ad0606bb1cfc4abffe106
SHA182aed696a85f74c7d9862a59da67c205d9394240
SHA2568369cfe3cefed47f39463f6ae264014c081cd61ff20f4c75401bbed4f1cfa004
SHA512c36cea2df3643425ded65c3bc9aa9cbf59af4ae32c75fee780880173788e00e507c62088bc5a46e90d14daf8deb361196cd2d5e4e0ec5971f58e608321358cab
-
C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exeMD5
467aee41a63b9936ce9c5cbb3fa502cd
SHA119403cac6a199f6cd77fc5ac4a6737a9a9782dc8
SHA25699e5bea5f632ef4af76e4e5108486d5e99386c3d451b983bcd3ad2a49cc04039
SHA51200c9ccdbbd6fd1be0c2dafd485d811be9bf2076d4efeabc256179befd92679b964e80edcb90ef21f3e874578fdb0003878227f560ca76498865770280f87113e
-
C:\Program Files (x86)\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exeMD5
46e43f94482a27df61e1df44d764826b
SHA18b4eab017e85f8103c60932c5efe8dff12dc5429
SHA256dc6658dec5bf89f65f2d4b9bdb27634bac0bf5354c792bc8970a2b39f535facd
SHA512ce5bdd3f9a2394ffda83c93fc5604d972f90bd72e6aded357bdf27a2b21a0469f6ac71ce40d9fb4ed8c845468c4171a3c5b4501edbae79447c4f4e08342d4560
-
C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler.exeMD5
b5d67012040654f8ede31954b7254a42
SHA1dfd5d5243d6b981731a3768df54e75a4443cbc37
SHA256822e8c479a92dab5cd19d0eaa3d69fa394ce463e6064411232041d37dd1af2cc
SHA512ceed9f7207b83d6b2efae9f807a5ff89e93add45019dfa9cae04e867b2f41daa23d538621f866d8f4b7d0dd5b25de26ca53087e832a8f092456e25853a2d9b04
-
C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler64.exeMD5
78f7c2de1da25528c5f75b6162603936
SHA1e31be51d16358fbc94a7d2112e9401a608f78d17
SHA256f53dd517704edbe10f32fb14ad7590fa32afac51dbbc084b4ed085f39aad40ff
SHA512a162b90e105e4356f318f6eabc52bdb47afe7c71c100bce53694ff69903a057f41fb38d9fbc3c670737fe7d888902b6b8d6c2c0ea1f3afdd8a88dc0ae8573e7c
-
C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdate.exeMD5
3eec00a6ed25ac336f367431b14a51ef
SHA1429fe640dcc04c01821a050ea7b92dedaf4e62b3
SHA256b636a654f8932a119521638f2168014980b1a8cbcbd3bdd1237ef27ed5e30612
SHA512b18557a3d453d263247b09bd486db76b323390283a26fec0153f8def6f91939e8bebdbf52133d6ec44acb15ff57141f5d0c0b5313ed620443080274f989a950e
-
C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateBroker.exeMD5
950000c930454e0c30644f13ed60e9c3
SHA15f6b06e8a02e1390e7499722b277135b4950723d
SHA25609786f64db91266470b56046098d9825253ba5d6a5361c2f4e6dbc8ec28c9bb2
SHA51222e3c677c83c755e53a7bf8735734541223f57151d588c3380bc758e5433b706441666d0d95c42bd23a720b093a6942a62346dab24ee3f0a18bee3e5ad1cd9d9
-
C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateComRegisterShell64.exeMD5
ad0efa1df844814c2e8ddc188cb0e3b5
SHA1b1a8a09f2223aab8b8e3e9bc0e58cc83d402f8ab
SHA256c87fd5b223cb6dc716815b442b4964d4670a30b5c79f4fb9f1c3a65ec9072e5a
SHA512532cc173d9ef27098ff10b6b652c64231b4a14f99df3b5de2eb1423370c19590e2a6032023d3ed02e2080f2f087b620ebbbd079e4a47a584ef11f3eaa0eb8520
-
C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateCore.exeMD5
33cb4562e84c8bbbc8184b961e2e49ee
SHA1d6549a52911eaeebcceb5bc39d71272d3b8f5111
SHA2561f455ea6bab09377e5fdfbd5df102f79c5cbbb5fe5ce456f2fbb34f94ec848bb
SHA5120b638a6e86816ba5d83de5fc381c85371f2f4fe0a2fdff40141859a42e255a082903e5692a49ef253265a42ec99924e5a0aa150cb7ed6cd5521f42f6c9fe27a9
-
C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateOnDemand.exeMD5
fafb18b930b2b05ac8c5ddb988e9062f
SHA1825ea5069601fb875f8d050aa01300eac03d3826
SHA256c17785fe7e6b5e08fe5a4ca3679fee85ba6f2e5efcce0fb9807727cf8aa25265
SHA512be034e7377bd27092aad02e13a152fb80ff74c1ba2fb63ccb344cd55315d115ee47e46727cbe55ca808efafa58d7924e3eed965e9a2fd3b9ae2dff7834383e54
-
C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exeMD5
291603c34cb7bde81aed2384a3486212
SHA14bd867c98e2bc48e845d7450cf9ee83da171c1fb
SHA25611bc4eda38c242ad3a2e789a58d247621d7ff05d04e2d27f42eeee3eb9525fab
SHA5120918f4ce1b851d4969dd5eda20ec0ae359d408ebb34ca31b6844496f2eecfb8fc9f1335f6f371566d50040e187c378b5fd1ce8f196aa94a7e9f1cc74c9731bf4
-
C:\Users\Admin\AppData\Local\Temp\3582-490\893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exeMD5
9ffac476908a5193bb7d7af600d3bdfa
SHA1afb232a1f7e65bf7713850ed57a77cfd462f48dc
SHA2566cd94839216439c519fa1ac4587ba29fecb0e7a87992c882b2923ae0eaf03a0d
SHA51283f28df1cbf278edeb040b7178d865aa82317d8a762734723f45a2eb47880f1c66c6077ac4605ebd72f290306483adcd7d525b403e04f5a23c4c97527c06e14d
-
C:\Users\Admin\AppData\Local\Temp\3582-490\893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exeMD5
9ffac476908a5193bb7d7af600d3bdfa
SHA1afb232a1f7e65bf7713850ed57a77cfd462f48dc
SHA2566cd94839216439c519fa1ac4587ba29fecb0e7a87992c882b2923ae0eaf03a0d
SHA51283f28df1cbf278edeb040b7178d865aa82317d8a762734723f45a2eb47880f1c66c6077ac4605ebd72f290306483adcd7d525b403e04f5a23c4c97527c06e14d
-
\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXEMD5
9e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\Users\Admin\AppData\Local\Temp\3582-490\893b9c6d05afc9ff72c4d5239b015c40833944243c0365cd156cd37689a922cf.exeMD5
9ffac476908a5193bb7d7af600d3bdfa
SHA1afb232a1f7e65bf7713850ed57a77cfd462f48dc
SHA2566cd94839216439c519fa1ac4587ba29fecb0e7a87992c882b2923ae0eaf03a0d
SHA51283f28df1cbf278edeb040b7178d865aa82317d8a762734723f45a2eb47880f1c66c6077ac4605ebd72f290306483adcd7d525b403e04f5a23c4c97527c06e14d
-
memory/1896-54-0x0000000076491000-0x0000000076493000-memory.dmpFilesize
8KB