Analysis
-
max time kernel
131s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-11-2022 09:38
Static task
static1
Behavioral task
behavioral1
Sample
13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe
Resource
win10v2004-20221111-en
General
-
Target
13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe
-
Size
186KB
-
MD5
5d7bde6e537b207b0a64ac6f7ce07ae9
-
SHA1
18c7509eca18bc9534267f150875fdeade983973
-
SHA256
13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee
-
SHA512
2c165980ecec1ca820f3b396c4ef6305d933a40611867945fc1f4e380b648002f0fdd0b7971b3af2488e39a3ac73e8b8430c5bb2298d55e23aaf44e0f6eadd50
-
SSDEEP
3072:zr8WDrCo4eOyVTGfhEClj8jTk+0hdQaIDjiPBAp5XhKpt:PuyOiTGfhEClq9gQ3jiSbXEt
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Blocklisted process makes network request 2 IoCs
Processes:
WScript.exeflow pid process 3 1468 WScript.exe 4 1468 WScript.exe -
Drops file in Drivers directory 3 IoCs
Processes:
WScript.execmd.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exepid process 1984 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe -
Loads dropped DLL 3 IoCs
Processes:
13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exepid process 784 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe 784 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe 784 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
Processes:
13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\Program Files (x86)\Compan\New_\slovi_volnui.vbs 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\Program Files (x86)\Compan\New_\gutalinom.nah 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File created C:\Program Files (x86)\Compan\New_\Uninstall.ini 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\Program Files (x86)\Compan\New_\silk.node 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\Program Files (x86)\Compan\New_\sosni_tuntsai.vbs 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\Compan\New_\UNINST~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\Program Files (x86)\Compan\New_\Uninstall.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe -
Drops file in Windows directory 1 IoCs
Processes:
13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exedescription ioc process File opened for modification C:\Windows\svchost.com 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.execmd.exedescription pid process target process PID 784 wrote to memory of 1984 784 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe PID 784 wrote to memory of 1984 784 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe PID 784 wrote to memory of 1984 784 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe PID 784 wrote to memory of 1984 784 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe PID 784 wrote to memory of 1984 784 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe PID 784 wrote to memory of 1984 784 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe PID 784 wrote to memory of 1984 784 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe PID 1984 wrote to memory of 1708 1984 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe cmd.exe PID 1984 wrote to memory of 1708 1984 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe cmd.exe PID 1984 wrote to memory of 1708 1984 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe cmd.exe PID 1984 wrote to memory of 1708 1984 13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe cmd.exe PID 1708 wrote to memory of 1480 1708 cmd.exe WScript.exe PID 1708 wrote to memory of 1480 1708 cmd.exe WScript.exe PID 1708 wrote to memory of 1480 1708 cmd.exe WScript.exe PID 1708 wrote to memory of 1480 1708 cmd.exe WScript.exe PID 1708 wrote to memory of 1468 1708 cmd.exe WScript.exe PID 1708 wrote to memory of 1468 1708 cmd.exe WScript.exe PID 1708 wrote to memory of 1468 1708 cmd.exe WScript.exe PID 1708 wrote to memory of 1468 1708 cmd.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe"C:\Users\Admin\AppData\Local\Temp\13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Program Files (x86)\Compan\New_\nitie_i_bluz.bat" "3⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Compan\New_\slovi_volnui.vbs"4⤵
- Drops file in Drivers directory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Compan\New_\sosni_tuntsai.vbs"4⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~2\Compan\New_\UNINST~1.EXEFilesize
56KB
MD53289e2d767a5802c90d20ac11bcc1294
SHA11bc27d269547be799ca03aac8b17289058ebb5c0
SHA256cbcd0de51d9a2b03115b42bbbdbde2683608846fd3996537a0ddaa8046c2ef23
SHA512b1366fc6490e9f01e41938cbbdc27e59f96df23a78e5fcdd93eff92eff9ffa9286f8186b52f45f81851171d5c89a9ef6a9c9c0068d2ddb071760c8653747a514
-
C:\Program Files (x86)\Compan\New_\gutalinom.nahFilesize
43B
MD5f2e0e659880e05a882ab7647cb9f81e4
SHA1a4c2100dec8a980ae6410cd317d4e8b79c1add73
SHA256ca6dfb79fcd371341ca3a122c0afd880cbbdf4098ae20d5b96f7eb61ab3b9ac7
SHA512bbfd4262363b6c8df745f82d9464b4a235d58f24413b75e4e63549e3b8155ccac6d63ac4647507be94f13557851d9fb92c2a576a12fbfe8b2d6981b0e55ff4ab
-
C:\Program Files (x86)\Compan\New_\nitie_i_bluz.batFilesize
1KB
MD5a971c2fd2e54e87d55c9ff7442579c6b
SHA15ab1c89daa6a47a31abd502023e5ab0b817cb849
SHA256fc5474c031ad0b5f506422e1ea68ad7ee5eb715e6146b871370f6f2994107353
SHA512e7f36cc7f9cfb2da46ef77a65f0fe8c38d47fa87e4570870c1993fa92b8a2328c4e6581c66d0112b072480366b3040ea8c6347174c61ec38386d1cb5627668df
-
C:\Program Files (x86)\Compan\New_\silk.nodeFilesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
C:\Program Files (x86)\Compan\New_\slovi_volnui.vbsFilesize
791B
MD503e4ca9b64db726187d32b9e12e45780
SHA1af3c46e082896d85eb823353e7a5ad8cf7eb17a9
SHA2561f590ea497fa07551781282c316515b0d3f06dffa2c5d4f7743b9b5dae6fe236
SHA512725a038c1c4b0ff4e6614886f16d8665d043e23a80256d4e4a07e9e9849919386d07bcc4983944119a2b17859870c410b94ce2932a59c47728bb55ded64252e7
-
C:\Program Files (x86)\Compan\New_\sosni_tuntsai.vbsFilesize
209B
MD5375b55f0b4de79fcb39ba73232ec9dfb
SHA154b4610b1dc5bf5744070b52a7643d1de6627264
SHA256508a3a6ccfc8608428f1b40eb303ad3daf579b903be40ec4d6d07731c09a1674
SHA512d72a4b671ccf001388bde0ad4c5886e34bb8b3ff1a9b3faf1d0b40a70ba1c5ce6ed15b563895544b748fdf246de819b0a1b19dfc543a513d8bf6f0a2531d635e
-
C:\Users\Admin\AppData\Local\Temp\3582-490\13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exeFilesize
146KB
MD55f1157f916fa7b1e7832ea96c6cde882
SHA13d44a1f32b461457232a0d3fd809e9885e70fe1a
SHA256082433298a0e3c92abb5de601467d076786d5978382017b5703d2c14d1d56118
SHA5127cbb13cf567c75302689ea28d63628bbd84e1983f24c808e11fd805e94225ec2b8b97aadfa7ef451956f4b211b7b1cf72cddcb8e86a5b4195c8f62be2a5348f3
-
C:\Users\Admin\AppData\Local\Temp\3582-490\13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exeFilesize
146KB
MD55f1157f916fa7b1e7832ea96c6cde882
SHA13d44a1f32b461457232a0d3fd809e9885e70fe1a
SHA256082433298a0e3c92abb5de601467d076786d5978382017b5703d2c14d1d56118
SHA5127cbb13cf567c75302689ea28d63628bbd84e1983f24c808e11fd805e94225ec2b8b97aadfa7ef451956f4b211b7b1cf72cddcb8e86a5b4195c8f62be2a5348f3
-
C:\Windows\System32\drivers\etc\hostsFilesize
1KB
MD51b7d708bf2ac6a9f566e6e6e8589781f
SHA1e093b867d1f6bca785d9276ae69d603b78404f78
SHA2560b855cf5e07f170036368d5eda185c2e8b2574a51be4aa52f8daeeb23d6f7781
SHA512f1d0472b9bc9483e7e678487b2bdf51c713621b7bdc06dbbb2bde924d8652e23af5642db2c365cef6e8708e94dd7412360b3076a4bb5c3e995d095a4442dff22
-
\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXEFilesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
\PROGRA~2\Compan\New_\UNINST~1.EXEFilesize
56KB
MD53289e2d767a5802c90d20ac11bcc1294
SHA11bc27d269547be799ca03aac8b17289058ebb5c0
SHA256cbcd0de51d9a2b03115b42bbbdbde2683608846fd3996537a0ddaa8046c2ef23
SHA512b1366fc6490e9f01e41938cbbdc27e59f96df23a78e5fcdd93eff92eff9ffa9286f8186b52f45f81851171d5c89a9ef6a9c9c0068d2ddb071760c8653747a514
-
\Users\Admin\AppData\Local\Temp\3582-490\13a9d3c435a380078b27af0fbc57649289ed908d1c88fcb0dc813aad216d02ee.exeFilesize
146KB
MD55f1157f916fa7b1e7832ea96c6cde882
SHA13d44a1f32b461457232a0d3fd809e9885e70fe1a
SHA256082433298a0e3c92abb5de601467d076786d5978382017b5703d2c14d1d56118
SHA5127cbb13cf567c75302689ea28d63628bbd84e1983f24c808e11fd805e94225ec2b8b97aadfa7ef451956f4b211b7b1cf72cddcb8e86a5b4195c8f62be2a5348f3
-
memory/784-54-0x0000000075FC1000-0x0000000075FC3000-memory.dmpFilesize
8KB
-
memory/1468-67-0x0000000000000000-mapping.dmp
-
memory/1480-65-0x0000000000000000-mapping.dmp
-
memory/1708-60-0x0000000000000000-mapping.dmp
-
memory/1984-56-0x0000000000000000-mapping.dmp