Analysis

  • max time kernel
    143s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2023 04:35

General

  • Target

    DomainName.exe

  • Size

    160KB

  • MD5

    6023d7082c077af7f45ac812a576f113

  • SHA1

    74033be723ac674bc8244cd33410f778ae275ddf

  • SHA256

    9cf2bb3ba92b075e1a53d6a03461bc5d656a744e891683d20650c4e4515b9201

  • SHA512

    46100b5053a7f2a42d9fd05791996f6e0289cd5c0a2e47c1a911ed190e00745c4ac733a937a4e06068118673b72a1c189c73423995d177777b38ed7a98ce3627

  • SSDEEP

    1536:JxqjQ+P04wsmJC6pzK88ICS4Aer9DIPcG5zXbwMcClFyFfjRto2+i0BH8A4krBJC:sr85CuZE0cOzbwMflEBPoq/LPrlA0

Malware Config

Extracted

Family

sodinokibi

Botnet

$2a$10$mKbuAybjn4W3ipQCt6E7ROYxmL5SSZgUbPuA7PKUsPqJU10KB4bma

Campaign

7114

Decoy

withahmed.com

scenepublique.net

aglend.com.au

jyzdesign.com

nsec.se

cirugiauretra.es

gopackapp.com

tinyagency.com

crediacces.com

xn--rumung-bua.online

bowengroup.com.au

mastertechengineering.com

kmbshipping.co.uk

homng.net

fitnessingbyjessica.com

oldschoolfun.net

roygolden.com

sotsioloogia.ee

real-estate-experts.com

mir-na-iznanku.com

Attributes
  • net

    false

  • pid

    $2a$10$mKbuAybjn4W3ipQCt6E7ROYxmL5SSZgUbPuA7PKUsPqJU10KB4bma

  • prc

    oracle

    klnagent

    mydesktopqos

    infopath

    BackupExtender

    powerpnt

    outlook

    BackupAgent

    Smc

    sql

    ccSvcHst

    BackupUpdater

    Rtvscan

    winword

    kavfsscs

    ocssd

    isqlplussvc

    visio

    ShadowProtectSvc

    tbirdconfig

    TSSchBkpService

    dbeng50

    ccSetMgr

    agntsvc

    Sage.NA.AT_AU.SysTray

    dbsnmp

    thebat

    onenote

    AmitiAvSrv

    wordpad

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-readme.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension {EXT}. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). =========Attention!!!========= Also your private data was downloaded. We will publish it in case you will not get in touch with us asap. ============================== [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/{UID} 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/{UID} Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: {KEY} ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!

  • sub

    7114

  • svc

    Telemetryserver

    "Sophos AutoUpdate Service"

    sophos

    Altaro.Agent.exe

    mysqld

    MSSQL$MSGPMR

    "SophosFIM"

    "Sophos Web Control Service"

    SQLWriter

    svcGenericHost

    AltiBack

    "SQLServer Analysis Services (MSSQLSERVER)"

    BackupExecAgentAccelerator

    "StorageCraft ImageReady"

    SQLTELEMETRY

    AzureADConnectAuthenticationAgent

    ntrtscan

    ds_notifier

    TeamViewer

    "StorageCraft Raw Agent"

    "StorageCraft Shadow Copy Provider"

    SQLTELEMETRY$SQLEXPRESS

    VeeamHvIntegrationSvc

    AltiCTProxy

    MsDtsServer130

    ViprePPLSvc

    McAfeeFramework

    MSSQL$QM

    "swi_service"

    "ThreadLocker"

Extracted

Path

C:\Users\3b61kze1-readme.txt

Family

sodinokibi

Ransom Note
---=== Welcome. Again. ===--- [+] Whats Happen? [+] Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension 3b61kze1. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). =========Attention!!!========= Also your private data was downloaded. We will publish it in case you will not get in touch with us asap. ============================== [+] What guarantees? [+] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practise - time is much more valuable than money. [+] How to get access on website? [+] You have two ways: 1) [Recommended] Using a TOR browser! a) Download and install TOR browser from this site: https://torproject.org/ b) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/671E6736B5450D98 2) If TOR blocked in your country, try to use VPN! But you can use our secondary website. For this: a) Open your any browser (Chrome, Firefox, Opera, IE, Edge) b) Open our secondary website: http://decoder.re/671E6736B5450D98 Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: VzsDeWlyWVQZZFHUHSD41rJNZJMiEqf9LXQ6jvtqvifpXCFQs7ewpQz2gQCQZ1ph zQVP7wI3i8116XeisKXlcV+wTTFOaE3UwGPlfoQbvBYm0To6SIZnw8cc+geqt3Om Gkgh9byw9tzjJ0qd6Sjzc+ElscjL5q6LJjqluz+TBk9wVl2bBC9O3O6v7mg0SMUL Qe7Q94zmob+govBf+u26BFf2RZxsDFXkXFBAn3RStA/dJ7N+LNFdRc4CVPWknQhU y/DxsBHKtOJP2kCJbUCKuCgdbIfp7he9tGZx6lBhajGDg8bF+BxNo9+gfkWDve+u fNM6SjRxueJH/I3gwMzzxrAcVW5DzuD29bX/g8Q25kRcNsK+R/MgNAb1WFnxwEDY t/Kh0hiwahQmYNWY/4stFlbjwAuu/JDuYLPbE3P2O4CTAU6HPJ9VpjVKOgn828z1 1YO/oWzrA7gNEHihtjGNabt/gm8dToMC3JE+yxjvTF05ombkI+o3L9eoYN3RTL/L JcHfOy6zPF1n/LCUiUlwId6E4Tfo5/ZT2oggU7lVZtyAlZo4jreAYke0UqMI1iTG hLGfAT1hgmKYVIemPHDMwkcqwzhy27TPycy87nT2XPZzHJUZu1P72HDK2ZGtxIYd J3O9Re2DMAHdtRkOfb8gpBLOxfSSRL3J5z8zPA5jZf3KdXrqY1FLSdB+cDiCXLao StzZ2GHAOqCCg29Yy4zXqPfnOAKUiJxIt9QaaIEt/kCAkN0p1B3TLjw4vAHeF8Hq ZTrQluxUyIALYPxiHcHaD23DMI1AFDLZt85WMRubsV1AtINvBqnV69doYkx0nBbf 5e97rnJBimx11HIBGx0WvZZrYYr2NhX3qjTY+u8WwcgD5zKAC6zJFWqpylEED7d4 Q+FydzaevXIFfIw/gtRwKjakRWVgmUw6OY2FGamkJD4OPmi0qEVnGugXXJvXgwiL UdZ8B5Oo/wR1Bli/M9BIBsSNcIXRL+qAEgZcXXCnRxhtidv7jsavJHocBk4dLUrW +3c6En1UteMI1s5/fpZz3/VzJ3mx6Is9zS4sbRSKt9c9HG1oCfesbeB8W/sRuGrx JmMr/Wm4qEOgfCtLINMwOVG2z4g4g/ozJARbrufVL9Qq8krqi7bD9F6kdArIYHSG 2D+osfrskoRmTLU45yqkDeHg8LHZpMIiFw8kfwxqOEz07BRYyWp7sorGyck1iIzA Hder4USqde94/gIVmyoYZHlW0KJRU1S9wlj/w9VnoJn3k+8YV+DPGrN1jFkKipXE EGpN9hgDtFGF9S77r62LNjjglUgAiRuFLkgZCiYqwAozzvSybBb61Ba2Yfz36lzx z20hR1AeiOeGh1Nt27vFT6hDQN3ZW/xIy1k= ----------------------------------------------------------------------------------------- !!! DANGER !!! DONT try to change files by yourself, DONT use any third party software for restoring your data or antivirus solutions - its may entail damge of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/671E6736B5450D98

http://decoder.re/671E6736B5450D98

Signatures

  • Detect Neshta payload 46 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\DomainName.exe
    "C:\Users\Admin\AppData\Local\Temp\DomainName.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Users\Admin\AppData\Local\Temp\3582-490\DomainName.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\DomainName.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2992
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2952
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2700
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2836
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1092
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1616
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1600

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Event Triggered Execution

    1
    T1546

    Change Default File Association

    1
    T1546.001

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Event Triggered Execution

    1
    T1546

    Change Default File Association

    1
    T1546.001

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    3
    T1112

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe
      Filesize

      547KB

      MD5

      cf6c595d3e5e9667667af096762fd9c4

      SHA1

      9bb44da8d7f6457099cb56e4f7d1026963dce7ce

      SHA256

      593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d

      SHA512

      ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

    • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe
      Filesize

      186KB

      MD5

      58b58875a50a0d8b5e7be7d6ac685164

      SHA1

      1e0b89c1b2585c76e758e9141b846ed4477b0662

      SHA256

      2a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae

      SHA512

      d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b

    • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe
      Filesize

      1.1MB

      MD5

      566ed4f62fdc96f175afedd811fa0370

      SHA1

      d4b47adc40e0d5a9391d3f6f2942d1889dd2a451

      SHA256

      e17cd94c08fc0e001a49f43a0801cea4625fb9aee211b6dfebebec446c21f460

      SHA512

      cdf8f508d396a1a0d2e0fc25f2ae46398b25039a0dafa0919737cc44e3e926ebae4c3aa26f1a3441511430f1a36241f8e61c515a5d9bd98ad4740d4d0f7b8db7

    • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\DW20.EXE
      Filesize

      859KB

      MD5

      02ee6a3424782531461fb2f10713d3c1

      SHA1

      b581a2c365d93ebb629e8363fd9f69afc673123f

      SHA256

      ead58c483cb20bcd57464f8a4929079539d634f469b213054bf737d227c026dc

      SHA512

      6c9272cb1b6bde3ee887e1463ab30ea76568cb1a285d11393337b78c4ad1c3b7e6ce47646a92ab6d70bff4b02ab9d699b84af9437b720e52dcd35579fe2693ec

    • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\dwtrig20.exe
      Filesize

      547KB

      MD5

      cf6c595d3e5e9667667af096762fd9c4

      SHA1

      9bb44da8d7f6457099cb56e4f7d1026963dce7ce

      SHA256

      593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d

      SHA512

      ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\ONELEV.EXE
      Filesize

      85KB

      MD5

      685db5d235444f435b5b47a5551e0204

      SHA1

      99689188f71829cc9c4542761a62ee4946c031ff

      SHA256

      fde30bfdd34c7187d02eabe49f2386b4661321534b50032a838b179a21737411

      SHA512

      a06d711574fbe32f07d20e1d82b7664addd664bf4a7ee07a8f98889172afe3653f324b5915968950b18e76bbfc5217a29704057fd0676611629aa9eb888af54a

    • C:\Program Files (x86)\Microsoft Office\Office14\ACCICONS.EXE
      Filesize

      1.4MB

      MD5

      71509f22e82a9f371295b0e6cf4a79bb

      SHA1

      c7eefb4b59f87e9a0086ea80962070afb68e1d27

      SHA256

      f9837240f5913bfa289ac2b5da2ba0ba24f60249d6f7e23db8a78bb10c3c7722

      SHA512

      3ea6347bbb1288335ac34ee7c3006af746ca9baccfbc688d85a5ca86b09d3e456047239c0859e8dd2cdc22d254897fccd0919f00826e9665fd735cfb7c1554e7

    • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
      Filesize

      129KB

      MD5

      b1e0da67a985533914394e6b8ac58205

      SHA1

      5a65e6076f592f9ea03af582d19d2407351ba6b6

      SHA256

      67629b025fed676bd607094fa7f21550e18c861495ba664ee0d2b215a4717d7f

      SHA512

      188ebb9a58565ca7ed81a46967a66d583f7dea43a2fc1fe8076a79ef4a83119ccaa22f948a944abae8f64b3a4b219f5184260eff7201eb660c321f6c0d1eba22

    • C:\Program Files (x86)\Microsoft Office\Office14\CLVIEW.EXE
      Filesize

      246KB

      MD5

      4f8fc8dc93d8171d0980edc8ad833b12

      SHA1

      dc2493a4d3a7cb460baed69edec4a89365dc401f

      SHA256

      1505f3721dd3d7062dadde1633d17e4ee80caf29fd5b6aa6e6a0c481324ffd4e

      SHA512

      bdc3f83d7428418516daf23a9c2d00571cbaa3755391dfd8c500b6df7f621a67ad8e27775bcdaa20b159cd77d08bcdaf81a0cb7fffdd812978888d43512113a6

    • C:\Program Files (x86)\Microsoft Office\Office14\CNFNOT32.EXE
      Filesize

      188KB

      MD5

      92ee5c55aca684cd07ed37b62348cd4e

      SHA1

      6534d1bc8552659f19bcc0faaa273af54a7ae54b

      SHA256

      bee98e2150e02ad6259184a35e02e75df96291960032b3085535fb0f1f282531

      SHA512

      fc9f4569a5f3de81d6a490f0fff4765698cdc891933979a3ce661a6291b606630a0c2b15647fc661109fcea466c7a78552b9cfbca6c5b2079ea1632a9f1b6e22

    • C:\Program Files (x86)\Microsoft Office\Office14\GRAPH.EXE
      Filesize

      4.1MB

      MD5

      56f047ff489e52768039ce7017bdc06e

      SHA1

      3f249d6a9e79c2706ed2e0e12f7e76ebd5e568fc

      SHA256

      62d6c979d708efe21c9618a18232fd2c74e85bb9560daa298025ab9af784202d

      SHA512

      a2eae7eae6548d325480560dcca83283a022f00f7d9bd19c0ae801a7acec133a33c5c5eb79432d47c8258d153cadea988217845d58eb4e8aa8070a068befe5e8

    • C:\Program Files (x86)\Microsoft Office\Office14\GROOVEMN.EXE
      Filesize

      962KB

      MD5

      06ac9f5e8fd5694c759dc59d8a34ee86

      SHA1

      a29068d521488a0b8e8fc75bc0a2d1778264596b

      SHA256

      ab6a5bfc12229c116033183db646125573989dfc2fc076e63e248b1b82f6751d

      SHA512

      597dfd9cb82acc8f3033f2215df7138f04445f5826054528242e99e273f9cc4a7a956c75f280e6145fcdb22824a1f258246e22637de56a66dcae72ac2c1d14fe

    • C:\Program Files (x86)\Microsoft Office\Office14\IEContentService.exe
      Filesize

      605KB

      MD5

      8acc19705a625e2d4fa8b65214d7070a

      SHA1

      ad16e49369c76c6826a18d136bf9618e8e99ec12

      SHA256

      3fb179a3ae88a3d14db48de29d4b9d43243b80b2118b578b8117ad776ce47f12

      SHA512

      92e22275194b5a73d825e1e7ad5a5cb5649d3679f545f88328aa72e39c161c4d797b7b3462e590edf546ddbd53c1508a49056f50fa63b113134e1bdc7d977dec

    • C:\Program Files (x86)\Microsoft Office\Office14\INFOPATH.EXE
      Filesize

      1.7MB

      MD5

      33cb3cf0d9917a68f54802460cbbc452

      SHA1

      4f2e4447fabee92be16806f33983bb71e921792b

      SHA256

      1230b2032d2d35a55cd86d1215eb38fa18bcf590c3c19b9ac4dda5350c24e10a

      SHA512

      851f0a098020cb1da3f5f48febce3b9eaef3b885df9134b3fb6b364f3a7572a8c516456710a15f66f0a44eff59cfa50f2dc8bb5d274e5c093294b2ea96fd49cb

    • C:\Program Files (x86)\Microsoft Office\Office14\MSOHTMED.EXE
      Filesize

      109KB

      MD5

      44623cc33b1bd689381de8fe6bcd90d1

      SHA1

      187d4f8795c6f87dd402802723e4611bf1d8089e

      SHA256

      380154eab37e79ed26a7142b773b8a8df6627c64c99a434d5a849b18d34805ba

      SHA512

      19002885176caceb235da69ee5af07a92b18dac0fb8bb177f2c1e7413f6606b1666e0ea20f5b95b4fa3d82a3793b1dbe4a430f6f84a991686b024c4e11606082

    • C:\Program Files (x86)\Microsoft Office\Office14\MSOSYNC.EXE
      Filesize

      741KB

      MD5

      5d2fd8de43da81187b030d6357ab75ce

      SHA1

      327122ef6afaffc61a86193fbe3d1cbabb75407e

      SHA256

      4d117648525a468532da011f0fc051e49bf472bbcb3e9c4696955bd398b9205f

      SHA512

      9f7470978346746b4e3366f9a6b277aa747cc45f13d36886fc16303221565d23348195b72ac25f7b1711789cd7cb925d7ceea91e384ef4f904a4e49b4e06d9b2

    • C:\Program Files (x86)\Microsoft Office\Office14\MSOUC.EXE
      Filesize

      392KB

      MD5

      25b9301a6557a958b0a64752342be27d

      SHA1

      0887e1a9389a711ef8b82da8e53d9a03901edebc

      SHA256

      5d916f7c7f6cb6cfd7545a57cb9c9d9c6df16af3517298c346901081a9135303

      SHA512

      985f6b2fcac2f0425a1a339a55616012879a393caa747412d04c1ee4de3b12aff2cc051860066d84ecbeae335eaa5116ccb8a02090a2674eded367378c56b1ab

    • C:\Program Files (x86)\Microsoft Office\Office14\MSQRY32.EXE
      Filesize

      694KB

      MD5

      7a4edc8fb7114d0ea3fdce1ea05b0d81

      SHA1

      02ecc30dbfab67b623530ec04220f87b312b9f6b

      SHA256

      ff16fdc703e55ddfe5ee867f343f3b20b496e7199c6c4b646335a01026f74550

      SHA512

      39519685b1dd872008abfa967f79fd3b7a5e6f6ee1b9c3de891aae64490b2d0feb56bcd3f5dab4527d2c6d07646db5966028df153f38a1c09ee88a1ba9a1ef44

    • C:\Program Files (x86)\Microsoft Office\Office14\MSTORDB.EXE
      Filesize

      726KB

      MD5

      c3ee902099b98a299b1a215aba1b27bb

      SHA1

      602b023806464db25f5f8e4ffc157cc7d7e9886b

      SHA256

      e657a9f85af7cb5ded734e162db514e466256a83d51f4454abbf19c54b30686f

      SHA512

      3538548c99f266404395ce9bdcadb542171799865ac5feddce936305ff2b09ecb939bed60d1e7011a39ca8548af39f9b4ee723b15674a1df54404270fc5afc9f

    • C:\Program Files (x86)\Microsoft Office\Office14\MSTORE.EXE
      Filesize

      144KB

      MD5

      a2dddf04b395f8a08f12001318cc72a4

      SHA1

      1bd72e6e9230d94f07297c6fcde3d7f752563198

      SHA256

      b35e60f1551870c1281d673380fe3101cd91b1f0b4d3c14c2383060f5e120373

      SHA512

      2159df98d90467720b738be68bee5aba38980d2449c18d2ea4b7b9bae7d222b4a85845d0f9597017d0ee417964190bc3d95cb4809e33aac16b6cfa6ec200dce3

    • C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLSERVER.EXE
      Filesize

      127KB

      MD5

      154b891ad580307b09612e413a0e65ac

      SHA1

      fc900c7853261253b6e9f86335ea8d8ad10c1c60

      SHA256

      8a3598c889dbcb1dca548a6193517ed7becb74c780003203697a2db22222a483

      SHA512

      39bf032033b445fc5f450abec298ea3f71cadecfeafc624f2eb1f9a1d343a272181a874b46b58bb18168f2f14d498c3b917c3392d4c724fe4e5ae749113c2ad6

    • C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE
      Filesize

      308KB

      MD5

      4545e2b5fa4062259d5ddd56ecbbd386

      SHA1

      c021dc8488a73bd364cb98758559fe7ba1337263

      SHA256

      318f1f3fbdd1cf17c176cb68b4bc2cf899338186161a16a1adc29426114fb4f8

      SHA512

      cf07436e0219ca5868e11046f2a497583066a9cf68262e7cca22daad72aded665ac66afea8db76182c172041c45fcef1628ea6852751c4bf97969c9af6cfefa1

    • C:\Program Files (x86)\Microsoft Office\Office14\ONENOTE.EXE
      Filesize

      1.6MB

      MD5

      08ee3d1a6a5ed48057783b0771abbbea

      SHA1

      ebf911c5899f611b490e2792695924df1c69117d

      SHA256

      3f6decd82b72a5ba1ee224b52d9fbd6486be22a0b855e28eaad47ae92df266f0

      SHA512

      1711d023c60d4b047d553a654797bc3a2eecd951b310698c1a2c549e136c33f55e0fc1167a4a38f793b7796f7cfc3fb30017935127b147a21da2812eb38faac5

    • C:\Program Files (x86)\Microsoft Office\Office14\ONENOTEM.EXE
      Filesize

      262KB

      MD5

      2d1b4a44f1f9046d9d28e7e70253b31d

      SHA1

      6ab152d17c2e8a169956f3a61ea13460d495d55e

      SHA256

      d1d73220342ff51a1514d2354654c6fcaedc9a963cb3e0a7e5b0858cfc5c5c7d

      SHA512

      dd8f5e343417a3e131b3362f1aecaf9ce0f8a55c9f90aa3b7e55b6ddb6c5f4e06b3e76a7f4481fa13e2f325ab2490553f6977178acf7c486c7315755c05fc7c3

    • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
      Filesize

      2.1MB

      MD5

      6b63036a88f260b7a08da9814cf17ce0

      SHA1

      cac1bd549343a1c3fcefacc2d588155a00c4467b

      SHA256

      8f9fb3c2ce132a64e157738feaf82bb512ec03d03fa2da95c26470defeef513d

      SHA512

      383b8676a85e0f2447536bd15019c23bed15a51d633dafe5ac7bcbea75d8064ef9fd938461eab25df7f3eae3de18b87640e8cc12e95f7b58de1209937d8da284

    • C:\Program Files (x86)\Microsoft Office\Office14\PPTICO.EXE
      Filesize

      3.7MB

      MD5

      525f8201ec895d5d6bb2a7d344efa683

      SHA1

      a87dae5b06e86025abc91245809bcb81eb9aacf9

      SHA256

      39a089d363b15c37cca9f747a17e89ad1dbe0bc86ff23466526beaa5e36d6d4b

      SHA512

      f0a2070f11eb3f0bdf996ada42becc7710aab76e84268e5cdbbd9ecbf13ef5fb85b52b6227711137a9c511f8d731b018530cbf1935f8fcfd61ff2ef6c1348d63

    • C:\Program Files (x86)\Microsoft Office\Office14\SELFCERT.EXE
      Filesize

      549KB

      MD5

      61631e66dbe2694a93e5dc936dd273be

      SHA1

      b1838b8ca92fa5ca89e1108ceb2630a6ecd2b8c2

      SHA256

      5811b7b694d99c703b4c4bc72d6b7d846d05b2b0f45a7e3e4279cdb6fd81265f

      SHA512

      323463c267ccdb701d5967198f4f72158056f5a6e889c47bf19d1a670233ab071a5fe8c108430beb67753b77af1c59028007101a8e1266618fe91fa0127b4dcf

    • C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE
      Filesize

      606KB

      MD5

      9b1c9f74ac985eab6f8e5b27441a757b

      SHA1

      9a2cf7d2518c5f5db405e5bd8d37bf62dcaf34f5

      SHA256

      2a189b995a7283b503bb5864dd9ca57976b3812a6a34aaf89a7551336c43bc24

      SHA512

      d72e83aeaf1d34627a6c6aa469821af8a8d464a72c764fbb064484adea509a8c1d3628e2166859286e84daae8ebdf4f800693ce203984a8c313b1f2263e101c4

    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      Filesize

      1.4MB

      MD5

      5ae9c0c497949584ffa06f028a6605ab

      SHA1

      eb24dbd3c8952ee20411691326d650f98d24e992

      SHA256

      07dd9364be7babc5f9a08f0ccd828a9a55137845df1782b147f12943f234ea4e

      SHA512

      2e99bb500c281c367cc54fa283905b2537905ea4fe8986f676adbb1aaf58460dd2db082bb46a3dbe9dc836fbae3ee8832990839432dd99c74de58cc9b9295788

    • C:\Program Files (x86)\Microsoft Office\Office14\WORDICON.EXE
      Filesize

      1.8MB

      MD5

      fc87e701e7aab07cd97897512ab33660

      SHA1

      65dcd8e5715f2e4973fb6b271ffcb4af9cefae53

      SHA256

      bb1814297615d6b22fa20ee4f8613c8bc9fa67d93cb7fe032f46f377569e2f46

      SHA512

      b03e3b3f7b0f11b85757d8bf5678542f4281407e95cf8e074da4ddc421c217fcfaf23cc927ccd0bbca2891a424b2d3565072aba6406dc46c2fa1fdba7a249eec

    • C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE
      Filesize

      1.5MB

      MD5

      93766da984541820057ae0ab3d578928

      SHA1

      ea19a657c6b1b5eb5accc09c45dcf04f063151c3

      SHA256

      ad3a9f7beaaea0bc49a7ccba83198cfb2882d462441203684076695b0ef6c514

      SHA512

      e14c86e13ab79fa9b9eb1a05d69764d522c4acfab7742c200080b215bb3bc31ec7f3dd2abf44cbc996d2e58a0ca1990b18ab055b232b243fe61b5fb018a9b719

    • C:\Program Files (x86)\Microsoft Office\Office14\misc.exe
      Filesize

      598KB

      MD5

      02e02577a83a1856dc838f9e2f24e8d2

      SHA1

      2ab44e2072a3598fc7092b2ccb9aff3a2c5d4ced

      SHA256

      3b6ca9d9fcbb0c1677fe4caeef03e4db326f70166f030b5f9fa9f2856031d4fc

      SHA512

      a95d454a4f9e5271bc52e6c245c7840a92b8331b84260b2556432ac66dd07bec1b2c3dcf41282d6d8ae581a152f3147e75dc673ce0c7ecbb653dcc61bc1d1bd8

    • C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe
      Filesize

      141KB

      MD5

      7e3b8ddfa6bd68ca8f557254c3188aea

      SHA1

      bafaaaa987c86048b0cf0153e1147e1bbad39b0c

      SHA256

      8270ecef6079a21f5ae22f1a473e5eb8abac51628367f4acf6466529ba11d7e2

      SHA512

      675ca07cdb787b3f624eae9707daf519214f8dc4670c524cef5110c9dba197e833cedb051919c757c58a3687e63cf175d1397d8ce69c5995f4eab3b85f6dafbb

    • C:\Users\3b61kze1-readme.txt
      Filesize

      7KB

      MD5

      4cc46f962a8edc765c583159e7dee54e

      SHA1

      f7e6a97a02b24885c48d6fb4c9e8eb47bd86986e

      SHA256

      92e88840c7224ae31fa0a7e4a70bf40dd7176c03a02a71209b54a20587cbe80d

      SHA512

      955f2c788469b2a8778f932da005d80f90e2cd1414782f2cff0265563282889ed6073a423eaf44c5c936d3f9d10b3d62f161f78901680daad0037bfb3a4059c3

    • C:\Users\Admin\AppData\Local\Temp\3582-490\DomainName.exe
      Filesize

      120KB

      MD5

      af94ccb62f97700115a219c4b7626d22

      SHA1

      bb67edcfe4e5b6fe09ee96e5b8ace7a4cfe39eb7

      SHA256

      2896b38ec3f5f196a9d127dbda3f44c7c29c844f53ae5f209229d56fd6f2a59c

      SHA512

      08c05f8dc98aba168734732d043c3e403f531522e0ec0ec64484d15375f353aa23f9654852ad2c54a3e6b2a9344f4ffb553cac24455f62bb65b55800e311c12a

    • C:\Users\Admin\AppData\Local\Temp\3582-490\DomainName.exe
      Filesize

      120KB

      MD5

      af94ccb62f97700115a219c4b7626d22

      SHA1

      bb67edcfe4e5b6fe09ee96e5b8ace7a4cfe39eb7

      SHA256

      2896b38ec3f5f196a9d127dbda3f44c7c29c844f53ae5f209229d56fd6f2a59c

      SHA512

      08c05f8dc98aba168734732d043c3e403f531522e0ec0ec64484d15375f353aa23f9654852ad2c54a3e6b2a9344f4ffb553cac24455f62bb65b55800e311c12a

    • C:\Users\Admin\AppData\Local\Temp\3582-490\DomainName.exe
      Filesize

      120KB

      MD5

      af94ccb62f97700115a219c4b7626d22

      SHA1

      bb67edcfe4e5b6fe09ee96e5b8ace7a4cfe39eb7

      SHA256

      2896b38ec3f5f196a9d127dbda3f44c7c29c844f53ae5f209229d56fd6f2a59c

      SHA512

      08c05f8dc98aba168734732d043c3e403f531522e0ec0ec64484d15375f353aa23f9654852ad2c54a3e6b2a9344f4ffb553cac24455f62bb65b55800e311c12a

    • \??\PIPE\samr
      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
      Filesize

      252KB

      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \Users\Admin\AppData\Local\Temp\3582-490\DomainName.exe
      Filesize

      120KB

      MD5

      af94ccb62f97700115a219c4b7626d22

      SHA1

      bb67edcfe4e5b6fe09ee96e5b8ace7a4cfe39eb7

      SHA256

      2896b38ec3f5f196a9d127dbda3f44c7c29c844f53ae5f209229d56fd6f2a59c

      SHA512

      08c05f8dc98aba168734732d043c3e403f531522e0ec0ec64484d15375f353aa23f9654852ad2c54a3e6b2a9344f4ffb553cac24455f62bb65b55800e311c12a

    • \Users\Admin\AppData\Local\Temp\3582-490\DomainName.exe
      Filesize

      120KB

      MD5

      af94ccb62f97700115a219c4b7626d22

      SHA1

      bb67edcfe4e5b6fe09ee96e5b8ace7a4cfe39eb7

      SHA256

      2896b38ec3f5f196a9d127dbda3f44c7c29c844f53ae5f209229d56fd6f2a59c

      SHA512

      08c05f8dc98aba168734732d043c3e403f531522e0ec0ec64484d15375f353aa23f9654852ad2c54a3e6b2a9344f4ffb553cac24455f62bb65b55800e311c12a

    • memory/2168-579-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2168-560-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2168-575-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2168-578-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2168-87-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2168-580-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2168-581-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2168-582-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2168-583-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2168-585-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2168-586-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2168-587-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB

    • memory/2168-588-0x0000000000400000-0x000000000041B000-memory.dmp
      Filesize

      108KB