Analysis

  • max time kernel
    92s
  • max time network
    103s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    27-08-2020 18:32

General

  • Target

    SecuriteInfo.com.Generic.mg.e26982b170856ca8.24043.exe

  • Size

    437KB

  • MD5

    e26982b170856ca8ca96a2f41b2306fb

  • SHA1

    e467f2bc6f01f2a13effaf8f6283d616ccf40e2e

  • SHA256

    8d44fdbedd0ec9ae59fad78bdb12d15d6903470eb1046b45c227193b233adda6

  • SHA512

    80a636ae53f5049e1ec34e092d91be8f8cc11d1f96eb919bfabd814c677c1e68a773c102b4fd28f2335427173f76203815b60f133d1d4cf0834bded85931af0e

Malware Config

Extracted

Path

C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. To be sure we have the decryptor and it works you can send an email: crioso@protonmail.com and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? Write to email: crioso@protonmail.com Reserved email: wiruxa@airmail.cc If you do not receive a response after 1 hours, then resend the message to our backup email: wiruxa@airmail.cc yongloun@tutanota.com anygrishevich@yandex.ru Your personal ID: 195-83A-216 Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.
Emails

crioso@protonmail.com

wiruxa@airmail.cc

Signatures

  • Buran

    Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Generic.mg.e26982b170856ca8.24043.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Generic.mg.e26982b170856ca8.24043.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe" -start
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:816
        • C:\Windows\SysWOW64\Wbem\WMIC.exe
          wmic shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1560
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no
        3⤵
          PID:1864
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
          3⤵
            PID:1652
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet
            3⤵
              PID:1520
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:832
              • C:\Windows\SysWOW64\vssadmin.exe
                vssadmin delete shadows /all /quiet
                4⤵
                • Interacts with shadow copies
                PID:1884
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1500
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic shadowcopy delete
                4⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1976
              • C:\Windows\SysWOW64\vssadmin.exe
                vssadmin delete shadows /all /quiet
                4⤵
                • Interacts with shadow copies
                PID:972
            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe
              "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe" -agent 0
              3⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              PID:1584
            • C:\Windows\SysWOW64\notepad.exe
              notepad.exe
              3⤵
                PID:432
            • C:\Windows\SysWOW64\notepad.exe
              notepad.exe
              2⤵
              • Deletes itself
              PID:1892
          • C:\Windows\system32\vssvc.exe
            C:\Windows\system32\vssvc.exe
            1⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1524

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Registry Run Keys / Startup Folder

          1
          T1060

          Defense Evasion

          File Deletion

          2
          T1107

          Modify Registry

          2
          T1112

          Install Root Certificate

          1
          T1130

          Discovery

          Query Registry

          1
          T1012

          Peripheral Device Discovery

          1
          T1120

          System Information Discovery

          2
          T1082

          Command and Control

          Web Service

          1
          T1102

          Impact

          Inhibit System Recovery

          2
          T1490

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
            MD5

            90061c0fe3983bf5a61e7f1ecfffd3e3

            SHA1

            6a4245a302f8cff5bec5aacaeb2a029eeec4ba1a

            SHA256

            3118edda0b78684c8db584c4929f050d921cbcbc506ae58ee584f2e5b85d5a3e

            SHA512

            8b81e4c8ba32a64d40c71dd015374c373253af7a992669e6a0994532c905b92701916c96c84709e26db86b1e5bc1492552cb92e0c352ae1f6135ed33181f64df

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
            MD5

            821ac3c30e3b835b926263e532902014

            SHA1

            01667121b734a1d2a6ed5c770bf8f5f402db1bc3

            SHA256

            5e420896fdbdcb98c99d35b9df4cbb3bacc7ff57b97f2029c4d520875ad6fc59

            SHA512

            6092157f74da5a3609afc44f3c5ea0250c7fff9994b4e0e89b38bddd688c285c16e0340200bca13059a087e053c49e351ad2ed24053af7772022dd27d7eb7d00

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
            MD5

            01d84333430bc95a1e992cc960bbbf8f

            SHA1

            289caa9484d82cd60c91a38db4f1132c7bfb8234

            SHA256

            ffae3c311e042ca760af80800e48e36efb11ee5145db0465b413e64f9a674eaf

            SHA512

            0d8ecdaeecc5de269b225efacb56c451714924404cc139688b5e6e56292bd5ee7776750a8f5023cad1befd6e68fb0ea8235ea29b3cdf7affc92ac1558e1ed5d0

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
            MD5

            bd71ea17c9a676ad7b24c05304943174

            SHA1

            cf268ef60a47aa268d43ac919554ac06b419f376

            SHA256

            0bc662dcad4193684c2e84963adc46384b85f2ce229ba87be105fcb22988c4ee

            SHA512

            3c1d928c9d893e4ce1bf94b46fb1133d0692ef3bd93402ce9552a24ca5e8951e674799fe4f7ca3f1409257ee963d048d3eba12b110adc17803eb9e3059d581e6

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
            MD5

            be7814b1180f969619d8572aafd56885

            SHA1

            11954c14c776530ee4ee93dfe5c6a1ecec88b15c

            SHA256

            6db70d63a824585099cae5ca7992a7975e68e0c415a01cda06669ffab00fb62b

            SHA512

            feca70bb11ee8ddad2170530baa9294284155b96ea5d4dd93aa11ec14ebc882e6d4fb0ee9ad72631fd69bf86c14aaf74e06cd65a4e1126d20605883f741072fd

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
            MD5

            b81984f7aeb9d110f2d8350ea23ff614

            SHA1

            e7370be9701adfaa1c754c94b29072568e79ae44

            SHA256

            b5d32511935984307cd354f1b289a204be963dfe497a834d5a627dd779e611ed

            SHA512

            9dc719394fd7036bbdb183bdc4d1e855369cb9d47542cc0cfa9ee19113da177249176022eb427a6d6ccc336e4f57c1b77a87e1d39fe1f4739d5d8f52c65543d8

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
            MD5

            7cc44eecc6045bedd4a99cdf5335b8db

            SHA1

            8dadcd2be37c8c0dc0165bf07d048bf2613e9fd6

            SHA256

            c3113171605938dd239b66bb56bc09147e1240c50de00872e7e2cc96daca582b

            SHA512

            e6ed06391630956a7b06858ed89286c0b8967b0c277d65ab84ffe1e4e96bcfbd5665dc03cb20c063a7d35545c8113f815f5f93528b2b906985c7250e8bee06fe

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
            MD5

            f1fbdea05423068df12760d1fb7d0664

            SHA1

            19601ae9e2a803e11f215f869ccb7631ea9a1653

            SHA256

            1a065c4ff121028d2158d9df8ee6f7fe6d2b16bced7388ecb91d3d06c4645662

            SHA512

            a3b50aaf82d306dca43e7865edc5164e5c17798311391a45703646fb3de8d7df9ed7d76a04b47af5236cdc2fb0b2b61651aded33db6134703090ce2def0cb553

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EAP7GNEB\CWEVN1EA.htm
            MD5

            8615e70875c2cc0b9db16027b9adf11d

            SHA1

            4ed62cf405311c0ff562a3c59334a15ddc4f1bf9

            SHA256

            da96949ba6b0567343f144486505c8c8fa1d892fd88c9cbc3ef3d751a570724d

            SHA512

            cd9dfc88dc2af9438b7d6b618d1b62029b3bdf739fc4daa5b37397afd12c4528561b3bf2fc3f3f2adf3fd1f582d5524332441fd30248fcd078e41aa91e17cb73

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UJFO0ABC\FK3B61CX.htm
            MD5

            b1cd7c031debba3a5c77b39b6791c1a7

            SHA1

            e5d91e14e9c685b06f00e550d9e189deb2075f76

            SHA256

            57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

            SHA512

            d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

          • C:\Users\Admin\AppData\Local\Temp\~temp001.bat
            MD5

            ef572e2c7b1bbd57654b36e8dcfdc37a

            SHA1

            b84c4db6d0dfd415c289d0c8ae099aea4001e3b7

            SHA256

            e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64

            SHA512

            b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe
            MD5

            e26982b170856ca8ca96a2f41b2306fb

            SHA1

            e467f2bc6f01f2a13effaf8f6283d616ccf40e2e

            SHA256

            8d44fdbedd0ec9ae59fad78bdb12d15d6903470eb1046b45c227193b233adda6

            SHA512

            80a636ae53f5049e1ec34e092d91be8f8cc11d1f96eb919bfabd814c677c1e68a773c102b4fd28f2335427173f76203815b60f133d1d4cf0834bded85931af0e

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe
            MD5

            e26982b170856ca8ca96a2f41b2306fb

            SHA1

            e467f2bc6f01f2a13effaf8f6283d616ccf40e2e

            SHA256

            8d44fdbedd0ec9ae59fad78bdb12d15d6903470eb1046b45c227193b233adda6

            SHA512

            80a636ae53f5049e1ec34e092d91be8f8cc11d1f96eb919bfabd814c677c1e68a773c102b4fd28f2335427173f76203815b60f133d1d4cf0834bded85931af0e

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe
            MD5

            e26982b170856ca8ca96a2f41b2306fb

            SHA1

            e467f2bc6f01f2a13effaf8f6283d616ccf40e2e

            SHA256

            8d44fdbedd0ec9ae59fad78bdb12d15d6903470eb1046b45c227193b233adda6

            SHA512

            80a636ae53f5049e1ec34e092d91be8f8cc11d1f96eb919bfabd814c677c1e68a773c102b4fd28f2335427173f76203815b60f133d1d4cf0834bded85931af0e

          • C:\Users\Admin\Desktop\AddDisable.bin.195-83A-216
            MD5

            5471e61bc70de8e5d8a6b366a3deb3ff

            SHA1

            fc8d79893a7e0220547fdf5b2771004f96cc40e2

            SHA256

            49f35e6835f0a0fe2f2500e6a7d03633c30f3c377eb2ead7c535f0f29d552f80

            SHA512

            efd6c8161f0f8b8733615d4835efc14e8aaaa8ea6357c11e665e5319c961e9eb01f9986ab575b88060f9b1717993a66bd9b3b8b73edd0464377578fdb1fefee4

          • C:\Users\Admin\Desktop\ApproveReset.rar.195-83A-216
            MD5

            09866bc1d2eebe94a5f417c19c118d58

            SHA1

            0dfea2c1ab03c9faa3c3010e4313f7304332255b

            SHA256

            d2edbfeaf04e2db8739c9ead86d0f355a19a58f15890056a1c8786fc9385cec7

            SHA512

            72a1edf76774c99d116fc635b57bc15c8528549fc52cc653e2a0181f8b153a9dfcaae8588bc7c18e8f00799b5bcda248c54c83c8a274993a33ec5ee8f1cd5597

          • C:\Users\Admin\Desktop\BackupDeny.xps.195-83A-216
            MD5

            101aacd51f5f1bc2fd4c15ff849bdb89

            SHA1

            0b9d058a484fd1423710b3caebe55e45ecb9c7da

            SHA256

            40631bde2c17cfb75df1b2775581074bf3ab45eee89d5bf0246efe4ffdf15b2e

            SHA512

            60abfcede47d4fbb53d849352008e5cf99fea25dcd0c44cd6ae0413487e9cb757684821da0bafa65b27fbd88d72de89fce188d73157b3afd82c66cdd12f21cdc

          • C:\Users\Admin\Desktop\CloseLimit.3gpp.195-83A-216
            MD5

            2f375be15276a7b590412aed255531ff

            SHA1

            07db9c8bac0b7b54393a4706e6a75168df97b3d9

            SHA256

            aabc1aab700606c6761acc3d92810d5b0501222830f9b00168bca074ac60fabe

            SHA512

            3e3fa82d3fb1bb635ee26df49c89d695800fb9e308554a78ebcf35c50021443498490705c2767e7e59226023f3a98275caf74ad2f9b8c574fb4884540cd55546

          • C:\Users\Admin\Desktop\ConfirmUse.7z.195-83A-216
            MD5

            b38df548067d9c4e08370204d401a102

            SHA1

            8e0dad31b1dd9b45bb636a0dd7f8b39ff37cb170

            SHA256

            3b06f62c0bdfe6aa3378309120535ef1948ded8895fef8243528f1c6bb6937a6

            SHA512

            7f0d1b1e272021deee10fb21b5ebdce8ffe89215cd4b02f1815eb6047d7343164ccbf0b3647899dd4cb9e594735e0986d8524d2331c67d7de62d70e4bf35aaca

          • C:\Users\Admin\Desktop\ConvertConvertFrom.odp.195-83A-216
            MD5

            939ecec547dea272e305ddc90f7032b6

            SHA1

            477deac3f201de63b2fb78937d9f3441a7db6744

            SHA256

            ebaf44da93c2ed15c4aca3a133bc54b47e4441afa1e1eabaec964adab2575354

            SHA512

            09a2891af125bae67ed4ef1889899720cc689b0579586789ca869718fdd905ccfeba35042d8dfb06a3fa595428c92a3c9e652229d7178fb89b3f8f3b24074b34

          • C:\Users\Admin\Desktop\ConvertDisable.potx.195-83A-216
            MD5

            0b277a83fd1d8b38bc3989d08149ca59

            SHA1

            60576fac1027ffe8dccc7178153b27f1e2e7dfeb

            SHA256

            c1716ed2cffbaa6fb4e49f8c6445aa178d1bc0bb3fdf6a8861fc680af2c08ad1

            SHA512

            48eb402b24c715e06314bce0b7da457a52b30bb143321d19a5c3d35a150bacae2526ded325c0c517b4a437e5e6209273de6fc521470d09787d4944964133e694

          • C:\Users\Admin\Desktop\DenyClear.xht.195-83A-216
            MD5

            a0f0a314cd0dc2952e47f8d025f1cc41

            SHA1

            2b6ce31bf5232354ad6f3f43f1eca59e13bae853

            SHA256

            25022b1df84fc1cc7d0b8386f5bfcb253c80bf00caa3d098c692ff08da5b9310

            SHA512

            463ccbf6d6291f990cfb78addeb45c183ef4f359c870a6453895c112f885aa44cda775c390efbb797dbb997a91a400661704aa18d0cc85b5dbec729cf6236fec

          • C:\Users\Admin\Desktop\DisableOptimize.png.195-83A-216
            MD5

            3af8653956fc24d9b4bf7fb1da215765

            SHA1

            5f39c68bd7910b9de20f2b12e103712b6e4809d2

            SHA256

            4c805c7cb5f8561e1e569e5a034c5c1e4f3e7c5c17d76feea34661ce9ce33f83

            SHA512

            e9eaf9a89e909d5d46724ee77098f843aa87a5ea888ddacec1d9b9a37ddb331dd49a27ee2931e61534d207684bbcd29945247d77a4773f5574a57a8198ad9f3d

          • C:\Users\Admin\Desktop\DisableRename.rtf.195-83A-216
            MD5

            08183fd0b97938c26c4a2c23f366ad9c

            SHA1

            db5935a99c8d796dc19d191d1a380fcc5fe00e2f

            SHA256

            f23d1717af056a02ae008ab694da02f4fc249a35df2ce75facf2d2b8e590043e

            SHA512

            36a91bfe28964cc1ff5ac2551e0dc17c271fedc7f582c12aef4d9d5de5eda3f1e282304e7f2080dfc41c35837b9b5222083a8c70a033d54614c808551d45dcce

          • C:\Users\Admin\Desktop\EnableRestore.wav.195-83A-216
            MD5

            528d5f5c94ca69f81a658e420da9bc3b

            SHA1

            e19709c73a320fbb93ec15049d1303cd12d0c61d

            SHA256

            ff9d31449e9af251174612abe6084f55a8499608d59e0c31dcf7fb40676f7106

            SHA512

            ae308d07a392d2532db2daac145faf14974fbb7abcd043353c8c68453bd9752baef09cc851bb6950aa3438e07f18c7a218418eac4110b3b2baedc572bc22f24a

          • C:\Users\Admin\Desktop\GetOut.vsd.195-83A-216
            MD5

            997b7c5d2b6c4ea51a6d0aba5b7d029a

            SHA1

            8ab333a0e520576f2922ba696116789589db1efa

            SHA256

            b0d7864d7a5c9e886ee50fb55209bb91521dcecacd18fca0ec2db47f9bff45f3

            SHA512

            d4884ac8939b04d9a87d03fb4f0faaad36d11701abee4380a78be22a235028af6e2515be8f7f38390af0ef1c054a4b1b217393ac4147365c255af2e175e6b8a2

          • C:\Users\Admin\Desktop\GrantResolve.asx.195-83A-216
            MD5

            55933faf1dfcf9e6cb76d3f58a106d00

            SHA1

            b5820a93def6becc34a2093504d940b66add3e16

            SHA256

            6804d6dd29471f64d1e2f0397cfce6ab971fdd6468509ddde5e5030565d9ebd5

            SHA512

            63dfb0dce4635db4596c4e2b8039e79d132c07d304e147060b3b3e1c375bb4a59f08c57ec5411ad82b0b7b29550ddc1ed30753842d2f7dd4c0d05328dc59e788

          • C:\Users\Admin\Desktop\GroupConvert.vsd.195-83A-216
            MD5

            3ac316e10fe5d1e41926aa753068a1ec

            SHA1

            96fd5f7fcaa3308fcc18c3e4cddfb2e929897958

            SHA256

            0e96f0cd0adfb7cc9a9b98581cf50bb42851bf0d1dfd2a01ede7e476a3a1f1d4

            SHA512

            2ca7014833075f15acd752a0de8be03b717bb61adde0e50cf8bec3706ee57bc1c93300b6e2982d1cd601a5da42d7d9a6097eb503cd10dfe75ead66bfbf94c984

          • C:\Users\Admin\Desktop\HideExit.dotx.195-83A-216
            MD5

            7345d5035628c560edc8df2aeba47e0d

            SHA1

            a1405f8efe32398fa360268658c06c29e383ddf0

            SHA256

            1b6208a6df2d5f6ebf7db154ae0fde1286da2f8e0a5f436549dae7f074ebe12f

            SHA512

            303d61aa72230c705c32be9fac6ef929708c5acd0d9e03bb577fc84c2f2eaebfa7c47fa72f1c1f39aff5be79d1c64e053465a9128709dcf31cccd8287840041a

          • C:\Users\Admin\Desktop\ImportMerge.ppsx.195-83A-216
            MD5

            126f2a182d2237a5811d59cd34159955

            SHA1

            3825d687394a23d652b5e7a8ed34c39aaef0fd50

            SHA256

            adfc6e3a44d080ea877c45ba5d4341d6b3effa53a135d5fbd40b7e7669413d09

            SHA512

            0b1286896e366efb726ca61f6bfce0a03741c530e84953722364125f7a49477560b8079d2d3beb686c18aa9d0b989d58cb2de924729856527b4fa5d1080441c4

          • C:\Users\Admin\Desktop\MeasureRename.mpe.195-83A-216
            MD5

            aa959e184a8fdc4e7df43b9df78544b4

            SHA1

            6f012867e737f0f0b306300a7835c5b06cceb1b8

            SHA256

            4e449c0490df552d3d342e0cc252d43a03d52c4f4f1bb5c9632a4e3a10e0b884

            SHA512

            f7fb09f91c9b38dab8eb09cbc41c2a1834ae186a2afcd48fd1ddf44cb4e768c1c443f8ad5649504ed265e657be997bd05c2aa5373ac1a930ae5704d6f91a56e1

          • C:\Users\Admin\Desktop\OptimizeBackup.otf.195-83A-216
            MD5

            c260bf27bfd1dab481e89774657ce020

            SHA1

            1c9377224a6cb32d798bb97c2da45f7c28986512

            SHA256

            bd177adf9f0a80f79ae5fb5ee77b0360ee8d77f5a054dec947ece41118ec8f72

            SHA512

            ff8c7520813502430728f16ec849aa79e22445e6a892fe1c0e44540123e060fd5bc48edb5634d526e229bc8a2da9ac30546217a1f39ec556d0fb818320872412

          • C:\Users\Admin\Desktop\PublishMerge.htm.195-83A-216
            MD5

            4b1d5da8359d4804e9808cad4a5bfeec

            SHA1

            c50d8aee1ba7a2d05c4484c9034284204f904ec9

            SHA256

            58d498749d55d08be493da69b51975741b1604e64ea7aaac9282074855222f8e

            SHA512

            aae1399018f555432022d04e91ab7135da71d52942d6430a43159d2bd3707097ea57c0a784b4c07e38bf69e023b5603793c437d8f9c79819f487249c5a99b0bd

          • C:\Users\Admin\Desktop\ReceiveAssert.odp.195-83A-216
            MD5

            40924a15e3f48cfaf797a6750893fcd1

            SHA1

            45d1396c392c5ab572b826ceff9c5e331be03996

            SHA256

            4262a85a7f8d53ca86061227779835e376041f655a8702efe88f0138a5dca564

            SHA512

            19b41e8263c7426921a73acaf7d55d9283fb09e05bbb9e9952fb7734a1e8a94aa68cc365ae213806dbf00a6418d54cfb66639380f9389f601f16efc11778626e

          • C:\Users\Admin\Desktop\ResizeConvertTo.emf.195-83A-216
            MD5

            15d10221d24a2b3f0f5ac2bdf34e36a5

            SHA1

            8e66a8dc00cf4aeda6153e10b56da0f05b8ef430

            SHA256

            ac51e6dac46f09597892c44b3f4acd7acc815ee9c119767fb184a32f5f6a7c5b

            SHA512

            ba775cec13c992f20c057474db9d199fe6d76cc58dbcc73d0f0608bf5b303139816f752aa3094f51e29524e3d3204853d9f5f825c2a781639e0cda606136ceff

          • C:\Users\Admin\Desktop\SendTest.iso.195-83A-216
            MD5

            ca8d999b75941cf647b0b9ba5b974eb6

            SHA1

            bfb8800c8f8de9c55670cde1dc68ab309b0f9c90

            SHA256

            3b55fc6f9b7c7e36617c5c56c18d23be353d883462fcf4c9d598e0caf99c5055

            SHA512

            6819c07b40036808fe0aaebc2c98671b1b6c95819973dec4738ccb5ae66f35050e778f44a2188050359dda4c31204eab25171dc93f6ae43cb4317a6cdf3d33f1

          • C:\Users\Admin\Desktop\StartUpdate.rm.195-83A-216
            MD5

            99388b9d2e9e44ae9e238b70318e5f94

            SHA1

            32b2ef23847e7a56b23d08b3fbfaad9c93520f3c

            SHA256

            4b3c0a66714d3f94d6eac8943d955475b31d0115b09a603aa8277138fa4f246e

            SHA512

            3010888537ae7e1c616a85b8d9cf373da40d38c2c12274c6f05a77ea2455e433700d170725f2b802ce79bb0f205250f18fb6374a2fb33d23ab39dc7bbdc7ac35

          • C:\Users\Admin\Desktop\StepSearch.txt.195-83A-216
            MD5

            3a506c3c748822b36111d28304a049eb

            SHA1

            23fc48692155dc2042e97a16a9ce8011e110cf8a

            SHA256

            6a6f56dbb7a2be3110d011c1d759af1349a306237b8894b0734cbd588aaf746b

            SHA512

            69e1e2d78277f76f26fe92bb8b4b759bd5d248ed496d823c1237fafcdfeea27c17c49387713a936f98046d8411fe4597564b1fc99a52c734cb7677695985d7c3

          • C:\Users\Admin\Desktop\SwitchSubmit.dib.195-83A-216
            MD5

            db8997ddc2f7312ed677678b3b5c3c1d

            SHA1

            20ca6fa3de539592eca9061802def7170822fc67

            SHA256

            d511bebc4077c551bc8d5abea688da06beef7879d5cd3b6e9c6bf64837860035

            SHA512

            2e0ef22d188feb9857d09ffc5a978a4783821db2735870815a934daa8a2912b10fbdf91f0266935fca45856c6615c90f822dc9f019fda6983ba12571bd5ea81f

          • C:\Users\Admin\Desktop\SyncUnpublish.js.195-83A-216
            MD5

            46e4c8c03c35c9a7d2db6f5f76f08a13

            SHA1

            0c4242bb6e8cb35651527a9c12aa1e6914f6c7a2

            SHA256

            6d245bd2d37e9f00389a652e5c8c851c16ff6f77bf7f0f79f86a2f328f5b0f83

            SHA512

            474982ea840ca9e9b3edd10b8b736fa93de11d9573d8d34cc020725ddabc6e21b4a52c02a291b868ae131825b95bb6d115f419df73af8aa516a2c75e882783c4

          • \Users\Admin\AppData\Roaming\Microsoft\Windows\taskeng.exe
            MD5

            e26982b170856ca8ca96a2f41b2306fb

            SHA1

            e467f2bc6f01f2a13effaf8f6283d616ccf40e2e

            SHA256

            8d44fdbedd0ec9ae59fad78bdb12d15d6903470eb1046b45c227193b233adda6

            SHA512

            80a636ae53f5049e1ec34e092d91be8f8cc11d1f96eb919bfabd814c677c1e68a773c102b4fd28f2335427173f76203815b60f133d1d4cf0834bded85931af0e

          • memory/432-56-0x0000000000000000-mapping.dmp
          • memory/816-16-0x0000000000000000-mapping.dmp
          • memory/832-20-0x0000000000000000-mapping.dmp
          • memory/972-28-0x0000000000000000-mapping.dmp
          • memory/1008-0-0x000007FEF7770000-0x000007FEF79EA000-memory.dmp
            Filesize

            2.5MB

          • memory/1500-21-0x0000000000000000-mapping.dmp
          • memory/1520-19-0x0000000000000000-mapping.dmp
          • memory/1560-24-0x0000000000000000-mapping.dmp
          • memory/1584-22-0x0000000000000000-mapping.dmp
          • memory/1652-18-0x0000000000000000-mapping.dmp
          • memory/1864-17-0x0000000000000000-mapping.dmp
          • memory/1884-25-0x0000000000000000-mapping.dmp
          • memory/1892-4-0x00000000000A0000-0x00000000000A1000-memory.dmp
            Filesize

            4KB

          • memory/1892-5-0x0000000000000000-mapping.dmp
          • memory/1908-2-0x0000000000000000-mapping.dmp
          • memory/1976-27-0x0000000000000000-mapping.dmp