Analysis

  • max time kernel
    152s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    31-08-2021 15:15

General

  • Target

    2678ce604cb3012749c9bf1ee41b5d9974a4d398d9733723a01a0262b25b34c4.exe

  • Size

    271KB

  • MD5

    c5ef03ef2f2fe79aaa5c89dc4c57d4d6

  • SHA1

    aeb47342503ac38543f1524f069931fa3e564ed6

  • SHA256

    2678ce604cb3012749c9bf1ee41b5d9974a4d398d9733723a01a0262b25b34c4

  • SHA512

    9a1ac46b8e112780add70c1986d147b486a129567d53fed69aaa709fd8efcac4c843f15dfefab2e278d7fbd98c10877b7e88608ef04b9f50e4f647bd951ee6f1

Malware Config

Extracted

Path

C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT

Family

buran

Ransom Note
!!! ALL YOUR FILES ARE ENCRYPTED !!! All your files, documents, photos, databases and other important files are encrypted. You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique private key. Only we can give you this key and only we can recover your files. PAY FAST 500$=0.013 btc or the price will increase tomorrow bitcoin address bc1qqxnp9z0ff8x852dyflp5r9r6rzse8jl5hzmqz8 To be sure we have the decryptor and it works you can send an email: [email protected] and decrypt one file for free. But this file should be of not valuable! Do you really want to restore your files? [email protected] TELEGRAM @ payfast290 Your personal ID: 24A-53B-A87 Attention! * Do not rename encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam.

Extracted

Family

smokeloader

Version

2020

C2

http://readinglistforaugust1.xyz/

http://readinglistforaugust2.xyz/

http://readinglistforaugust3.xyz/

http://readinglistforaugust4.xyz/

http://readinglistforaugust5.xyz/

http://readinglistforaugust6.xyz/

http://readinglistforaugust7.xyz/

http://readinglistforaugust8.xyz/

http://readinglistforaugust9.xyz/

http://readinglistforaugust10.xyz/

http://readinglistforaugust1.site/

http://readinglistforaugust2.site/

http://readinglistforaugust3.site/

http://readinglistforaugust4.site/

http://readinglistforaugust5.site/

http://readinglistforaugust6.site/

http://readinglistforaugust7.site/

http://readinglistforaugust8.site/

http://readinglistforaugust9.site/

http://readinglistforaugust10.site/

rc4.i32
rc4.i32

Signatures

  • Buran

    Ransomware-as-a-service based on the VegaLocker family first identified in 2019.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Executes dropped EXE 4 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Interacts with shadow copies 2 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies registry class 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2678ce604cb3012749c9bf1ee41b5d9974a4d398d9733723a01a0262b25b34c4.exe
    "C:\Users\Admin\AppData\Local\Temp\2678ce604cb3012749c9bf1ee41b5d9974a4d398d9733723a01a0262b25b34c4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Users\Admin\AppData\Local\Temp\2678ce604cb3012749c9bf1ee41b5d9974a4d398d9733723a01a0262b25b34c4.exe
      "C:\Users\Admin\AppData\Local\Temp\2678ce604cb3012749c9bf1ee41b5d9974a4d398d9733723a01a0262b25b34c4.exe"
      2⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2548
  • C:\Users\Admin\AppData\Local\Temp\9C17.exe
    C:\Users\Admin\AppData\Local\Temp\9C17.exe
    1⤵
    • Executes dropped EXE
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -start
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious use of WriteProcessMemory
      PID:4016
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete
        3⤵
          PID:1552
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic shadowcopy delete
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3640
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no
          3⤵
            PID:3952
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet
            3⤵
              PID:3636
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet
              3⤵
                PID:4000
                • C:\Windows\SysWOW64\vssadmin.exe
                  vssadmin delete shadows /all /quiet
                  4⤵
                  • Interacts with shadow copies
                  PID:3944
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat
                3⤵
                  PID:2984
                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                    wmic shadowcopy delete
                    4⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2208
                  • C:\Windows\SysWOW64\vssadmin.exe
                    vssadmin delete shadows /all /quiet
                    4⤵
                    • Interacts with shadow copies
                    PID:3628
                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe" -agent 0
                  3⤵
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  PID:3364
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures
                  3⤵
                    PID:1516
                  • C:\Windows\SysWOW64\notepad.exe
                    notepad.exe
                    3⤵
                      PID:3148
                  • C:\Windows\SysWOW64\notepad.exe
                    notepad.exe
                    2⤵
                      PID:2900
                  • C:\Users\Admin\AppData\Local\Temp\9FA2.exe
                    C:\Users\Admin\AppData\Local\Temp\9FA2.exe
                    1⤵
                    • Executes dropped EXE
                    • Checks BIOS information in registry
                    • Checks whether UAC is enabled
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    PID:1284
                  • C:\Windows\SysWOW64\explorer.exe
                    C:\Windows\SysWOW64\explorer.exe
                    1⤵
                      PID:428
                    • C:\Windows\explorer.exe
                      C:\Windows\explorer.exe
                      1⤵
                        PID:3956
                      • C:\Windows\SysWOW64\explorer.exe
                        C:\Windows\SysWOW64\explorer.exe
                        1⤵
                          PID:2372
                        • C:\Windows\explorer.exe
                          C:\Windows\explorer.exe
                          1⤵
                            PID:1724
                          • C:\Windows\SysWOW64\explorer.exe
                            C:\Windows\SysWOW64\explorer.exe
                            1⤵
                              PID:3144
                            • C:\Windows\explorer.exe
                              C:\Windows\explorer.exe
                              1⤵
                                PID:1592
                              • C:\Windows\SysWOW64\explorer.exe
                                C:\Windows\SysWOW64\explorer.exe
                                1⤵
                                  PID:2288
                                • C:\Windows\explorer.exe
                                  C:\Windows\explorer.exe
                                  1⤵
                                    PID:2204
                                  • C:\Windows\SysWOW64\explorer.exe
                                    C:\Windows\SysWOW64\explorer.exe
                                    1⤵
                                      PID:3720
                                    • C:\Windows\system32\vssvc.exe
                                      C:\Windows\system32\vssvc.exe
                                      1⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1344

                                    Network

                                    MITRE ATT&CK Enterprise v6

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

                                      MD5

                                      bc382383b6c90d20dba3f58aa0f40ade

                                      SHA1

                                      b626e4d049d88702236910b302c955eecc8c7d5f

                                      SHA256

                                      bf25937b534e738f02e5ec01592dd9a72d79e67bc32f3a5e157a0608f5bbd117

                                      SHA512

                                      651e85acf56ec7bffdc10941ba3bcebea5aede44d479e4db5d61160de2b975c484499a95564adaf90f350d6a1bf3aa97774019f1464045114cbb97806fc76c2f

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE

                                      MD5

                                      a2981517afbb3ebe48d2168b07274f47

                                      SHA1

                                      78e0fa382ca97436ec5c43209a2e391b41d356ab

                                      SHA256

                                      f5ef795d1577213ce930034afc93387232cc95dfe53db40db0ed65fbb44bcfae

                                      SHA512

                                      4e939a2270036ebf0eaec96ba231eb38cb4e2389064a30e5f3b9e5e5581d363ab934431e69978e015f25f3352d17e3b3242d02357aa034838a94912fa8d6ba15

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                      MD5

                                      0465994d32988b4ff5811340c4905188

                                      SHA1

                                      7b4043cbd9509bc78b08863ad22b720632686785

                                      SHA256

                                      b33b95c79ca7fc2da4e43282f29ec14db42bdafd53c8888de793cea52caa20bb

                                      SHA512

                                      04654263a6391c84e0fd230a992dbd107f905599a066d124055591ce19a9d74b61627bb9d4dc9df89f396b12f795b649f0331e4aad39304a5ad0e0bccc36ad43

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB

                                      MD5

                                      8797ba09838a26d1f2799e33fd16b142

                                      SHA1

                                      6005bf3e3af39699fe1ff8d361d54a61612ddb4c

                                      SHA256

                                      cb3bb4f39f27c3accde5cefd90a77473cd7b377144a6c7a9ed7743790d8b5515

                                      SHA512

                                      0bae6d2f0c36d85d29d6c613bb2098d6d75c0da1f56cb13a565157d990c894a8acaf5a872c64cb21cb400a05b46cd51f342171902d809233fccc4b38d0f4a316

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE

                                      MD5

                                      25b21206ee0a7692bdce1ea09f18417d

                                      SHA1

                                      618d996d49db517c486fb6f07faf25dbc9d4704c

                                      SHA256

                                      d8c7b48174e4361158d6dbf0b9a71f287b6a987a7c73d6dbfd13706a10ee93b3

                                      SHA512

                                      2860227897dcc42b6030f7d7fc2f725753e0e86a2a4e9c97e3ddce630f3db3bda47f59ddf669c965fdf9133153e6fedb8ecaec3c54f0b934e65fd296810fe8b0

                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                                      MD5

                                      2cdc380b6127831276e323b4a1d24e23

                                      SHA1

                                      3032391fa59ba7edc97321543e0b5d47da545616

                                      SHA256

                                      7273b64e4365bfa34fb7d9078bc5aeddcb83e7500f30395daf1e211fa60b8da3

                                      SHA512

                                      97cd0b2149f1f4a3fa5192e7a6fdfaa4fd96ad8aded28a0a79aa07d2998517e5f60c4829231395671b8fa98e64e670a9d1628fe91afd6883b4f7f6aed98290b9

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DRMDU4BX\TPTPCN9C.htm

                                      MD5

                                      b1cd7c031debba3a5c77b39b6791c1a7

                                      SHA1

                                      e5d91e14e9c685b06f00e550d9e189deb2075f76

                                      SHA256

                                      57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

                                      SHA512

                                      d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\ZIIA2USJ\HDY8B0X8.htm

                                      MD5

                                      8615e70875c2cc0b9db16027b9adf11d

                                      SHA1

                                      4ed62cf405311c0ff562a3c59334a15ddc4f1bf9

                                      SHA256

                                      da96949ba6b0567343f144486505c8c8fa1d892fd88c9cbc3ef3d751a570724d

                                      SHA512

                                      cd9dfc88dc2af9438b7d6b618d1b62029b3bdf739fc4daa5b37397afd12c4528561b3bf2fc3f3f2adf3fd1f582d5524332441fd30248fcd078e41aa91e17cb73

                                    • C:\Users\Admin\AppData\Local\Temp\9C17.exe

                                      MD5

                                      bdfde890a781bf135e6eb4339ff9424f

                                      SHA1

                                      a5bfca4601242d3ff52962432efb15ab9202217f

                                      SHA256

                                      b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                      SHA512

                                      7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                    • C:\Users\Admin\AppData\Local\Temp\9C17.exe

                                      MD5

                                      bdfde890a781bf135e6eb4339ff9424f

                                      SHA1

                                      a5bfca4601242d3ff52962432efb15ab9202217f

                                      SHA256

                                      b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                      SHA512

                                      7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                    • C:\Users\Admin\AppData\Local\Temp\9FA2.exe

                                      MD5

                                      47a68cf6b107308db52aa7335cfe44a4

                                      SHA1

                                      ffcc95c0e88766768e1eb0eed3388f48ce6306f7

                                      SHA256

                                      52d699631ae78b87cc151948a6626394d0a428f8d99004ef5c747c8cc9a56735

                                      SHA512

                                      a46a607a5130b23ed000d585458918e6933f016eb20b916f01e9e3aa065e2ae720ea5922ae2a5b1baf6f890f85c04f69638248e15614815c78355d88c6e61702

                                    • C:\Users\Admin\AppData\Local\Temp\9FA2.exe

                                      MD5

                                      47a68cf6b107308db52aa7335cfe44a4

                                      SHA1

                                      ffcc95c0e88766768e1eb0eed3388f48ce6306f7

                                      SHA256

                                      52d699631ae78b87cc151948a6626394d0a428f8d99004ef5c747c8cc9a56735

                                      SHA512

                                      a46a607a5130b23ed000d585458918e6933f016eb20b916f01e9e3aa065e2ae720ea5922ae2a5b1baf6f890f85c04f69638248e15614815c78355d88c6e61702

                                    • C:\Users\Admin\AppData\Local\Temp\~temp001.bat

                                      MD5

                                      ef572e2c7b1bbd57654b36e8dcfdc37a

                                      SHA1

                                      b84c4db6d0dfd415c289d0c8ae099aea4001e3b7

                                      SHA256

                                      e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64

                                      SHA512

                                      b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe

                                      MD5

                                      bdfde890a781bf135e6eb4339ff9424f

                                      SHA1

                                      a5bfca4601242d3ff52962432efb15ab9202217f

                                      SHA256

                                      b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                      SHA512

                                      7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe

                                      MD5

                                      bdfde890a781bf135e6eb4339ff9424f

                                      SHA1

                                      a5bfca4601242d3ff52962432efb15ab9202217f

                                      SHA256

                                      b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                      SHA512

                                      7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\lsass.exe

                                      MD5

                                      bdfde890a781bf135e6eb4339ff9424f

                                      SHA1

                                      a5bfca4601242d3ff52962432efb15ab9202217f

                                      SHA256

                                      b7972505fc2b3b41383bc9022824130ef912145ff1d858555536df477c3a59f5

                                      SHA512

                                      7af519bbda4994a15789520a56b4a961187aa64ef284830a0e8a083cb5257f9606a7e4647278ce9e2c01995f627dc83aa0750b9f7a1273218618f65af0f2a15b

                                    • C:\Users\Admin\Desktop\AddApprove.txt.payfast290.24A-53B-A87

                                      MD5

                                      21188e352b362fb42c7bedf9e78d55c2

                                      SHA1

                                      aac47b105b33f113531f5e99a856d387d38998c6

                                      SHA256

                                      98faf2c4caf4b3f4ae72b8cc7c7480a0904b962a710ed5818986a91495a5f1e8

                                      SHA512

                                      af065aceeec71f3e89e27d94e56177aa3a0b5235b2db9cdba48109e9799b603449bfe0175adacb5acee679b66f48c1b4b5354a43e87b45253098958d34b2c864

                                    • C:\Users\Admin\Desktop\ResizeImport.contact.payfast290.24A-53B-A87

                                      MD5

                                      3068b17f3062070302944845e0e36ac3

                                      SHA1

                                      c3b5bafa58956d4ee2a71d17bc1ba8e259e3df92

                                      SHA256

                                      82cab286567e8d9324e4eece0c5b59178d17db37672dbf55400f60e8bc77ad39

                                      SHA512

                                      708a60796323fb02af08d29bff4cc879e109c8bf28190c1ecabac7d4cd3a14fcfdf2829029fcb30f9b5235c91c3f3a48f2c57e8505e4200b80a0ad84980af30c

                                    • C:\Users\Admin\Desktop\ShowComplete.dxf.payfast290.24A-53B-A87

                                      MD5

                                      b1fdff297900a2b1e691b3581d7d59e4

                                      SHA1

                                      e4cdb0d2daa5695a57550eddb6ada17f44114b24

                                      SHA256

                                      3a920f945e5ee8501a356c0e4f989fe1769cbf1705e13f2c58d391e8d2de88db

                                      SHA512

                                      1077907d5693558347a9a1052cd25ec735052dc03bd88141d51224a51e53af9a287a1d2fbfe401803aaf0a42dc99cd6e508afa17c016ababc6610d4ebb8e6c26

                                    • C:\Users\Admin\Desktop\ShowRedo.rm.payfast290.24A-53B-A87

                                      MD5

                                      d57308b35f0fc10594c9ca000b4c0494

                                      SHA1

                                      6266ec7058b3df2daf7c2018ec264f73a86078cc

                                      SHA256

                                      090f2d55b0ad75025580a74d57027bc7c01a137103c3c9b7ec1956d5e75072a0

                                      SHA512

                                      b5c3b1d355c514d22412f38bf7f4ba3468a87793b220b0fdbbb6cf2adf54007f9050b84ff26d9e6a49a8a0fd01564f4e3d67e9953859acd400e42325dcc432d7

                                    • C:\Users\Admin\Desktop\SkipRename.i64.payfast290.24A-53B-A87

                                      MD5

                                      175dc2d01b59300bb6d18ccc6e0981e5

                                      SHA1

                                      0a003de505142b3c499c4a7c0c6b16b92f6f78fa

                                      SHA256

                                      af123ade940db11787d1b3bea7e2a7354197dfc909f260c22cd75486af9a8dd3

                                      SHA512

                                      ddad9efffa2098846805ee8e4dc52c69c9d71e8f8db9fcca9daaf254c2158fd96b7242bb1fbff04617ff10a30ebc8304dbea9253573dc2a7e4470337793e0211

                                    • C:\Users\Admin\Desktop\SuspendLock.au3.payfast290.24A-53B-A87

                                      MD5

                                      25cb6b5c0a7b28e014a546d47c2b64d9

                                      SHA1

                                      8c416d54ee7fea79536073f6d50524e39146f0b5

                                      SHA256

                                      baa9765c6ef572400a504694c4df2cde3afa90a76db096fcb32b57cea760d55d

                                      SHA512

                                      4e7a95cea50ef56d70d37caaf9cb419cbc916428c70d873b904c70d203ad3ddcba974f64ee91e3b12a1fd159769574330293d3143c43d5be490ef2f682b4c07e

                                    • C:\Users\Admin\Desktop\UnregisterReceive.midi.payfast290.24A-53B-A87

                                      MD5

                                      b934530f76de7ac782b249e3680978d1

                                      SHA1

                                      3589b673b8dd4b079119442a3755619e4bbaac70

                                      SHA256

                                      dc5c9400a126a4636d12b87eef48a465f0a9ca5d99b03a4d61901659a0060071

                                      SHA512

                                      7a0701d0127f4f2e2b4fadcde297d1619f28d74d8877dd9a39137fa61ee8a7225506829cb1796de9e19fb1e2e792472f471453e48a1340c3219b3c1e668b58a1

                                    • C:\Users\Admin\Desktop\UpdateDeny.rar.payfast290.24A-53B-A87

                                      MD5

                                      bcf12576920a4f4819e208692a345fe8

                                      SHA1

                                      cfd56a66f2889173fbc8f2e36956c88269462c33

                                      SHA256

                                      c4f3a9375a8331888a6dfe70f193e1e32f262474cbba2dfb22578b33e0c76aaf

                                      SHA512

                                      f5636df9de5c8d8c0163059ac63b3954fe483a7d6e56a436c14b9b77b2b78294be7bda9b443517bbce0eb9ac94d1c1e724b7bcc43c634747045a9844be8f73f7

                                    • C:\Users\Admin\Desktop\WaitImport.mpa.payfast290.24A-53B-A87

                                      MD5

                                      550b68fab0514f757b82e435e1a10672

                                      SHA1

                                      fdf4d77d283adfe75c8dc4c238c84dc090f938dc

                                      SHA256

                                      2782f1cd178183c2e3f9a71e03c4bc95ca1c8b6a3928a8ada2a8c4a5b6cacccd

                                      SHA512

                                      d1b5e1bf2b0c791c3db6f88daf2207fa97d1aeb1a8edd942495ff4cc85b11718d8aac2fb3d25c5059079d48c921e92ed6cb1ee27722fdeeaec7cb77f7c396018

                                    • C:\Users\Admin\Desktop\WatchInstall.clr.payfast290.24A-53B-A87

                                      MD5

                                      4bb68bbaa5d271a034dca0f777a8a82b

                                      SHA1

                                      0b36f6bca5ad6c69d5aa96cf5c59331f385194fe

                                      SHA256

                                      a5cb03b541721a78c3a529fe78e219e758117ae206532dcc77f77d273ce1a216

                                      SHA512

                                      d53da2059a3d5c295aeb330d27b1b06b5e09e42908241622dd9ae68d08918a89a6d592a089776e9d4a4ba58547b62affe79d77806687136cc1703044499cfc86

                                    • memory/428-126-0x0000000000A00000-0x0000000000A6B000-memory.dmp

                                      Filesize

                                      428KB

                                    • memory/428-124-0x0000000000000000-mapping.dmp

                                    • memory/428-125-0x0000000000A70000-0x0000000000AE4000-memory.dmp

                                      Filesize

                                      464KB

                                    • memory/940-118-0x0000000000000000-mapping.dmp

                                    • memory/1284-121-0x0000000000000000-mapping.dmp

                                    • memory/1284-153-0x0000000005B30000-0x0000000005B31000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1284-129-0x00000000008F0000-0x00000000008F1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1284-135-0x0000000006230000-0x0000000006231000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1284-192-0x0000000007520000-0x0000000007521000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1284-144-0x0000000005C20000-0x0000000005C21000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1284-193-0x0000000007B50000-0x0000000007B51000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1284-131-0x0000000077870000-0x00000000779FE000-memory.dmp

                                      Filesize

                                      1.6MB

                                    • memory/1284-191-0x0000000008670000-0x0000000008671000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1284-190-0x0000000007830000-0x0000000007831000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1284-189-0x0000000007710000-0x0000000007711000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1284-157-0x0000000005C10000-0x0000000005C11000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1284-188-0x0000000007C40000-0x0000000007C41000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1284-159-0x0000000005B70000-0x0000000005B71000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1284-187-0x0000000007540000-0x0000000007541000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1284-138-0x0000000005AD0000-0x0000000005AD1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/1516-176-0x0000000000000000-mapping.dmp

                                    • memory/1552-174-0x0000000000000000-mapping.dmp

                                    • memory/1592-164-0x0000000000120000-0x000000000012C000-memory.dmp

                                      Filesize

                                      48KB

                                    • memory/1592-163-0x0000000000130000-0x0000000000136000-memory.dmp

                                      Filesize

                                      24KB

                                    • memory/1592-162-0x0000000000000000-mapping.dmp

                                    • memory/1724-154-0x0000000001020000-0x0000000001029000-memory.dmp

                                      Filesize

                                      36KB

                                    • memory/1724-155-0x0000000001010000-0x000000000101F000-memory.dmp

                                      Filesize

                                      60KB

                                    • memory/1724-145-0x0000000000000000-mapping.dmp

                                    • memory/2204-168-0x0000000000000000-mapping.dmp

                                    • memory/2204-171-0x00000000001A0000-0x00000000001A9000-memory.dmp

                                      Filesize

                                      36KB

                                    • memory/2204-170-0x00000000001B0000-0x00000000001B5000-memory.dmp

                                      Filesize

                                      20KB

                                    • memory/2208-185-0x0000000000000000-mapping.dmp

                                    • memory/2288-165-0x0000000000000000-mapping.dmp

                                    • memory/2288-166-0x0000000000C30000-0x0000000000C34000-memory.dmp

                                      Filesize

                                      16KB

                                    • memory/2288-167-0x0000000000C20000-0x0000000000C29000-memory.dmp

                                      Filesize

                                      36KB

                                    • memory/2372-142-0x0000000000C50000-0x0000000000C5B000-memory.dmp

                                      Filesize

                                      44KB

                                    • memory/2372-141-0x0000000000C60000-0x0000000000C67000-memory.dmp

                                      Filesize

                                      28KB

                                    • memory/2372-134-0x0000000000000000-mapping.dmp

                                    • memory/2548-116-0x0000000000402FAB-mapping.dmp

                                    • memory/2548-115-0x0000000000400000-0x0000000000409000-memory.dmp

                                      Filesize

                                      36KB

                                    • memory/2900-140-0x0000000000000000-mapping.dmp

                                    • memory/2900-156-0x0000000000600000-0x0000000000601000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2984-179-0x0000000000000000-mapping.dmp

                                    • memory/3028-117-0x0000000000E00000-0x0000000000E16000-memory.dmp

                                      Filesize

                                      88KB

                                    • memory/3144-161-0x0000000000CF0000-0x0000000000CF9000-memory.dmp

                                      Filesize

                                      36KB

                                    • memory/3144-158-0x0000000000000000-mapping.dmp

                                    • memory/3144-160-0x0000000000D00000-0x0000000000D05000-memory.dmp

                                      Filesize

                                      20KB

                                    • memory/3364-180-0x0000000000000000-mapping.dmp

                                    • memory/3628-186-0x0000000000000000-mapping.dmp

                                    • memory/3636-177-0x0000000000000000-mapping.dmp

                                    • memory/3640-184-0x0000000000000000-mapping.dmp

                                    • memory/3720-173-0x0000000000B20000-0x0000000000B29000-memory.dmp

                                      Filesize

                                      36KB

                                    • memory/3720-169-0x0000000000000000-mapping.dmp

                                    • memory/3720-172-0x0000000000B30000-0x0000000000B35000-memory.dmp

                                      Filesize

                                      20KB

                                    • memory/3944-182-0x0000000000000000-mapping.dmp

                                    • memory/3952-175-0x0000000000000000-mapping.dmp

                                    • memory/3956-133-0x0000000000B60000-0x0000000000B6C000-memory.dmp

                                      Filesize

                                      48KB

                                    • memory/3956-132-0x0000000000B70000-0x0000000000B77000-memory.dmp

                                      Filesize

                                      28KB

                                    • memory/3956-127-0x0000000000000000-mapping.dmp

                                    • memory/4000-178-0x0000000000000000-mapping.dmp

                                    • memory/4016-136-0x0000000000000000-mapping.dmp

                                    • memory/4016-114-0x0000000000030000-0x000000000003A000-memory.dmp

                                      Filesize

                                      40KB