Analysis
-
max time kernel
4294208s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
05-03-2022 18:01
Static task
static1
Behavioral task
behavioral1
Sample
442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe
Resource
win10v2004-en-20220113
General
-
Target
442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe
-
Size
214KB
-
MD5
2f1ecf99dd8a2648dd013c5fe6ecb6f5
-
SHA1
121c377693b96eef8e84861f091ef47e6fb6cae5
-
SHA256
442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024
-
SHA512
793eb6a3f3d0323b0749a35e372c9fcde15a912f32d74fc5fa0fc104c32d8348f431347fefd1c34e3d51d9b20432f8e66b9ae3b9523b4b4b21e76b6fd2ae8219
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
uspex1@cock.li
uspex2@cock.li
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\BackupUse.tiff 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Users\Admin\Pictures\RemoveFind.tiff 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exedescription ioc process File opened (read-only) \??\K: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\J: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\I: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\A: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\Z: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\Y: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\W: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\L: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\F: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\B: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\U: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\Q: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\O: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\N: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\R: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\P: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\E: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\X: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\V: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\T: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\S: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\M: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\H: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened (read-only) \??\G: 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 geoiptool.com -
Drops file in Program Files directory 64 IoCs
Processes:
442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exedescription ioc process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.batik.css_1.7.0.v201011041433.jar.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jre7\bin\server\Xusage.txt.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01146_.WMF.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_de_DE.jar 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BOAT.WMF.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\SpringGreen\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Puerto_Rico.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\help.gif.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Panama 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00235_.WMF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02187_.GIF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\RESENDS.ICO.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Dawson_Creek 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jre7\lib\javafx.properties.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Halifax.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0318810.WMF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsPrintTemplate.html.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File created C:\Program Files\VideoLAN\VLC\locale\pa\LC_MESSAGES\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0156537.WMF.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR37F.GIF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\META-INF\ECLIPSE_.RSA 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-swing-plaf_zh_CN.jar 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099162.JPG.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\org.eclipse.equinox.p2.metadata.repository.prefs 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kathmandu 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105414.WMF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\ENVHM.POC.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jre7\lib\images\cursors\win32_MoveDrop32x32.gif.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Syowa.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt55.ths.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101860.BMP.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN097.XML.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\NavigationLeft_SelectionSubpicture.png 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Baghdad 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jetty.continuation_8.1.14.v20131031.jar.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00236_.WMF.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectStatusIconsMask.bmp 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.console_1.1.0.v20140131-1639.jar 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.transport.ecf.nl_ja_4.4.0.v20140623020002.jar 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.syntheticattribute.exsd.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BOATINST.WMF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VisioCustom.propdesc 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Budapest.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SECRECS.ICO 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsHomePage.html.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-sampler_ja.jar.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\SY______.PFB.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01046J.JPG.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Modern.dotx.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\RSPMECH.POC 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\en-US\shvlzm.exe.mui.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02384_.WMF.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSACCESS.DEV_F_COL.HXK 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\POWERPNT.HXS.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Detroit.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.services.nl_zh_4.4.0.v20140623020002.jar 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPBluTSFrame.png.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsViewAttachmentIcons.jpg.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EquityMergeFax.Dotx.42A-DB3-1AF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\NavigationRight_SelectionSubpicture.png 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04269_.WMF 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1740 1136 WerFault.exe notepad.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 540 vssadmin.exe 1748 vssadmin.exe -
Processes:
442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exeWMIC.exevssvc.exedescription pid process Token: SeIncreaseQuotaPrivilege 1832 WMIC.exe Token: SeSecurityPrivilege 1832 WMIC.exe Token: SeTakeOwnershipPrivilege 1832 WMIC.exe Token: SeLoadDriverPrivilege 1832 WMIC.exe Token: SeSystemProfilePrivilege 1832 WMIC.exe Token: SeSystemtimePrivilege 1832 WMIC.exe Token: SeProfSingleProcessPrivilege 1832 WMIC.exe Token: SeIncBasePriorityPrivilege 1832 WMIC.exe Token: SeCreatePagefilePrivilege 1832 WMIC.exe Token: SeBackupPrivilege 1832 WMIC.exe Token: SeRestorePrivilege 1832 WMIC.exe Token: SeShutdownPrivilege 1832 WMIC.exe Token: SeDebugPrivilege 1832 WMIC.exe Token: SeSystemEnvironmentPrivilege 1832 WMIC.exe Token: SeRemoteShutdownPrivilege 1832 WMIC.exe Token: SeUndockPrivilege 1832 WMIC.exe Token: SeManageVolumePrivilege 1832 WMIC.exe Token: 33 1832 WMIC.exe Token: 34 1832 WMIC.exe Token: 35 1832 WMIC.exe Token: SeIncreaseQuotaPrivilege 1684 WMIC.exe Token: SeSecurityPrivilege 1684 WMIC.exe Token: SeTakeOwnershipPrivilege 1684 WMIC.exe Token: SeLoadDriverPrivilege 1684 WMIC.exe Token: SeSystemProfilePrivilege 1684 WMIC.exe Token: SeSystemtimePrivilege 1684 WMIC.exe Token: SeProfSingleProcessPrivilege 1684 WMIC.exe Token: SeIncBasePriorityPrivilege 1684 WMIC.exe Token: SeCreatePagefilePrivilege 1684 WMIC.exe Token: SeBackupPrivilege 1684 WMIC.exe Token: SeRestorePrivilege 1684 WMIC.exe Token: SeShutdownPrivilege 1684 WMIC.exe Token: SeDebugPrivilege 1684 WMIC.exe Token: SeSystemEnvironmentPrivilege 1684 WMIC.exe Token: SeRemoteShutdownPrivilege 1684 WMIC.exe Token: SeUndockPrivilege 1684 WMIC.exe Token: SeManageVolumePrivilege 1684 WMIC.exe Token: 33 1684 WMIC.exe Token: 34 1684 WMIC.exe Token: 35 1684 WMIC.exe Token: SeBackupPrivilege 1980 vssvc.exe Token: SeRestorePrivilege 1980 vssvc.exe Token: SeAuditPrivilege 1980 vssvc.exe Token: SeIncreaseQuotaPrivilege 1832 WMIC.exe Token: SeSecurityPrivilege 1832 WMIC.exe Token: SeTakeOwnershipPrivilege 1832 WMIC.exe Token: SeLoadDriverPrivilege 1832 WMIC.exe Token: SeSystemProfilePrivilege 1832 WMIC.exe Token: SeSystemtimePrivilege 1832 WMIC.exe Token: SeProfSingleProcessPrivilege 1832 WMIC.exe Token: SeIncBasePriorityPrivilege 1832 WMIC.exe Token: SeCreatePagefilePrivilege 1832 WMIC.exe Token: SeBackupPrivilege 1832 WMIC.exe Token: SeRestorePrivilege 1832 WMIC.exe Token: SeShutdownPrivilege 1832 WMIC.exe Token: SeDebugPrivilege 1832 WMIC.exe Token: SeSystemEnvironmentPrivilege 1832 WMIC.exe Token: SeRemoteShutdownPrivilege 1832 WMIC.exe Token: SeUndockPrivilege 1832 WMIC.exe Token: SeManageVolumePrivilege 1832 WMIC.exe Token: 33 1832 WMIC.exe Token: 34 1832 WMIC.exe Token: 35 1832 WMIC.exe Token: SeIncreaseQuotaPrivilege 1684 WMIC.exe -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.execmd.execmd.execmd.exenotepad.exedescription pid process target process PID 1160 wrote to memory of 1116 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1116 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1116 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1116 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1320 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1320 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1320 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1320 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 744 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 744 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 744 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 744 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1868 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1868 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1868 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1868 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1728 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1728 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1728 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1728 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1660 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1660 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1660 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 1660 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe cmd.exe PID 1160 wrote to memory of 2004 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe PID 1160 wrote to memory of 2004 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe PID 1160 wrote to memory of 2004 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe PID 1160 wrote to memory of 2004 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe PID 1116 wrote to memory of 1832 1116 cmd.exe WMIC.exe PID 1116 wrote to memory of 1832 1116 cmd.exe WMIC.exe PID 1116 wrote to memory of 1832 1116 cmd.exe WMIC.exe PID 1116 wrote to memory of 1832 1116 cmd.exe WMIC.exe PID 1728 wrote to memory of 540 1728 cmd.exe vssadmin.exe PID 1728 wrote to memory of 540 1728 cmd.exe vssadmin.exe PID 1728 wrote to memory of 540 1728 cmd.exe vssadmin.exe PID 1728 wrote to memory of 540 1728 cmd.exe vssadmin.exe PID 1660 wrote to memory of 1684 1660 cmd.exe WMIC.exe PID 1660 wrote to memory of 1684 1660 cmd.exe WMIC.exe PID 1660 wrote to memory of 1684 1660 cmd.exe WMIC.exe PID 1660 wrote to memory of 1684 1660 cmd.exe WMIC.exe PID 1660 wrote to memory of 1748 1660 cmd.exe vssadmin.exe PID 1660 wrote to memory of 1748 1660 cmd.exe vssadmin.exe PID 1660 wrote to memory of 1748 1660 cmd.exe vssadmin.exe PID 1660 wrote to memory of 1748 1660 cmd.exe vssadmin.exe PID 1160 wrote to memory of 1136 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe notepad.exe PID 1160 wrote to memory of 1136 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe notepad.exe PID 1160 wrote to memory of 1136 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe notepad.exe PID 1160 wrote to memory of 1136 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe notepad.exe PID 1160 wrote to memory of 1136 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe notepad.exe PID 1160 wrote to memory of 1136 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe notepad.exe PID 1160 wrote to memory of 1136 1160 442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe notepad.exe PID 1136 wrote to memory of 1740 1136 notepad.exe WerFault.exe PID 1136 wrote to memory of 1740 1136 notepad.exe WerFault.exe PID 1136 wrote to memory of 1740 1136 notepad.exe WerFault.exe PID 1136 wrote to memory of 1740 1136 notepad.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe"C:\Users\Admin\AppData\Local\Temp\442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe"1⤵
- Enumerates connected drives
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wmic shadowcopy delete2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C bcdedit /set {default} recoveryenabled no2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C vssadmin delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C wbadmin delete catalog -quiet2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\~temp001.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Users\Admin\AppData\Local\Temp\442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe"C:\Users\Admin\AppData\Local\Temp\442bf867c8738c7231ff09db0715ec79d0ae15c050fbd46946c45b76a040d024.exe" -agent 02⤵
- Modifies extensions of user files
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\notepad.exenotepad.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 1963⤵
- Program crash
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\~temp001.batMD5
ef572e2c7b1bbd57654b36e8dcfdc37a
SHA1b84c4db6d0dfd415c289d0c8ae099aea4001e3b7
SHA256e6e609db3f387f42bfd16dd9e5695ddc2b73d86ae12baf4f0dfc4edda4a96a64
SHA512b8c014b242e8e8f42da37b75fe96c52cd25ebd366d0b5103bcba5ac041806d13142a62351edecdee583d494d2a120f9b330f6229b1b5fe820e1c7d98981089e9
-
C:\Users\Admin\Desktop\ConvertFromCopy.vsd.42A-DB3-1AFMD5
d911cc2b188defb8cbbd06dd96dae331
SHA1de68da4414f8fe148ef1ac78c81f49242930b709
SHA2561e31f1c5c237f8a916aa8948db9191b041a64e50e9d54d8041f3c8cc4bd771a4
SHA5121e8a66f3ddf863d16653d39041097e7fc68d58ff7db1a9c167093aa228371136eb8909df4da5b3f89749506d506a3d4db5ede84bb8d4209a1ff3e5860834e144
-
C:\Users\Admin\Desktop\DisableBlock.contact.42A-DB3-1AFMD5
1a1c540a7bcc7f186a2b7b3a41340d58
SHA16c6f80e0b6669e6bee971a62e28dddf1b32c2fc7
SHA2565530fe4575064f3166b89f7f83c6cf3f00b53427d53bdf55f7ec48ea8c601951
SHA512058cf05d5c0e929369c0992acc35f559ca72b284d86118288d2a8aa1539b09c1a9628e7b9bc166c8465f5a2c4f7c77b30e0c7bd483ed826de7cf733a91b7ad9c
-
C:\Users\Admin\Desktop\DisconnectDebug.mht.42A-DB3-1AFMD5
b27ce1968aace270ec36f933da8a37bf
SHA10c658c0ca313c22aa4ad324c55305d2f9f72f010
SHA256ed53220ead700f057b78c4fd4870ce8a9a9132a8f5140c4d3c4d87006e65b9c2
SHA51207d2740ce835cd07185daeac20a5430e0e9f942d35bb04a7992ab115404cdf401c18ec3ce1cc2753d45b48ccbfbd7bc5ab0098b193a0ae101754724cbd3e8750
-
C:\Users\Admin\Desktop\EnableProtect.vsd.42A-DB3-1AFMD5
9a31863af4c5d7c80a539847dfd7a626
SHA186aa8f1aa17d32e83aff1cb3d23489bd791b414c
SHA256d286ce65d537f0b173170dc86e49a9892ba48d3f708dbb14174036acf27fddaf
SHA512f752858d71d12348e0cb7dbeab0ab75e428e9c2b9c55a8eab46480531fe4e0a6fbeff1f40695c2778fa4bfe8ecc31dcaba0b248feabfd79cf8954ac86638aafc
-
C:\Users\Admin\Desktop\EnterExpand.dib.42A-DB3-1AFMD5
a7b19f63c38f6fd7b3f8fdf749bba797
SHA1af5caf53cbfd4b9dec8ef404adab4d3a053b19e1
SHA256702b2cc4f83fc014df136ad47cf1cd297a670d746dda3db2e5a239b51816a4ff
SHA5126ed9c7d845351ee19a925613e2dd80ac039c211215fec8334d780de1f54775b37832c65c1a8214b981f5589186919e0efb78c7cf653a87d8e374b56198dc7cf4
-
C:\Users\Admin\Desktop\GetSuspend.mpe.42A-DB3-1AFMD5
448062c21b0a384f15afd3f3093195de
SHA1dba80a1c87287c9bf3a310a74086ab6bf6db2fca
SHA256c3815317654e2c1433b5c38b8230d40454cf8f8f5e1d0f4a1e11eb89fd338134
SHA51278d8358b727e8adf27920707e54074b027f379eaac27094e9ac62b1318822fa164f820c8d767b2fa6d248f6e620e877d6307e9fa7642f75f791f27cb69e98bb9
-
C:\Users\Admin\Desktop\GroupBlock.txt.42A-DB3-1AFMD5
09baeb96c08babc646163c8da3a69cb9
SHA17074f66a258e1ee4812148f665e197b715d3f992
SHA2568b6d145ba48852a1fd277cce6229c0aeafd677c29179b8485ed1d9c49b813465
SHA51281664176903713fe0d4838f1e1af5d491f39228264164711dd29d56a7c82079eb4c3546185387facc49592213684405470e70f8bcc51fbc1104853830a005945
-
C:\Users\Admin\Desktop\HideUpdate.jpg.42A-DB3-1AFMD5
a3a4f8825c7cbafbc16b501751044dbf
SHA114a057a2aea5f5a43c38f7c1bcf5beb325190940
SHA2564870ccdfde81f38384c3255cc43782e117b4f32dc93c5db825aa222b6c60de54
SHA512c82317255796aa9a4c78d0dbed4160c981b3524896274902ffe01a4483b392643d2fadea712e2cae355d392ca1501bda17f905a82b88c058dc9a20257469b3cc
-
C:\Users\Admin\Desktop\MountSearch.iso.42A-DB3-1AFMD5
e006d6c02cd7c388027fb975e801492d
SHA1b24e551729e7a837e6041f6bcf754d4dd2a03fdd
SHA2566561d336387f0faa7b792407fb5136b76792c5220b715c44c05132eba60557ec
SHA51285b401231b23f2cc5352e7963606457b8da3c5ed857b3cf1b3c164895b06854728b1c27fa7990a094ad97cb6bafdbd166820a26bcdd1ae81be71264b534c0b3b
-
C:\Users\Admin\Desktop\OpenGroup.vbe.42A-DB3-1AFMD5
17d25e40bb8d38bceb2148026fb3e06a
SHA14a1c08c630725f57e90815eddffd3a901a232e0b
SHA25660e59a72b4393cc23f9e038fdce9aeb436e2e43cb31a76af5dc4efa96ca59001
SHA512c564f906cabbaf0c10b0a54332f84390357ebc1401c0cacd54a57802fe57621f2fabc318791ac9b4018b9f1b7855f122740ecd8f2c5a5a035f1f16adcd81d02c
-
C:\Users\Admin\Desktop\PopComplete.vst.42A-DB3-1AFMD5
b40269c796101e8ae5a337b5c7560275
SHA1c3beb542ef5bc66078d116629645f579dd28cf6d
SHA256c1b3e5b679f2611138c95a88bedf85f391d750e2c396e33201d26a9ba3fcd94a
SHA512ffa5bd16712599aeed1c3399a3ae35b2c6f07870674ad1ac58a726f7d3ef3d7c6a6b306ca1ede4569ac19d262f483f80649f7aab6ea666a0f4a2e81413b1f11a
-
C:\Users\Admin\Desktop\PopReset.pps.42A-DB3-1AFMD5
790d6fc7b3a40cc4dde2a98a2fc49791
SHA1d7b210e673598bef8c15abccc8c657c86b72fa6c
SHA2562f4fb97a1801cc8bbcbb75576010d56224c836ea94963d76f4cd0004d9cacc75
SHA512b07a5d2b3c350c69ac7e92366a48a1b609c7bb1f49592f3dcf53db61560d93e3dc275c57bcfbaa4c8ffbc7fa3d91f49ee38f7c522137a65825a97ecbcd3d8847
-
C:\Users\Admin\Desktop\ReadLimit.rtf.42A-DB3-1AFMD5
8f345f49f9ef07049c828c008e158d36
SHA1e95ff32048b0111fcc6a14734058a6277f25a8ef
SHA2560c76558a48073b684aebd51774a4eee72de0bdb031b4a9e36455a63c26955634
SHA51219748d13b6899b12841ecb20d98e795a86e9cc3f7d3906cf520299b8968b0dbfc07068f0649032c2fdee7efc5f093909dd9db0a8464071cdee6b05ddf48f49b6
-
C:\Users\Admin\Desktop\RepairConvertTo.iso.42A-DB3-1AFMD5
335e234a45ba5e752bf55564a473db62
SHA1a801c596a8b9c0b5d4c5c017e01f8bfa04000fcb
SHA256ce559d3ab8541bafd12802cf36aac5b8206e468fdc339f87109ebddffffed94d
SHA51211aac73e5ea4509eacc8381c47a8cbd2e5564f70edf25662d3634ff6e1454d7c61da5cc19e66e8e42f502273e14a5be18e80f869c14633d76ad354eeb380e990
-
C:\Users\Admin\Desktop\RequestProtect.mhtml.42A-DB3-1AFMD5
472e6f627cf64f3fb888f59c6d25c3a7
SHA14a0997926d12537fb3da57556e5a1b626f053ddd
SHA25656d7a687c2c1037fe0ef144bf8c7e21c97ca8070c0a73716e4e28acb6ffebc6a
SHA5121749777538875b98802e70058143f188b94c971b41a26fbd8d368595f67d12d815914dcce38e042a2aabce389ac6243810f8f4599f9aacbe84bfdd35daebece5
-
C:\Users\Admin\Desktop\ResolveInstall.wma.42A-DB3-1AFMD5
abbdcc6ae87f1908e2137cc664038a94
SHA138155d07d4291d99f203f9cac23922d7cd4f2723
SHA25692d55f1950ee0bcf876bb2c1086caab32211392529807fca49c70845c1ba3eb4
SHA51243be620624899f7fd3641778313384303dae275453a326fae3c26bea4c6d1ae963f218bc74494ae4f871ae3e6f2ce65f0aef33506f55716c99cd1b63ddd7932e
-
C:\Users\Admin\Desktop\SaveExit.ex_.42A-DB3-1AFMD5
b3be15cd2994ce67db6197d74f016428
SHA11b2c022232a10480440b1bb3588c6caeb6c5125c
SHA2563a3e53a4996afe8c14ea58d0aca86cddefa600e2bad7047d130501a5adc3618b
SHA512bcf0dc85f6ab14738965080512dee720308b0ad6706b0ad77b446f0722dd59aeb1be4dd603069baed57f0424c7a0b45d8cab96d4f9a87dd67f58ae6505579a43
-
C:\Users\Admin\Desktop\ShowSend.xlsm.42A-DB3-1AFMD5
5ff14d39df216422b40ee8c221be1102
SHA1c7dd1453ab64d48ea078fe60c50e92fe16558b87
SHA256edefa84d89f2669aac02aa1a465f9359eba8c790470098cff2e9de97c35ca81b
SHA5125e37baa5325984f7f4fb056cf178c322c8b6d98e85679bff444de0faf144b2360069997ca4d42fc7992f6627c5268df3f097ee2dca92d4d38e2fec6c11ecccfb
-
C:\Users\Admin\Desktop\SkipSubmit.vssx.42A-DB3-1AFMD5
d5611b15a4dc4363408485d65fdb9c17
SHA131337f7cef29ab409b433fde4df8896d641a6cad
SHA2568b7f647acc6181d3c44fbabd1d309a21edcb63250c3b87dc99c095e16387d7e9
SHA512d379cd7b317827c880104fd94175efc0d46f48107fb5890364555b59f5ff71bde97c9f00de15e15ca416c3fe05788f736177302a7e4357b1f5112e4450131171
-
C:\Users\Admin\Desktop\SplitNew.odp.42A-DB3-1AFMD5
66d0f848f7993c02e0ca070d5a277adf
SHA19c6c1385aa22b9ed348765f19b679130030ccd08
SHA25637f6d7ba82d1d79a00b8eb0415abc6f62460e6ce464c8b18fd2864e54fcfc80c
SHA51255fd6350a368b4855c6ed954a5fbdcc94318936dab2e0821833fb5fe07127dce353ff75f883f280765cd8217bd3b97eee362e6d23ec75061f461989ec573df4b
-
C:\Users\Admin\Desktop\SuspendRestore.mov.42A-DB3-1AFMD5
f723f11e7adfea3cca376ae4fa997eec
SHA19309c5ef94acbd1905f7c6d89434c971b603d7ac
SHA256714f606793b5fbe0f85c2df6953cc80b87eb85dd4a4d55e3b1edfb44bb297838
SHA5122ae1194433bade9fa1106513609f156711f7a758dce614c68df0ed822509b7c21e5ad5105f6649d0c058f060700db30dc27c2d054e9db1e273d7840087992cc4
-
C:\Users\Admin\Desktop\TraceRemove.raw.42A-DB3-1AFMD5
b00452834663cff2de5cba9ccd0f8655
SHA1c8d0524fd09250f951b04819df6752d0ad3277ba
SHA256e2ba45fe1796e2a21201e1184f9b8ec4d9e8c1a4448bb4efdcd04e5e30676d61
SHA512d4f08d3cb3a202947dcdcc69594a6fd67f0bee83f0b96dcc20685a3f384eab436fffe80eb6ffe52efd6e87baef670f11b3ad7c641dcd922fdc8af5547a6680bc
-
C:\Users\Admin\Desktop\UnblockApprove.ps1.42A-DB3-1AFMD5
8ddda32b5638ecdd22a21a9e999a0e4e
SHA19587a69bf37c35165e439b7039840956a4bcb718
SHA256cba803f5f8438f8608f00de58dfdf3912edc2935492a293e3a9bf98067ddb9ae
SHA512df91df31ff3d1e0da4d36ba6dfacd9225a27227e1f68f2f1c62c7bd3fbf33bf15514b134f4ac3502478daf871f601cf89fe3a595e2f87c961f13ccc1324a620b
-
memory/1136-80-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/1160-54-0x00000000752A1000-0x00000000752A3000-memory.dmpFilesize
8KB