Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-03-2022 06:17
Static task
static1
Behavioral task
behavioral1
Sample
7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe
Resource
win10v2004-en-20220113
General
-
Target
7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe
-
Size
211KB
-
MD5
6e789d89c3817997e791a62a91a392dd
-
SHA1
b88feefd90de401dabf9f1574fb2b47de608b010
-
SHA256
7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16
-
SHA512
ab76d49de89d4e8c734bcb4ccd61dd71466a8cbb594eb152e35fea3806324ca9b05b60662f32e57b1d4461c38b8ff2cf631a267b7a3e5000b9977625dbaa8e3c
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exesvchost.exepid process 596 svchost.exe 620 svchost.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
svchost.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\DisableCompress.tiff svchost.exe File opened for modification C:\Users\Admin\Pictures\EnterSwitch.tiff svchost.exe -
Loads dropped DLL 2 IoCs
Processes:
7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exepid process 760 7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe 760 7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run 7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\svchost.exe\" -start" 7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
svchost.exedescription ioc process File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\A: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\P: svchost.exe -
Drops file in Program Files directory 64 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OIS_COL.HXT.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files\Java\jre7\lib\javaws.jar svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00423_.WMF.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\CALENDAR.GIF svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Premium.css svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\AddToViewArrowMask.bmp.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Singapore svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLJRNL.FAE.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OIS_COL.HXC.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SMSL.ICO svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN020.XML.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\adobepdf.xdc.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02066_.WMF.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\CT_ROOTS.XML.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\WebToolIconImagesMask.bmp svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Port_of_Spain svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\VPREVIEW.EXE.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00191_.WMF.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Verve.thmx.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GrayCheck\TAB_ON.GIF svchost.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\art\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0234376.WMF svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\VDK10.LIC.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0297757.WMF svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Pushpin.xml svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL010.XML svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\common.luac.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\vimeo.luac.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL105.XML.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB11.BDR.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Dataset.zip.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\java.security svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\view.html svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\about.html svchost.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382950.JPG.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382954.JPG.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00917_.WMF svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01294_.GIF svchost.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Postage_ButtonGraphic.png svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Casablanca svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\CNFNOT.CFG svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02755U.BMP svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Form.zip svchost.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\jaccess.jar.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_ef8c08_256x240.png.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01239_.GIF.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Median.xml svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XML2WORD.XSL.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR7B.GIF svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Novokuznetsk svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.nl_zh_4.4.0.v20140623020002.jar svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\PersonalContact.ico svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\JUNGLE.GIF.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0217698.WMF.1B0-3EA-C30 svchost.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT svchost.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\MahjongMCE.png svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME02.CSS.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\StatusAway.ico.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107500.WMF svchost.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PRRTINST.WMF.1B0-3EA-C30 svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\javaws.policy svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.core.commands.nl_ja_4.4.0.v20140623020002.jar svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1720 892 WerFault.exe notepad.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exedescription pid process Token: SeDebugPrivilege 596 svchost.exe Token: SeDebugPrivilege 596 svchost.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exesvchost.exenotepad.exedescription pid process target process PID 760 wrote to memory of 596 760 7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe svchost.exe PID 760 wrote to memory of 596 760 7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe svchost.exe PID 760 wrote to memory of 596 760 7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe svchost.exe PID 760 wrote to memory of 596 760 7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe svchost.exe PID 596 wrote to memory of 620 596 svchost.exe svchost.exe PID 596 wrote to memory of 620 596 svchost.exe svchost.exe PID 596 wrote to memory of 620 596 svchost.exe svchost.exe PID 596 wrote to memory of 620 596 svchost.exe svchost.exe PID 596 wrote to memory of 892 596 svchost.exe notepad.exe PID 596 wrote to memory of 892 596 svchost.exe notepad.exe PID 596 wrote to memory of 892 596 svchost.exe notepad.exe PID 596 wrote to memory of 892 596 svchost.exe notepad.exe PID 596 wrote to memory of 892 596 svchost.exe notepad.exe PID 596 wrote to memory of 892 596 svchost.exe notepad.exe PID 596 wrote to memory of 892 596 svchost.exe notepad.exe PID 892 wrote to memory of 1720 892 notepad.exe WerFault.exe PID 892 wrote to memory of 1720 892 notepad.exe WerFault.exe PID 892 wrote to memory of 1720 892 notepad.exe WerFault.exe PID 892 wrote to memory of 1720 892 notepad.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe"C:\Users\Admin\AppData\Local\Temp\7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exe" -agent 03⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 892 -s 1964⤵
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exeMD5
6e789d89c3817997e791a62a91a392dd
SHA1b88feefd90de401dabf9f1574fb2b47de608b010
SHA2567b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16
SHA512ab76d49de89d4e8c734bcb4ccd61dd71466a8cbb594eb152e35fea3806324ca9b05b60662f32e57b1d4461c38b8ff2cf631a267b7a3e5000b9977625dbaa8e3c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exeMD5
6e789d89c3817997e791a62a91a392dd
SHA1b88feefd90de401dabf9f1574fb2b47de608b010
SHA2567b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16
SHA512ab76d49de89d4e8c734bcb4ccd61dd71466a8cbb594eb152e35fea3806324ca9b05b60662f32e57b1d4461c38b8ff2cf631a267b7a3e5000b9977625dbaa8e3c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exeMD5
6e789d89c3817997e791a62a91a392dd
SHA1b88feefd90de401dabf9f1574fb2b47de608b010
SHA2567b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16
SHA512ab76d49de89d4e8c734bcb4ccd61dd71466a8cbb594eb152e35fea3806324ca9b05b60662f32e57b1d4461c38b8ff2cf631a267b7a3e5000b9977625dbaa8e3c
-
C:\Users\Admin\Desktop\ApproveConvertFrom.midi.1B0-3EA-C30MD5
c23e71dcc40867472e4b32dab803b339
SHA1909194f21d0aacd77fe19bb0ff8743b821e57565
SHA25660ad5f959c8c3a640e605190b0c38bb09dce0b2aa53c03fd36e0bb03957c77ec
SHA512f4b1c494c18cfe80aaf468e234734d5c6f48d2da9eb3dccf26ccdb28d5a7c0efff8a6b2ab773192386defe6ee89fd993c004179adfc485c04a4500935744735d
-
C:\Users\Admin\Desktop\AssertAdd.cab.1B0-3EA-C30MD5
2e40394a0789291c05b04394f2ec97f0
SHA1c5493e88c43b2df823d90fc884950a41adf4f5f8
SHA256fe7b885b66bed1c07b61bbd46506cacf5fa1d4ca85fc3011be5724db5446bf48
SHA5123161ea434f31dd252682451a7979bf6f7584f12e18946c0a1961f9873c0ff575cb83d592bf7a84be20eee3ac65da0d005b8bb5374d71e9c89ad6cd4fa1087fdc
-
C:\Users\Admin\Desktop\BlockExport.3g2.1B0-3EA-C30MD5
ec8db76fad727ac554c0bb824c04b949
SHA1d66f9e7dd8e39a4e57b4d3868dc5e5bace237dd4
SHA256681145fc385b100915717f54fddc84f72c0fd321388416f7ef50e34f48de99b7
SHA51275e648eeaad03df56bb0de60ca2785b43aea3e3f3f31d6afd99c808c09c39c9248b0119171d1140ba24a99937566fe07ee9f2c166cc7ae7dee620138f3ebc8a2
-
C:\Users\Admin\Desktop\BlockWatch.emf.1B0-3EA-C30MD5
0370c73c106344ee1996e8359e237791
SHA12a93aa55a606b0c4e1f53414f63a16e81d6efa8e
SHA2560585c3053e5e3ef6fbe87ce709c6ad89897cd7e4f314c0991fc207e9dafe9284
SHA51242db96c23816e3e46e6b71169e7d4a05612396f5e55b707b9b12e63a0b9b56c9dac105d903f369b36087f0c686c96fe99c01beb8a758995dcd7083674d27793b
-
C:\Users\Admin\Desktop\CheckpointConvertTo.wmf.1B0-3EA-C30MD5
0c186028cf4be3b5726855ea90e6f6dd
SHA1ba807af20a5e5ac75f90620b713ba6c71f4fb29c
SHA256f766ea5912382ac4a9e8be257381af490ba2d96236f0d5b2f1f7eee6174c7ef9
SHA512e71b759fe0ee87befeb75d9a4d85694894f9161f7700196c3f2153955759f55483037a9bdb33fb8fd0fc5d417176f2282f16c41c1c1ab159943475ff85ec0c36
-
C:\Users\Admin\Desktop\ConfirmShow.vstm.1B0-3EA-C30MD5
72efda3525c2de1135196ff66eb6c7bb
SHA14980a3c027ca10a4edf2a6535da0a3182b7e3926
SHA256bae86e2e285a170b6daa5ba21de0251bff7d97488d4b17df23e1602a4c88260c
SHA51252fdef22ed93746038f675c5823e6601873efa7f57e650680a722e6fe1dc5d874153cc1967700667cce58458498b318682b51e3907fa42cecd4ec6385573a3c2
-
C:\Users\Admin\Desktop\DisableSet.vsd.1B0-3EA-C30MD5
87d7f34de70570ebfe619142bc9be894
SHA1ca665c5d1f3ddaa7069ff180fdb753b5e76bbcfb
SHA256d250927ae3d36a13682ac206012a11a2de8e649c45ab59d228502321f553d35b
SHA512b909d158bd18c2fe0b850fde5f3c2dd60f3e871ce8c5a737d4c1cf3589e83835b5d7751eecf87f5b6f9f8cb0d1535ffc766231efe32d37d7a1238df6e3a210f4
-
C:\Users\Admin\Desktop\DismountUnprotect.3gpp.1B0-3EA-C30MD5
41aafeec70f9147540a3380c1967b895
SHA1c67bcecd82fa7f51b7486a29bea3b9938a494437
SHA256673a67d0a56dfa5ed746d8e8ac4357c0daf5500ca57ed4b7b96db18034a607ea
SHA512abf459122a5dacce19c6c9aebc486e11447a541a2ec8de2c038266405683a1ff23fab9d5f59da1afd46a5a370e051be2a44b4bc7838c0d5518813e58f2234bfc
-
C:\Users\Admin\Desktop\EnterWatch.odt.1B0-3EA-C30MD5
82ddc806f6a9a9b28ae41417d3a7d4e0
SHA1c6620a01f664bb798b8c3f7e5ce537d2e79adb4a
SHA256656c9a9e22b411e262ae6cdfc8ef39030ff2b05fd796d64fec6ca64b50c143bc
SHA512dcb0ac78d83142403f381e63f4dde7cf4c464920e2b9dadb07287f4bc7d86ad82036007bd7f31176327106f3844e0a1f593161639fdcc546d0de93f6f870894e
-
C:\Users\Admin\Desktop\ExportOut.reg.1B0-3EA-C30MD5
b3c2b65d41e39dcbe74d994301d0e3bf
SHA1a80e78a70eb4af239f5c53c51c155c58510cb856
SHA256c7a2becea6bf1fb32620d8b458377410188fc885fa00de83b6320694fdf6bb12
SHA5125902bcbc34f9f0dbe77089f8c527d08db96854c559ce87164258335ef6c97363b82d4707484fee31b1c7cb0174b249faf8f51bb8394f6f1a48fb7729e1de2d39
-
C:\Users\Admin\Desktop\GetLimit.png.1B0-3EA-C30MD5
7c8a326c7017a88d0c7e138f7817881e
SHA13286ecbca3053c92d7ee4083136db70813c00503
SHA256ced9a958be5e7e8d4dd06448fb863687ae3aa51a97fa5088a56c7d09e187dde2
SHA512722ee93fe45c9165f4746445de8982fed5c71f5a2c7516607a752b8043f8376314560e808943fe4bc036315aab2ab793337e6b750c5d809d6353355cc276502c
-
C:\Users\Admin\Desktop\GetSwitch.nfo.1B0-3EA-C30MD5
098e5c8e049e22152faa5a555eb070d7
SHA102a7484ca7e5e21ae813134778f31410f4fca577
SHA256556b6584c8e7ce89b35b7d89db7f26f04553351cb13bfde0ff313180e79cd12e
SHA51293a169c236f8b6e4c04ad891299d4243e256787bf5f599c26b3e175f2984b9c025426574c38eedae49e0a607b4fd6cd0cc80ce3e3418c08e1b19bd9ed7d01405
-
C:\Users\Admin\Desktop\JoinWait.html.1B0-3EA-C30MD5
c809863af23a05d2120b2162ff0cbb43
SHA1891e7ba9014e057eec4b379dbb65f690c3515791
SHA256c7a3db39a01c6a1dee08d4f466c57071829cbd53153631a33f36423284b5ca0f
SHA51228c53b35d5034684e81d8c39af51eb5760ea71d73a1cf40145241c510fc55545e2a905b2c6cb06d4e3b796020a1401eb92fbd6fa0270808003cb1bb41694f369
-
C:\Users\Admin\Desktop\PushReset.pps.1B0-3EA-C30MD5
1749add2b8c802eea786fefff7d5818c
SHA1e76448de2295430fafe11952b948f8b4e6c7f9fc
SHA25656946b08ab442ad2aa2545c8b52ab34f714884b6add7d08ad68a5c4f95861f1c
SHA5124f1760ded6af829dabaa38658d9e506e693f71d4c9d5c4c0ff2cea447ddd975e200b7fbda56bc9b1c42b07bf93062a153864cc9fde7053f3806749e8e1718c5a
-
C:\Users\Admin\Desktop\RegisterExport.html.1B0-3EA-C30MD5
b8036fc984bb1d7f5e4c18fb3ed7684d
SHA1f24fbda3b139c44be23d04ea291b8963be295368
SHA25667752357a5333c695c6523709032cd25cdbb2dc0aaa2eeaeac50d2b93a8eed2e
SHA51208c4641f102c775e849b1eac2607d41d737b28bbacf2403b6aefc64b22a4692d118ad2f4fbe313415a991d4889fa8ec9961457e1d0bb6a9c50be8449a7b23e1f
-
C:\Users\Admin\Desktop\RequestRevoke.mp3.1B0-3EA-C30MD5
e6e9d6fd70b9fec6cbbe127cf67e24de
SHA1f7a25596e7fe985ef7e0a226e2884afe69591241
SHA256002042a2f9099d08fdb2a592806b676d2f10ae4e456b2e0123a1077323d05747
SHA5124e99427701960ca76d3fb4cc4ec77cbf1640e8558948b61d7f4301dca6c0176ba52da9dcf4bc7e9f7125f065bc0cd3143ef09725a577b27dab06e43e5ab9381d
-
C:\Users\Admin\Desktop\RevokeUninstall.otf.1B0-3EA-C30MD5
066916979aecf0d32b2d26b96cf7a4d0
SHA1b89d5d7546742e733eeb3aa1ce71cbf7def770d9
SHA256987d64bc8d86c501c3aebeb49e63178e373945a608f656a2e8c292aaa482733e
SHA5122ef45d887c6c4c1a5013ab0ef059950e4bb140af902609ae077fc5e111259bea95ed26a3e8b43906738ae716521f7eba88c5b836ed80576a5807dfbb75d62281
-
C:\Users\Admin\Desktop\SearchPing.vbs.1B0-3EA-C30MD5
5dc7ff0086a59d7634247ac2a94fd3dd
SHA1cd006615b582cb9a4d3342a2b54336d3962a2401
SHA256c34fb77f5f3556dd0d4c74e6fd424f0dbde1eaf7054486250a03d373449e5481
SHA512c818cdc741fa3780dcabd9b30fd7c102c229591feb89701b2b34310b1012343cb117cab69269c2cdc49f59708d4981a908f04af099c1b64a9fd76d88eb022516
-
C:\Users\Admin\Desktop\SelectClose.docx.1B0-3EA-C30MD5
36f8ebd04cc5b89152dc5d0802e0bea3
SHA16379d6f2a934f5fba254184c21869cd67fee0774
SHA25681bf113bf95c79cb824bd6aa256a502f561d60454aa3d42ac17162f5c75e341c
SHA512b9c44ce43e8ba36901433739486f21834054cc26582a6418c5702931122d61c1ac8754684afe0465951d3f26e1d98ae2439ba10b5ed4c7b7e4ef90765c27f411
-
C:\Users\Admin\Desktop\SetUndo.wvx.1B0-3EA-C30MD5
1a169bc31640f35a920a42a2197a0706
SHA11aecd844cff0c550e2df53cf8a3007ea49efbd13
SHA2563919e0136ac0ac81538bad9956d15ef61795dd6d8ecf572800d916c5814fbcfe
SHA51225228a80998e849ce64ed7de82e3a7d66dfbb599c2b454e762b9af0547b8b2eb8e75b7253648649e5b554b74baf73eaae4cde4ba7c69157c00b32b0f5fe23b37
-
C:\Users\Admin\Desktop\StepDeny.dwfx.1B0-3EA-C30MD5
eb10a93622327c0ca9113fa0f2f51e4e
SHA165933b5b42321bffd443bf16a58b2eac110613bc
SHA256e57c172af49acc180a32c14326d7ac6b92d6df8d6e2ff7ca5189fbf4c42ea10d
SHA512c8d0463b34f51866e976f483c26a23685b9f9189cd8bbbe63b7b51a1f8ea18210355bb0e6044aac40376b47104674c873f4d0c86f1e21d705dc8fe0cb9710ad8
-
C:\Users\Admin\Desktop\StepRestore.reg.1B0-3EA-C30MD5
e7fffa559e39151188b6f89ab3249e7c
SHA11872c91a88b3b749f0112eddd951c7069e6df963
SHA25692d72eab6130c4d19c80938bf51cae69a9342db22ff1b3960920de1dcde1480c
SHA51232c056dd76359938014036e7860023a413f5072d476d4a70beef9d207f9f9df3bdfbdc38064971697042a86319fa6da1eef59d7e92767efda333833fa0e63dee
-
C:\Users\Admin\Desktop\SwitchMerge.nfo.1B0-3EA-C30MD5
ae3500e47769b9e5188c9e0ca2586c34
SHA139b03168218b79ad5fb1821e5762f42e85d2459d
SHA256cb681176c8b97931ec0d10a2d107e66eb7293667ca30261cf8d8db0f68fbede0
SHA51201990121c1064dbf8f6702410f4ccc2fecd7324fc6c6164e256411ba7a80821b44b0c10363e0849d717eba26fcabc03c4495fe00bfd9e3b4e70d8d0fc7d76f6a
-
C:\Users\Admin\Desktop\UnprotectShow.mpg.1B0-3EA-C30MD5
c10619bdc6d43e2063b70db86f3a7348
SHA1b2c6b6f6a3596104a6e82274586b949a00678e6f
SHA256855368140370559a221dbfd691a888f31b76f7ee58a1da96d73690234cc44bc7
SHA51247985b107532ef02c9cc7585bc54cbce27bd08882c8c4a5c198b0a272e949ee20cee187dda299dcfd3e9e59ff8bfc3c7859dc23252bbb3642e771eee7da05fcc
-
C:\Users\Admin\Desktop\UseComplete.docx.1B0-3EA-C30MD5
705dc800063d292d8decb97a413b9835
SHA1102fbd7e6138b0d08c2e0203d792c18580f5107b
SHA256ad3c650f2913499dc7284a4b919b75a2d0666ab7631b08ec345ae38f87de04c1
SHA51257a47ac7f4e517136927f32659f2da8ddf8c0e85f5d4343027915c13660dd0154578e927bdee9e27a5b43257d8859198429c5a9b0c8bb2483603df3dda0b7bf9
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exeMD5
6e789d89c3817997e791a62a91a392dd
SHA1b88feefd90de401dabf9f1574fb2b47de608b010
SHA2567b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16
SHA512ab76d49de89d4e8c734bcb4ccd61dd71466a8cbb594eb152e35fea3806324ca9b05b60662f32e57b1d4461c38b8ff2cf631a267b7a3e5000b9977625dbaa8e3c
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\svchost.exeMD5
6e789d89c3817997e791a62a91a392dd
SHA1b88feefd90de401dabf9f1574fb2b47de608b010
SHA2567b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16
SHA512ab76d49de89d4e8c734bcb4ccd61dd71466a8cbb594eb152e35fea3806324ca9b05b60662f32e57b1d4461c38b8ff2cf631a267b7a3e5000b9977625dbaa8e3c
-
memory/760-55-0x0000000076071000-0x0000000076073000-memory.dmpFilesize
8KB
-
memory/892-88-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB