Analysis
-
max time kernel
98s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
06-03-2022 06:17
Static task
static1
Behavioral task
behavioral1
Sample
7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe
Resource
win10v2004-en-20220113
General
-
Target
7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe
-
Size
211KB
-
MD5
6e789d89c3817997e791a62a91a392dd
-
SHA1
b88feefd90de401dabf9f1574fb2b47de608b010
-
SHA256
7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16
-
SHA512
ab76d49de89d4e8c734bcb4ccd61dd71466a8cbb594eb152e35fea3806324ca9b05b60662f32e57b1d4461c38b8ff2cf631a267b7a3e5000b9977625dbaa8e3c
Malware Config
Extracted
C:\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT
buran
Signatures
-
Buran
Ransomware-as-a-service based on the VegaLocker family first identified in 2019.
-
Executes dropped EXE 2 IoCs
Processes:
smss.exesmss.exepid process 4752 smss.exe 4840 smss.exe -
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
smss.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\AssertConvert.tiff smss.exe File opened for modification C:\Users\Admin\Pictures\UseFind.tiff smss.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation 7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Software\Microsoft\Windows\CurrentVersion\Run 7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe Set value (str) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\smss.exe\" -start" 7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
smss.exedescription ioc process File opened (read-only) \??\K: smss.exe File opened (read-only) \??\J: smss.exe File opened (read-only) \??\H: smss.exe File opened (read-only) \??\B: smss.exe File opened (read-only) \??\Z: smss.exe File opened (read-only) \??\V: smss.exe File opened (read-only) \??\Q: smss.exe File opened (read-only) \??\O: smss.exe File opened (read-only) \??\N: smss.exe File opened (read-only) \??\A: smss.exe File opened (read-only) \??\X: smss.exe File opened (read-only) \??\R: smss.exe File opened (read-only) \??\M: smss.exe File opened (read-only) \??\I: smss.exe File opened (read-only) \??\F: smss.exe File opened (read-only) \??\E: smss.exe File opened (read-only) \??\W: smss.exe File opened (read-only) \??\T: smss.exe File opened (read-only) \??\S: smss.exe File opened (read-only) \??\P: smss.exe File opened (read-only) \??\L: smss.exe File opened (read-only) \??\G: smss.exe File opened (read-only) \??\Y: smss.exe File opened (read-only) \??\U: smss.exe -
Drops file in Program Files directory 64 IoCs
Processes:
smss.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-40_altform-unplated_contrast-white.png smss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\CalculatorStoreLogo.contrast-white_scale-100.png smss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-48_altform-lightunplated_devicefamily-colorfulunplated.png smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\logo_retina.png.354-97A-B1F smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\editpdf.svg.354-97A-B1F smss.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\hu-hu\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-execution.xml.354-97A-B1F smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL118.XML smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE.354-97A-B1F smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\POWERPNT_K_COL.HXK.354-97A-B1F smss.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Outlook.scale-150.png smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\WelcomeCardRdr.png.354-97A-B1F smss.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Standard2019VL_MAK_AE-ppd.xrm-ms smss.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\GetStartedMedTile.scale-200_contrast-white.png smss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MixedRealityPortalAppList.targetsize-72_altform-unplated_contrast-white.png smss.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Advanced-Dark.scale-100.png smss.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\hu-hu\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PersonaSpy\Office.Runtime.js smss.exe File opened for modification C:\Program Files\Microsoft Office\root\fre\StartMenu_Win10_RTL.mp4 smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\+Connect to New Data Source.odc.354-97A-B1F smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\QuickStyles\linesdistinctive.dotx smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN107.XML smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\cardview-addtotable.png.354-97A-B1F smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rcp.application.zh_CN_5.5.0.165303.jar smss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubLargeTile.scale-200_contrast-black.png smss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\SuggestionsService\PushpinDark.png smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\en-ae\ui-strings.js.354-97A-B1F smss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppxMetadata\CodeIntegrity.cat smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogoSmall.contrast-black_scale-180.png.354-97A-B1F smss.exe File created C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\warning.png smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\uk-ua\ui-strings.js.354-97A-B1F smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fr-fr\ui-strings.js.354-97A-B1F smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\ui-strings.js.354-97A-B1F smss.exe File opened for modification C:\Program Files\ConvertFromClose.png.354-97A-B1F smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\fr-fr\ui-strings.js smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\es-es\ui-strings.js.354-97A-B1F smss.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\sk-sk\!!! ALL YOUR FILES ARE ENCRYPTED !!!.TXT smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Ion.thmx.354-97A-B1F smss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_2019.904.1644.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x smss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxManifest.xml smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\delete.svg.354-97A-B1F smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\ccloud_retina.png smss.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Getstarted_8.2.22942.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\GetStartedSplash.scale-200_contrast-white.png smss.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_MAKC2R-ppd.xrm-ms smss.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\vlc.mo smss.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\extensions\VLSub.luac.354-97A-B1F smss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\WideTile.scale-200_contrast-black.png smss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\WinMetadata\Microsoft.UI.Xaml.winmd smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\s_agreement_filetype.svg smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\core_icons.png.354-97A-B1F smss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\META-INF\MANIFEST.MF smss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Win10\AdCloseButton.png smss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\TelemetryUWP.winmd smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_unshare_18.svg smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\dark\arrow-down-pressed.gif smss.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\pt-br\ui-strings.js smss.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\Cartridges\as80.xsl smss.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\GamesXboxHubSplashScreen.scale-125.png smss.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\MixedRealityPortalAppList.targetsize-72_altform-unplated.png smss.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
smss.exedescription pid process Token: SeDebugPrivilege 4752 smss.exe Token: SeDebugPrivilege 4752 smss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exesmss.exedescription pid process target process PID 2716 wrote to memory of 4752 2716 7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe smss.exe PID 2716 wrote to memory of 4752 2716 7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe smss.exe PID 2716 wrote to memory of 4752 2716 7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe smss.exe PID 4752 wrote to memory of 4840 4752 smss.exe smss.exe PID 4752 wrote to memory of 4840 4752 smss.exe smss.exe PID 4752 wrote to memory of 4840 4752 smss.exe smss.exe PID 4752 wrote to memory of 3020 4752 smss.exe notepad.exe PID 4752 wrote to memory of 3020 4752 smss.exe notepad.exe PID 4752 wrote to memory of 3020 4752 smss.exe notepad.exe PID 4752 wrote to memory of 3020 4752 smss.exe notepad.exe PID 4752 wrote to memory of 3020 4752 smss.exe notepad.exe PID 4752 wrote to memory of 3020 4752 smss.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe"C:\Users\Admin\AppData\Local\Temp\7b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -start2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exe" -agent 03⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\notepad.exenotepad.exe3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exeMD5
6e789d89c3817997e791a62a91a392dd
SHA1b88feefd90de401dabf9f1574fb2b47de608b010
SHA2567b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16
SHA512ab76d49de89d4e8c734bcb4ccd61dd71466a8cbb594eb152e35fea3806324ca9b05b60662f32e57b1d4461c38b8ff2cf631a267b7a3e5000b9977625dbaa8e3c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exeMD5
6e789d89c3817997e791a62a91a392dd
SHA1b88feefd90de401dabf9f1574fb2b47de608b010
SHA2567b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16
SHA512ab76d49de89d4e8c734bcb4ccd61dd71466a8cbb594eb152e35fea3806324ca9b05b60662f32e57b1d4461c38b8ff2cf631a267b7a3e5000b9977625dbaa8e3c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\smss.exeMD5
6e789d89c3817997e791a62a91a392dd
SHA1b88feefd90de401dabf9f1574fb2b47de608b010
SHA2567b560460b14741999a04a72415bb7b4872739410833b4f6970abaa928ddcab16
SHA512ab76d49de89d4e8c734bcb4ccd61dd71466a8cbb594eb152e35fea3806324ca9b05b60662f32e57b1d4461c38b8ff2cf631a267b7a3e5000b9977625dbaa8e3c
-
C:\Users\Admin\Desktop\AssertRead.ppt.354-97A-B1FMD5
95fd08e70234921d1e5c36f2e41a793c
SHA1e2f0533f4314f424a786f159334cb3e3027122b4
SHA2564d617096e879ab73f830503b3d585998f017ee0b7dd6c8f2a2a0b4818da6bbbb
SHA51236f7f22b9fbb105f5c5be2131b3879fb3cb7b7b785b0570da7208eab89e26b689a4292d0d02f2e0209932fb6d64568e4365328e3ed354de399e57028aa353f9b
-
C:\Users\Admin\Desktop\BlockNew.png.354-97A-B1FMD5
06f9e2fff85adde5f80ceac3bca56677
SHA1116fb822a5b7afbbe9982b52e4e5b75d6a39fe3b
SHA2564c8c8cf2f3fdbc03710abdc5c828863b88417e01ad5ee4d8be6fe536dff1a6b3
SHA512ecc57dbe4600ea544307fc83dd9bfbe2c3efa472e5b40fcdb08e33fc677853bce10c1331e3b1acb6bc32317bdefcedf1ffc813e69f1226a6e2b8b9d1a9e1e181
-
C:\Users\Admin\Desktop\ConfirmDebug.mpa.354-97A-B1FMD5
7a78aa549848ad04ce6421af452f64d9
SHA15f0a24fd985e70fce92956d083c841c3602978fb
SHA256cc36409977106bb5cd40bd996746db8b475cbb6e6adeedbeb38225024bb9b5c1
SHA51204227e55860204d44964e5e6385c36b26340791d19a9d6368d0d74bf37c728ace663115298308551573630d040370aa715d75466876d9982f54eb3a6a18a6c63
-
C:\Users\Admin\Desktop\DenySkip.3gp.354-97A-B1FMD5
9bf7ff46c9f53ee668c81dacba37da24
SHA1badc064ec237fb83c49c97a18a33d8c25be24210
SHA2563fa42474a47695241e92359fadac47649c9f133e700d20b97ece5404f0d5a516
SHA512770722b2abae597c489f754261cfc9e499a5cccecbd49f59e11a2a98d873986ae5b27b3c2a35206e16cfaa916a22a9e18d24b11e75b4bdb81a393d274a19af77
-
C:\Users\Admin\Desktop\DisconnectRepair.pdf.354-97A-B1FMD5
a74f5fe9be23ba61457a2cf1008ddb16
SHA16cd25db61376f30b791ac6ac5be190905093a2a6
SHA256b4162b4ca5413311d9a8243568c30b495d0146df196a48267fcc19bd4bae72b1
SHA512b1f89c4c75f57a5efb2a661b185121081201f4820b642a4bba69995a5af951015dd0edbdf24e504c3a5f21af65918aa0d8e3b70f8f81ae7a396e8923a4da072e
-
C:\Users\Admin\Desktop\DisconnectUnblock.temp.354-97A-B1FMD5
ad0cef7a74541750eaaa8f9ca207601f
SHA1a0bc6d4446de6db78c3be7905225de5e5ef630e8
SHA256dc2e52284d721c79413d6437468b5e2f0422bb3ddd9ad0abfd303ee383c1b032
SHA512cddf591d1321ae3d5c1efa3de9fd1b4d9879a90a056b33711ef0d4118a22536f66473d8e1196582c4f6b02b0ea5e80c0ee58e7b6c2c56b04560914568b05d462
-
C:\Users\Admin\Desktop\ExpandWrite.mov.354-97A-B1FMD5
1a9470852798a9337be6a40107c8ec96
SHA116bef019e2bc905a86a4341d9ed5677305c1bc81
SHA25679a299b3600f61d43fa2fe7bef3034682b48d4f2f3b1095c0e3c3f6f6008a693
SHA512e955f67faf8bf7322767df1f7d756977f66c2fb2f8f503f927e5be1aabbe02810ca7342f66221e3f8757f3029b65dad4a7acdf584bf1df45cd27f1b19875e5df
-
C:\Users\Admin\Desktop\ExportSuspend.ogg.354-97A-B1FMD5
0b922fcaf9926cba307a99de39cd64a0
SHA18f576d342f4957a3ef113d03c59eb7aaac1c43f2
SHA2562e4f43a6fb23615fb9490bc31dcd9239e1f353c7a71a92f975c31e2dbdd09953
SHA5126f65dfff45c251aec0a632fb4a512b97ecc5114ad92449ade381cf1aebdfe92699817ad227e2e3f0013eb33490bda0a73fc479a6204e55674b82e619a5329f75
-
C:\Users\Admin\Desktop\InitializeStop.ram.354-97A-B1FMD5
f257d8dff28a634a6ee604baebec0015
SHA1e311b815e83a430130eac26f3f1ebeeb6f5c488a
SHA25671212c9c188d7af35b7212b3bbb9629626135d52c634aa5fa5de65be90747467
SHA5121f19df0cfc376b77890b2220d353daebe420566b1c1e2d4d43c8f3bc9386d136552b0010dbb30c780c923bd4ab7394be97cf532d7c99c9d0aca6a12ae6f7f945
-
C:\Users\Admin\Desktop\LockSend.cab.354-97A-B1FMD5
3d7b092260ffc76809a9c6388931cf8b
SHA152412e73325d4d55297775c7372b8f3b5d9fbbe5
SHA256b972758d644238c5a734d990b6430ea69100899f1aaa8f823fffc90a1f346dd8
SHA51205bfdabc919a53475e9ec193e979a2b657a8fe5a56f85349ce2033efeebd324e757b9adc2d496ff4f85e0a1236267efe80c76427323bd7783652f1ab274d86bc
-
C:\Users\Admin\Desktop\LockWait.pptm.354-97A-B1FMD5
860bcb1a1b862266c3a788409093a6bd
SHA1407cdf2b6a6b5e1dbb3681eeec14dc1d7e501bff
SHA256ae9c22b7bef2c8c4329137702b04e4159ba3adc85f9978ba3547ade23ff5cb80
SHA512d8118c92066c989d80e9930f8451305d7be6c1464c3a66ba718a4c02696028a638c383386313971207fcbcf8b0d8b2c83b39dc46847320686ca65daaa5a57345
-
C:\Users\Admin\Desktop\OptimizeRequest.ini.354-97A-B1FMD5
93fbbd6880cab85ea25d4a254701eed1
SHA130882546efcb67f2c1aaa7aa7ae9e26b3fa1a7f6
SHA25644c339f11a6cbf88b29e8dbf85f04941325269b8adb7e975b068c1be2b1bffe1
SHA51254b8bed2138eee6bdfa6f3baf65f3e7becb2b38368aaf1c6600e0a904e258f99c58aca7a66d3b6d8ae6cdd2d1db68193e16f2749d7ea85c332d51b1de76dd150
-
C:\Users\Admin\Desktop\PopMount.ex_.354-97A-B1FMD5
b22ca760d3bd9a196dbdef5fda58a9b1
SHA163eec36e77957d617be1912917b6e2cd8a3d2987
SHA256f5e781b4895d09c8e9c57fc0d361b2adb2b81a5aa1fd83379f2fe122c75860c3
SHA5124163a36ca28c3cabfdfb825b916c77fa0736f4202a72c0097de953802c55a4735b8d63e086fac2a4ee2b090df559cc7a47e070cd645c1bede2941c9c1574342f
-
C:\Users\Admin\Desktop\ReceiveResume.mp2v.354-97A-B1FMD5
ed6a7b3aa98217cd70f59b84f0d7aa28
SHA195887b4ad385905e96d6d0d20a4be769e596af68
SHA25664f429c7a4da00a4a4bdfd2e654d3a184f9bb236f99de74b5d488e25c0146abc
SHA512630ab83924e342cbb6b6ca3f76a4f8ac56bd4bd28f56b6799c1193a0808cb7b54dc8968e8051a4a75fdcd7e2a0544a0c9b0b5b156bfe16637ca08eb519d90ba2
-
C:\Users\Admin\Desktop\RedoConnect.aiff.354-97A-B1FMD5
a7addd38d111ee796c21608457496f73
SHA1ceca118938516c1b8146c9be84dfa15c20588fef
SHA25608b654e2927a907847df54f16ab40a83142ae19fc7724710e132c915b074104c
SHA512f9b1d4e63c63cb1793283f4bf46b713fd3d4483dd46c323cca4b4e5e4150e6484ae87af8a19d765004f7d949197f83fde23a5a1f75deec24ccf3e7bf3e06f640
-
C:\Users\Admin\Desktop\RestartAdd.cr2.354-97A-B1FMD5
00c06e34e7e97ec541ff850f527ae1a8
SHA112ffb05c66920a8262400c69957b652cd2723f1b
SHA25687459a7345b350557f3b2ebb96e0f131eb801e7a89deedb2e01d2d05d56f0ac9
SHA5128b2109860cbf7d5aee33c3d9c2e43ad7bf9e5bba1edc3b9b5e869ebaa985832176b9387858627ae17c9a829e05169bf73658876db6c99ed0b9b1b5e8c8b0b6e8
-
C:\Users\Admin\Desktop\RestartSwitch.emz.354-97A-B1FMD5
ce86580d4933e7fe6ef83891b50d3c01
SHA103943e5fdff3ee9472469f7b14c27b4e1fd7d11f
SHA2562ad263c230dab286d5164b9ea9b2b917ea26bef7cf2d07d1cca8defd70b5c48a
SHA512ac582dc0d4ce5629ccdc69ca9b2bca7f727371559aafadbe3065c91d5e83578e6c62389bed2ec010e143303983509633ede38e9499cfc244ce491cdf8ee71702
-
C:\Users\Admin\Desktop\RevokePop.vbs.354-97A-B1FMD5
fac51abe7f4f05a99e57e480878b1a6f
SHA16e3d551a76be43fe07c79f43ab7cfe0139c75226
SHA256014102429ecf6b6fa8c099dffccce172045b805187c9845c4937289d28ca4564
SHA5127644e1f2ff978927e2e247e6e02956669c1684ed24214444ad2aaec87aba26fc7222337f8acfe4a118aaf5a150db9fde19bec1227292d40c15d3a5203b733fa5
-
C:\Users\Admin\Desktop\SaveFormat.midi.354-97A-B1FMD5
b22773ae7704683354acb8eb2db498a4
SHA146f45d085b254f79b8f63976c064cdaf91ef0c08
SHA2567436d4d8a5a7bad79eb5ef32bd7b7f8ec47ca6a89b6c36c8ba5a0dfc7052cda9
SHA5124bd8902b48819c0647896e772db69e8ce07e7be371878176642dde809af5679aceab8540b3bd50cbbf5ed676c98cc2e9685a63b5bcf36e29a3f369514c0d818e
-
C:\Users\Admin\Desktop\SkipWait.bmp.354-97A-B1FMD5
71b0272740c76a86767df211b9506856
SHA183437a450d61271d88e5396ae4f1ee570b083a6d
SHA2564f672fc7a1e0f954adb4dfb2ce91c2048ded45921adbc5cf2c0e7996d4690c9b
SHA51273ea9e362abda589116fd917e09c4281c74ba5255b78d49e3821e68b56eb86c3f4be6c457f022405869a9b6571c52436120dcce291b62e2d9acb6b49be312238
-
C:\Users\Admin\Desktop\StartBlock.avi.354-97A-B1FMD5
9b8e4bf6785b7b4b8acd4259ff1ef0f7
SHA1bd18e44e7c90bf49a76589f0b79f0b24aefe78d2
SHA2569b5beea45f773db15344bb15bef94a236295291b6e165aa215637e7d4d807314
SHA5129cda75be39134eff5f477a0ac59aca397d903fbe0ad0c166d82a826bbefccf62f92029063a8ed9d6e98ef096b94dfb3af735405a17bd0f888b3d72932c030238
-
C:\Users\Admin\Desktop\SyncUnlock.TTS.354-97A-B1FMD5
cf71cc9ac2ae80894654d938a620df14
SHA11da149cd5d0686523a862e15684dc0ae47de8526
SHA256ec8fa171432193fcfb6784fe5c6b2b7e6ad87197f5e044db50de2c23386e6e5b
SHA512b944f5cba8b83d01d8e78a9a0a240d7d013a6c343f8ab8d5e348d2f0fb2148d33d1f0d17565d725856ce5e69e68daf0a5bcc7234f50fcbfc80776037657beec8
-
C:\Users\Admin\Desktop\TestApprove.vdw.354-97A-B1FMD5
d5426c31d973acd1b8013559d89c3be1
SHA16cc8da870c8315ffcda75f7f67b25bc95ee5b01e
SHA2568241762c6084b8a376cc83990c0d207b1608aca12dbcab4c3304850b82c55057
SHA512eb4c5a330b8a4f1ec7b0e27448baf63ca66b6087165f8392594a3cf2cced74ece30dddbcce3c06f98f975fd18e655e0a3baa5a58e642971d261eafbd7f47605d
-
C:\Users\Admin\Desktop\WaitDisconnect.kix.354-97A-B1FMD5
1e088edc72bba436a6948e370532f487
SHA13e2957f2e441539eb4bf1df9fcc888d1601302e1
SHA256a2aa77d64adb0536953ec5d3b11d0c436f4534dd71c97c72931544c77519a65b
SHA512ad17765c7e084251e53996f4ad00f58091dd71e153e543cdcbeb7c143822e0689c522f02299bc1ec5e2f5fbb65f6dae5c2e71e45ee6e5aa6b01e19aa5c2bbfe2
-
C:\Users\Admin\Desktop\WatchInitialize.easmx.354-97A-B1FMD5
06009bf99eb178593fb575a19468d76c
SHA1cba1530e5d8c7948e1ef5cfbe1c6c28b62bb5aeb
SHA256f159a8085137fa915488524cab7a135750109cd183bec434017ae8894e9caacb
SHA512258c949a99387676dbd8ede003fde90616befca9c0270f679a6ca5586e21925b5f6684723be1828e4ed90930e3240f860695858fef88fefc0f0e969eb5900e78
-
memory/3020-158-0x0000000000640000-0x0000000000641000-memory.dmpFilesize
4KB